N5 Computing Science - Solutions

Similar documents
N5 Computing Science - Revision

DUMBARTON ACADEMY NATIONAL 5 COMPUTING SCIENCE REVISION

Computing 1: Computer Systems

HASTINGS HIGH SCHOOL

Hardware and Software - Revision Summary

Grey High School. June COMPUTER APPLICATIONS TECHNOLOGY Grade 10 Paper 2 Written MEMORANDUM

Total Mark out of 35

Autumn 1 Autumn 2 Spring 1 Spring 2 Summer 1 Summer 2. networks. environmental concerns. Knowledge and skills covered: Knowledge and skills covered:

For this class we are going to create a file in Microsoft Word. Open Word on the desktop.

OCR GCSE (9-1) Computer Science J276 Accompanying Instructional Document

Computing Science. National 5. Summary Revision Notes

Which one of the following terms describes the physical components of a computer system?

GCSE Computer Science for OCR Overview Scheme of Work

Common Technology Words and Definitions

Information Communications Technology (CE-ICT) 6 th Class

Which one of the following terms describes the physical components of a computer system?

Malling U3A Computer Group. Cloud Storage. Chris Daly 3 rd April 2017

National 5 Computing Science Software Design & Development

OCR J276 GCSE Computer Science

Full file at

elc International School

The Lester Vaughan School Information Technology (Theory) Unit Plans Year 1 Term 1

Basic PC: How do you turn on this darn thing?

Stratford School Academy Schemes of Work

CMSC 1513 Lecture 1.2

Topic :- COMPUTER BASICS Subject :- COMPUTER BASICS Class :- I Semester BCA

Module 1 Concepts of Information and Communication Technology (ICT)

Intentionally Blank 0

OCR J276 (9-1) GCSE Computer Science

The City School Liaquat Campus Worksheet Module 3 Class 7 Name Class/Sec Date

CMSC 104 -Lecture 2 John Y. Park, adapted by C Grasso

Functional Skills. Level 2. IT Basics Learning Resource Task 1. Microsoft product screen shot(s) reprinted with permission from Microsoft Corporation.

The Programming Process Summer 2010 Margaret Reid-Miller

AQA GCSE Computer Science PLC

Computer Fundamentals

Mon 21 Oct - Internet security Mon 25 Nov - Looking after your computer: Mon 27 Jan - Using Mon 24 Feb - Office software Mon 24 Mar - Managing

BACK TO BASICS PART I. Hardware & it s Associated Terminology

Backing Storage Media

What is Data Storage?

GIRLS SECONDARY, L-IMRIEĦEL HALF YEARLY EXAMINATIONS 2015/2016

KULLEĠĠ SAN BENEDITTU Secondary School, Kirkop

Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall

BCS IT User Syllabus ECDL Unit 2 Using the Computer and Managing Files/IT User Fundamentals Level 1. Version 5.0

4) Apple's OS X and Microsoft Windows are examples of software. A) utility B) application C) operating system D) communication

Introduction to Computers

1. Yes, data refers to raw, unprocessed facts. Computers take data and process it into useful information.

Quali cations. Forename(s) Surname Number of seat

CSC 170 Fall 2017 Dr. R. M. Siegfried. Study Guide for Final Exam

Stonelaw High School. Computing Science. BGE - Computer Systems

Chapter 6 Network and Internet Security and Privacy

GCSE ICT AQA Specification A (Full Course) Summary

TECHNOLOGY IN ACTION. Chapter 2. Alan Evans * Kendall Martin * Mary Anne Poatsy. Looking at Computers: Understanding the Parts

Computing at Cox Green Curriculum Plan. Key Stage 3 Year 7

What is the typical configuration of a computer sold today? 1-1

Angel International School - Manipay 2 nd Term Examination March, 2016 Computing

INFORMATION SYSTEM PARTS AND COMPUTER TYPES

Sahalsoftware college. Welcome To understanding Basic Computer Concept

2) Computers use a language consisting of 0s and 1s. A) symbol B) binary C) byte D) system

Programming Principles and Techniques

8. A is approximately one billion bytes a. Kilobyte b. Bit c. Gigabyte d. Megabyte 9. SMPT, FTP and DNS are applications of the layer a. Data link b.

True/False Indicate whether the statement is true or false. Bubble A for True and B for False

True/False Indicate whether the statement is true or false. Bubble A for True and B for False

Edexcel GCSE in Computer Science Microsoft IT Academy Mapping

Cambridge Nationals R001. Revision help (LO1)

Form 3. Half Yearly Exam Revision

Parts are adapted from Windows 98 by Mark Twain Media, Inc. A Computer System has Hardware and Software

ST. MARY S COLLEGE FORM 4

B. In recent years Teleworking became more popular. Briefly explain the meaning of Teleworking. Working from home (accept similar answer)

Introduction. Arizona State University 1

Which type of computer is used to operate large corporate systems and databases

Chapter 1: Why Program? Computers and Programming. Why Program?

