1.1 - The characteristics of contemporary processors, input, output and storage devices
1.2 - Software and software development
1.3 - Exchanging data
1.4 - Data types, data structures and algorithms
1.5 - Legal, moral, cultural and ethical issues

100

What is the role of the processor in a computer system?

The processor is the "brain" of the computer that executes instructions.

100

What is system software?

Software that controls the computer's operation.

100

What is a LAN?

A network within a small geographic area.

100

What is a data type?

The type of data that a variable can hold, such as integers or strings.

100

What are some ethical considerations around artificial intelligence?

Issues such as bias, privacy, and accountability.

200

Describe the purpose of input and output devices in a computer system.

Input devices allow users to enter data into a computer system, while output devices allow users to receive information from a computer system.

200

What is the software development life cycle?

A process used to create software, consisting of stages such as planning, design, coding, testing, and maintenance.

200

What is a protocol?

A set of rules governing the communication between devices.

200

What is an array?

A collection of data stored in contiguous memory locations.

200

Why is privacy important in the digital age?

To protect personal information from misuse and unauthorized access.

300

Explain the difference between volatile and non-volatile memory.

Volatile memory loses its data when power is lost, while non-volatile memory retains its data.

300

What is open source software?

Free software that allows users to view and modify the source code, but may lack professional support.

300

What is the CSS code to change the background colour of an HTML element to blue?

background-color: blue;

300

What is a hash table?

A data structure that maps keys to values for efficient lookups.

300

What are the consequences of cyber attacks and data breaches?

Financial losses, loss of sensitive data, and reputational damage.

400

What is an instruction set?

A set of instructions that a processor can execute, such as arithmetic and logic operations, and memory access.

400

What are the three types of programming languages?

High-level, assembly, and machine languages.

400

What are two common uses of hashing?

Hashing is commonly used in web development for password storage, URL shortening, and data verification.

400

What are the rules for creating a Karnaugh map?

The rules for creating a Karnaugh map include grouping adjacent cells that have a value of 1, grouping cells in powers of 2 (e.g., 1, 2, 4, 8), and creating the largest groups possible. The resulting groups can then be used to create simplified Boolean expressions.

400

What is the Computer Misuse Act in the UK and what activities does it prohibit?

The Computer Misuse Act is a UK law that makes it illegal to access or modify computer systems without authorization, or to create or distribute malicious software. It also prohibits activities such as hacking, phishing, and denial-of-service attacks, and imposes penalties for those found guilty of such activities.

500

What determines processor performance?

Clock speed, cache size, number of cores, and architectural features.

500

What are the stages of compilation?

The stages of compilation include lexical analysis, syntax analysis, semantic analysis, code generation, and optimisation.

500

What are two advantages and two disadvantages of wireless communication?

Greater mobility and flexibility, but can be subject to interference and security vulnerabilities.

500

What is a linked list and how does it differ from an array?

A linked list is a data structure consisting of a collection of nodes, where each node stores a data value and a reference to the next node in the list. Unlike arrays, linked lists do not have a fixed size and can be dynamically resized, and accessing elements in a linked list requires traversing the list from the beginning rather than using an index.

500

What is the Data Protection Act in the UK and what are some of its key principles?

 The Data Protection Act is a UK law that governs how personal data is collected, processed, and stored by organizations. Some of its key principles include the requirement to obtain consent for data processing, the right to access and correct personal data, the obligation to keep personal data secure, and the requirement to report data breaches to the relevant authorities.