Computational Thinking
Data
Computers
Networks
Issues & Impact
100

This is the breaking down of a significant problem into smaller sub-problems.

Decomposition

100

The number of possible combinations with 6 bits

64

100

The three storage methods used with secondary storage

Magnetic, Optical, & Solid State

100

Forms the acronym WAN

Wide Area Network

100

These two words combine together to form the word 'malware'

Malicious Software

200

Removing unnecessary detail from a problem so you can focus on the essentials

Abstraction

200

Splitting a byte into these help translate binary into hexidecimal

Nibbles

200

One of four areas of management that an operating system handles

File, Process, Peripheral, & User

200

This is the unit ISPs state for bandwidth speeds

Megabit / Mb

200

The term used when manufacturers design products to fail after a certain period of time

Planned Obsolescence

300

This type of search is also know as 'divide & conquer' and requires data be sorted before it can be run

Binary Search

300

109 in Two's Complement (answer in binary)

1001 0011

300

The three buses that are used with the CPU

Address, Data, and Control Bus

300

When transferring data across a network, a file is broken up into these

Data Packet
300

This type of malware holds a computer hostage by locking or encrypting data

Ransomware

400

This type of table shows the output from all possible combinations of inputs from a Boolean expression

Truth Table

400

These two words form the word 'pixel'

Picture Element

400

One of two translation methods when turning a high-level program into machine code

Interpreter or Compiler

400

This particular network topology has all devices connect to a central switch

Star

400

This act requires organisations to keep only relevant data on people and justify why they have it

Data Protection Act (2018)

500

The three types of logic gates used with binary logic

AND, OR, & NOT

500

The length of time between two measured points of an audio file

Sample Interval

500
A standard computer's architecture is named after this person

Von Neumann

500
While the internet is highly complex network, it is fundamentally this type of topology

(Partial) Mesh

500
This type of software is often closed-source, often used by people via paid licence which cannot be adapted or modified by the user

Proprietary Software

M
e
n
u