Random Math Stuff
Chapter 9: Knowing Your Audience
Anything Trivia
Chapter 8: Safety and Security
Chapter 7: System Life Cycle
100

What is the only number that has the same number of letters as its meaning?

Four

100

Term used for a string of letters and numbers which is supplied with the original copy of the software

Product Key

100

3% of the ice in the Antarctic Ocean is the urine of what animal?

Penguin. Also a huge percentage of the ocean is made out of whale pee.
100

Explain what does shoulder surfing mean?

Shoulder surfing is a form of data theft where criminals steal personal information from a victim when they are using a cash dispensing machine. Methods such as listening to conversation, watching you enter your PIN, and using small digital cameras are ways to get your information.

100

State all 4 implementation methods.

Direct, Parallel, Pilot, Phased

200

What’s the first number to contain the letter A?

One thousand

200

Provide four characteristics of an audience when using a website

» age range » income levels » interests » disabilities or impairments.

200

Which young artist claimed five Grammys at the 2020 Grammy Awards?

Billie Eilish
200

Give all four risks of physical safety

Electrocution, Tripping Hazard, Fire Hazard, Personal Injury

200

Give all the tasks in Design Stage

File and data structure

Validation Routine

Input Format

Output Format

300

When is Pi Day celebrated?

March 14 !

300

State three reasons why we need to consider the needs of our audience 

  • Use clear fonts for older users or those with vision impairments.

  • Simple language helps children and non-native English speakers understand.

  • Users will leave if the website doesn’t hold their attention.

  • Attractive designs draw people in.

  • Easy-to-use interfaces keep users engaged.

  • Avoid too much typing and confusing navigation.

300

What natural food never spoils?

Honey

300

What does SSL mean? And what does it do?

Secure socket layer certificates are small data files that digitally bind an encryption key to an organization’s details. When installed on a web server, it shows as the green padlock and the https protocol ensures secure connections from a web server to a web browser. 

300

Describe the different types of tests data.

Abnormal - invalid/rejected input

Normal - valid input. Within the range, but not the limits

Extreme - valid input. Within the range, but ONLY the limits.

400

What is the symbol of division called?

Obelus 

400

Describe one aspect of each key factors when writing the presentations.

»the language that is used 

» what multimedia could be used 

» how long should the presentation last 

» if the presentation should be interactive 

» what would be suitable examples to use in the presentation.

400

What’s unusual about the national animal of Scotland?

Unicorn

400

Give five examples of malware.

Ransomware, Adware, Virus, Worm, Trojan Horse
400

What's the difference between Technical Documentation and User Documentation?

Technical Documentation - only for the developers or people assigned in creating the system. This includes phrases that is difficult to understand by customers.

User Documentation - this is for anyone who uses the system. Usually about how to use the system that users might understand and helpful.

500

How many seconds are in one day?

86,400

500

What is intellectual property, and how is it related to copyright?

Intellectual property (IP) refers to ideas, inventions, and creative works that belong to a person or company. Copyright is a type of IP that protects original works like books, music, and artwork. It ensures that only the creator has the right to use, share, or sell their work.

500

What’s unusual about the way a hummingbird flies?

It can move backwards!

500

How are Smishing, Vishing, Phishing, and Pharming different?

I believe you know it!
500

Aside from the different changeover/implementation methods. What else can we do in the 5th stage of the system life cycle? Cite two tasks.

Train the staff about the new system

Transfer paper files or electronic files to the new system