Encryption & Algorithms
Elements & Principles and Usability Principles
Network Protocols & Internet
SQL
Pseudocode & Algorithms
100

Name two different types of ciphers.

What is caeser, Vegenere, Gronsfeld, OTP

100

Name and describe 2 usability principles

Effectiveness, utility, learnability, safety and accessibility.

100

What does IP stand for?

Internet protocol

100

What does SQL stand for?

Structure Query Language

100

What are three rules for writing pseudocode?

Capital letters for key words, proper indentation, must start with BEGIN and END

200

What cipher is best described as: a type of substitution cipher that involves shifting each letter of the alphabet by a fixed number of positions. In this cipher, each letter in the plaintext is replaced by a letter that appears a certain number of positions later in the alphabet.

What is caeser cipher

200

Scale, shape, texture and tone are examples of what?

Elements of visual communication.

200

What are two factors that can impact performance over a network?

Jitter, latency, QoS

200

What key word is used to change the value of a field in SQL?

UPDATE

200

What does this statement best describe:

Repeating an action until a specific condition is met.

While loop

300

Explain two factors that impact the quality of a cipher/encryption standard and explain why.

Key length, number of rounds, complexity of algorithm

300

What principle of visual communication best fits the following description?

Ensure that all related information is organised in the same area, making it easier for users to understand.

Proximity

300

What transmission protocol would be utilised to facilitate an online FPS game and why?

UDP - it sends packets of data constantly without error checking. The host has ways to manage dropped packets.

300
What is the default sort type of the ORDER BY clause in SQL?

Ascending Order

300

Describe modularisation and why it is useful in programming.

It allows us to write code that can be reused for functions/action that are used frequently.

400

Describe how a public/private key operate using asymmetric encryption methods.

Anyone with the public key can encrypt data but decryption can only be done using the secret private key.

400

What usability principle is best understood by considering if something is perceivable, operable, understandable and robust?

Accessibility.

400

Describe key features of the transmission control protocol (TCP).

Checks that packets have been received, can send and receive packets out of order, works with IP.

400

Nominate one person from your group to come to the board and write an SQL statement that finds all names starting with the letter 'a' in a table called users with a field called fullName.

SELECT fullName
FROM users
WHERE fullName LIKE 'A%';

400

Nominate one person from your group to come to the board and write basic pseudocode for printing out the times tables based on two preset numbers (for example 3 times tables up to 10 places)

Check the code.

500

Nominate one person from your group to come to the board and write basic pseudocode for a caeser cipher.

Varied

500

Described the most effective way to explain key differences between elements and principles of design.

Elements focus primarily on small components of an overall design, whereas principles are used to assess the effectiveness of the design of a whole user interface.

500

What is the difference between synchronous and asynchronous data exchange? Provide an example of an asynchronous data exchange language/tool.

Synchronous requires a page to reload (REST etc) and asynchronous can load information dynamically (AJAX)

500

What is the mistake in this statement?

SELECT employees.employee_id, employees.employee_name, departments.department_name
FROM employees
INNER JOIN department
ON employees.department_id = departments.department_id;

The mistake in this SQL statement is that the table name in the INNER JOIN clause is misspelled as "department" instead of "departments."

500

Nominate one person to perform a desk check on the following pseudocode:

BEGIN    SET salesPrice as Real    SET discount as Real    SET finalPrice as Real     INPUT "Enter the sales price: " salesPrice    INPUT "Enter the discount percentage (as a decimal): " discount     CALCULATE finalPrice = salesPrice - (salesPrice * discount)     OUTPUT "The final price after applying a " + discount * 100 + "% discount is: " + finalPrice END


Check answer