Computational Thinking
Algorithms
Network
Robust programming
Ethics
100

Name the 3 components of computational thinking

Abstraction, Decomposition, Algorithmic Thinking

100
Identify two ways of writing algorithms

Flow chart and pseudocode

100

Describe what is meant by a MAC address

MAC address is a unique hexadecimal identification number assigned to every Network Interface Card

Used to direct data to theright device on a network

100

Define SYNTAX error

Syntax errors are mistakes in the source code, such as spelling and punctuation errors, incorrect labels, and so on, which cause an error message to be generated

100

Define the term 'copyright'

The legal right that gives the creator of content  protection over how their content is used.

200

Define abstraction

Filtering out/removing/hiding details of a problem

200

PSEUDOCODE!

What does this do:

input height

input width

area = height x width

output area

asks user to input height and width

multiplies these values together

prints this calculation out

200

Define encryption

Data is translated into cipher text which is only readable by someone with the correct key to access it

200

Define input validation and provide two types of input validation with examples 

Checking if data meets certain criteria before passing it into the program

example:

format check - email address contains @/date
length check - password is longer than **

200

The average smartphone is only used for two years before it is discarded.

Outline 3 problems that the short life span of electronic devices has on the environment and describe them

e-waste is sent to the landfill - toxic chemicals can enter groundwater/harm wildlife

natural resources used to create new devices - more polution and depletes natural resources

manufaturing devices uses up a lot of electricity -  often generated using non-renewable resources

300

Define Algorithmic thinking

A logical way of getting to from the problem to the solution

300

Draw the flowchart symbols (6 symbols)

start/stop = box with rounded corners

inputs/outputs = parallelogram

process = rectangle 

decision = triangle

sub program = rectangle with a line on either side

arrows


300

Provide one advantage and one disadvantage of mesh networks

Advantages: 

- Highly robust/not one single point of failure

- Data can be transmitted from several devices simultaneously 

- Local networks run faster because data does not have to travel through a central switch

Disadvantages: 

- Very expensive to set up

- Self maintenance and administration is complex

300

Identify two peoblems with the contants or variables in the program

const investment = input("Enter investment.")

rate = "0.2"

for x = 1 to 12

      interest = rate * investment

      investment = investment + interest

next x

print(investment)

1) investment is declared as a constant but its value changes

2) rate variable has a string type should be a real

300

Provide 2 health problems from using technologyand explain how these are caused

Eyestrain - looking at screens for too long

Repetative Strain Injury - reptative movemnent such as keyboard causes damage

Back problems- poor posture when sitting on the pc

400

Provide an example of decomposition within computer science and why we do this?

When writing program we break down into components, functions or tasks. Doing this we can allocate seperate people to write/fix code without impacting other peoples code.

400

Decribe the differences between a binary search and a linear search

Binary search looks for items in an ordered list

Linear search can be used on an unordered list

Binary search looks for the middle number (divide and conquer)

Linear search goes through the list till it finds the item

400

Describe 3 factors which may effect the performance of a network

The number of active devices will increase the number of data collisions

Interference can disrupt the signal causing connections to become unreliable

Type of cabling, signal strength, distance from WiFi

400

minutes = input("Enter a number of minutes")

hours = minutes DIV 60

mins = minutes MOD 60

print(str(hours) +" hours and " + str(mins)+" minutes")

Which programming construct has been used:

Sequence, Selection or Iteration?

SEQUENCE

400

Provide two security measures a company should put in place in order to provide adequate security of customer data

firewall, anti-virus software, passwords, encryption

500

A file uploading service won't allow two files with the same file name to be uploaded. If a file name already exists, it will ask the user to change the file name.

Describe with examples how ABSTRACTION can help decide how to compare the files.

Define - Abstraction is picking out important details and ignoring irrelevant ones. 

Important detail - file name

Unimportant detail - contents

500

Kim has a hand of playing cards, all from the same suit: 3, 7, 6, 2, 5

Arrange the cards in order from highest to lowest using an insertion sort.

3 7 6 2 5

7 3 6 2 5

7 6 3 2 5

7 6 3 2 5

7 6 5 3 2

500

Give three advantages and two disadvantages of a star network

Advantages:

1) if a device fails or a cable disconnected the rest of the network is unaffected

2) Simple to add more devices to the network

3) Better performance than other setups

Disadvantages: 

1) Can be expensive ie (50 pcs in an office)

2) If there is a problem with the switch the whole network is affected

500
Describe the two main types of testing and why you would use them

Iterative testing - tested whilst being developed - used to fix small errors

Terminal (final) testing - testing at the end of the developmen process - checks whole program runs and is working correctly

a combination of iterative and terminal can minimise the total number of bugs/errors

500

In many factories robots have replaced humans for routine tasks such as cutting and joining materials together.

What is the impact of robots replacing humans for factory staff, technology and ethical. Provide two for each one!

Factory staff:

workers can become unemployed
can create extra jobs as people will need to monitor/repair robots

Technology:
hardware and software may not be sophisticated enough to fully replicate the work of humans
succesful use here can lead to more application in other fields

Ethical:
robots can perform hazardous tasks so less injuries
workers are able to focus on more creative tasks