Name the 3 components of computational thinking
Abstraction, Decomposition, Algorithmic Thinking
Flow chart and pseudocode
Describe what is meant by a MAC address
MAC address is a unique hexadecimal identification number assigned to every Network Interface Card
Used to direct data to theright device on a network
Define SYNTAX error
Syntax errors are mistakes in the source code, such as spelling and punctuation errors, incorrect labels, and so on, which cause an error message to be generated
Define the term 'copyright'
The legal right that gives the creator of content protection over how their content is used.
Define abstraction
Filtering out/removing/hiding details of a problem
PSEUDOCODE!
What does this do:
input height
input width
area = height x width
output area
asks user to input height and width
multiplies these values together
prints this calculation out
Define encryption
Data is translated into cipher text which is only readable by someone with the correct key to access it
Define input validation and provide two types of input validation with examples
Checking if data meets certain criteria before passing it into the program
example:
format check - email address contains @/date
length check - password is longer than **
The average smartphone is only used for two years before it is discarded.
Outline 3 problems that the short life span of electronic devices has on the environment and describe them
e-waste is sent to the landfill - toxic chemicals can enter groundwater/harm wildlife
natural resources used to create new devices - more polution and depletes natural resources
manufaturing devices uses up a lot of electricity - often generated using non-renewable resources
Define Algorithmic thinking
A logical way of getting to from the problem to the solution
Draw the flowchart symbols (6 symbols)
start/stop = box with rounded corners
inputs/outputs = parallelogram
process = rectangle
decision = triangle
sub program = rectangle with a line on either side
arrows
Provide one advantage and one disadvantage of mesh networks
- Highly robust/not one single point of failure
- Data can be transmitted from several devices simultaneously
- Local networks run faster because data does not have to travel through a central switch
Disadvantages:
- Very expensive to set up
- Self maintenance and administration is complex
Identify two peoblems with the contants or variables in the program
const investment = input("Enter investment.")
rate = "0.2"
for x = 1 to 12
interest = rate * investment
investment = investment + interest
next x
print(investment)
1) investment is declared as a constant but its value changes
2) rate variable has a string type should be a real
Provide 2 health problems from using technologyand explain how these are caused
Eyestrain - looking at screens for too long
Repetative Strain Injury - reptative movemnent such as keyboard causes damage
Back problems- poor posture when sitting on the pc
Provide an example of decomposition within computer science and why we do this?
When writing program we break down into components, functions or tasks. Doing this we can allocate seperate people to write/fix code without impacting other peoples code.
Decribe the differences between a binary search and a linear search
Binary search looks for items in an ordered list
Linear search can be used on an unordered list
Binary search looks for the middle number (divide and conquer)
Linear search goes through the list till it finds the item
Describe 3 factors which may effect the performance of a network
The number of active devices will increase the number of data collisions
Interference can disrupt the signal causing connections to become unreliable
Type of cabling, signal strength, distance from WiFi
minutes = input("Enter a number of minutes")
hours = minutes DIV 60
mins = minutes MOD 60
print(str(hours) +" hours and " + str(mins)+" minutes")
Which programming construct has been used:
Sequence, Selection or Iteration?
SEQUENCE
Provide two security measures a company should put in place in order to provide adequate security of customer data
firewall, anti-virus software, passwords, encryption
A file uploading service won't allow two files with the same file name to be uploaded. If a file name already exists, it will ask the user to change the file name.
Describe with examples how ABSTRACTION can help decide how to compare the files.
Define - Abstraction is picking out important details and ignoring irrelevant ones.
Important detail - file name
Unimportant detail - contents
Kim has a hand of playing cards, all from the same suit: 3, 7, 6, 2, 5
Arrange the cards in order from highest to lowest using an insertion sort.
3 7 6 2 5
7 3 6 2 5
7 6 3 2 5
7 6 3 2 5
7 6 5 3 2
Give three advantages and two disadvantages of a star network
Advantages:
1) if a device fails or a cable disconnected the rest of the network is unaffected
2) Simple to add more devices to the network
3) Better performance than other setups
Disadvantages:
1) Can be expensive ie (50 pcs in an office)
2) If there is a problem with the switch the whole network is affected
Iterative testing - tested whilst being developed - used to fix small errors
Terminal (final) testing - testing at the end of the developmen process - checks whole program runs and is working correctly
a combination of iterative and terminal can minimise the total number of bugs/errors
In many factories robots have replaced humans for routine tasks such as cutting and joining materials together.
What is the impact of robots replacing humans for factory staff, technology and ethical. Provide two for each one!
workers can become unemployed
can create extra jobs as people will need to monitor/repair robots
Technology:
hardware and software may not be sophisticated enough to fully replicate the work of humans
succesful use here can lead to more application in other fields
Ethical:
robots can perform hazardous tasks so less injuries
workers are able to focus on more creative tasks