Technologies 1ºESO. Unit 2. Hardware and software. Name Nº Class. After having explained page 26 of your book:

Copyright 2006 Prentice-Hall. All rights reserved. 1

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Explain why data is represented in computer systems in binary form

Functional Skills. Entry 3 to Level 2. IT Basics Information

Lesson 1: Computer Concepts

An Overview of the Computer System. Kafui A. Prebbie 24

Year 8 Computing Science End of Term 3 Revision Guide

CHAPTER 1 TYPES & COMPONENTS OF COMPUTER SYSTEM

Terminology, Types of Computers & Computer Hardware

KULLEĠĠ SAN BENEDITTU Secondary School, Kirkop

2011 Francisco Delgadillo

Solve only 2 out of 3 questions

INTRODUCTION TO COMPUTERS

Computing Science: National 5 and Higher skills, knowledge and understanding

C H A P T E R 1. Introduction to Computers and Programming

Electricity: Voltage. Gate: A signal enters the gate at a certain voltage. The gate performs operations on it, and sends it out was a new signal.

Fundamental principles of computing

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

Understand the terms hardware, software, Software, Concepts Information Information Technology (IT). Technology Types of Computer

Computer is an electronic machine that can receive, store, transform and output data of all kinds (image, text, numeric, graphics and sound).

Unit 3 Part B. Computer Storage. Computer Technology

Form 4 ICT Literacy Modules Methodist Boys School Kuala Lumpur 1.0 PROCESSING DATA

1- What is a computer?

Community Development and Training Centre Semester IT 245 Management Information Systems

Types of Data. PE 231 Education Media AND Technology. Information. Assessment. Information Concepts

Unit 2: Technology Systems

Components of a Computer System

St. Benedict s High School. Computing Science. Software Design & Development. (Part 2 Computer Architecture) National 5

Transcription:

Revision 1 1. Convert the following decimal numbers to binary using the table below. 128 64 32 16 8 4 2 1 22 0 0 0 1 0 1 1 0 144 1 0 0 1 0 0 0 0 73 0 1 0 0 1 0 0 1 2. How does a computer represent characters in a computer system? ASCII or Unicode 3. Calculate the backing storage required for a 16-bit colour image 1600 pixels by 900 pixels. Give your answer in megabytes. Show your working below. 2.7 Mb 4. Explain the difference between a compiler and an interpreter. Compiler translates high level language into machine code all at once. Interpreter does this one line at a time. Line 1 RECEIVE age FROM (INT) KEYBOARD Line 2 WHILE age < 18 OR age > 65 DO Line 3 SEND Error: Re-enter age 18-65 TO DISPLAY Line 4 RECEIVE age FROM (INT) KEYBOARD Line 5 END WHILE Read the code above. 5. What kind of loop is used in the above program? Conditional loop 6. What standard algorithm is this? Input validation 7. What data type is the variable age? Integer 8. Describe what happens when a user enters their age as 10? The user will get an error message and be asked to re-enter their age. This will continue to repeat until the age is between 18 and 65.

Revision 2 1. Describe what the code below does. SET age TO 15 Assigns the value 15 to the variable age SET name TO Samantha Assigns the value Samantha to the variable name SET total TO salary - tax Assigns the value of salary -tax to the variable total 2. Jack has created a program to record his test results. His tests are out of 10. The maximum mark Jack could achieve is 10 and the lowest is 0. Jack will test his program using normal, extreme and exceptional test data. State appropriate test data below. Normal 2-9 Extreme 0 or 10 Exceptional <0 or >10 3. Jack's program has came up with an error saying a variable name is not defined. This probably means the variable name has been spelt wrong. What type of error is this? Syntax error 4. What is the difference between a fixed loop and a conditional loop? A fixed loop is set to repeat a set amount of times by the programmer in advance. A conditional loop will keep repeating until a condition is met. 5. What is the difference between a simple condition and a complex condition? A simple condition is when there is only one condition to be met. A complex condition will involve 2 or more conditions to be met.

Revision 3 1. Describe one advantage of using linked tables. Avoids data duplication 2. When ordering clothes online, users select their choice the following drop down menu: This is a restricted choice. State one advantage of this type of interface. Avoids human error or quicker as they can select an option very quickly. 3. Describe what a database is. A database is an organised collection of information. This information can be sorted and searched easily. 4. State the three parts the processor is made up from. ALU, Control Unit and Registers 5. What job does the ALU perform? To deal with comparisons. To carry out the calculations. 6. When signing up to Facebook you must enter an email address. What type of validation should be used on this field? Presence check 7. What type of validation is used when a cost has to be between 100 and 200? Range check >= 100 and <= 200 8. What type of validation is used when a password has to be greater than or equal to 8 characters long? Length check >=8

Revision 4 1. A computer program is created to store data about the total number of pupils who pass an exam. State the most suitable data type for the total. Integer 2. State what data type would be used if the only two possible values could be true or false? Line 4 Line 5 Line 6 Line 7 Line 8 SET password TO h1gh@sch001 REPEAT SEND Please enter your password TO DISPLAY RECEIVE user_guess FROM (STRING) KEYBOARD UNTIL password = user_guess 3. Read the code above and explain the purpose of lines 5 to 8 in this pseudocode. To make sure the password that is entered is correct before proceeding. 4. State what URL stands for. Uniform resource locator 5. A URL is split up into three parts. State the names of the three parts. Protocol, Server, Organisation 6. Describe the difference between an internal link and an external link. An internal link will take you to a page on the same website. An external link will take you to a different website with a different domain. 7. Web browsers such a Google Chrome and Internet Explorer are used to view web pages. State one other feature of a web browser. Bookmarks/favourites, history, forward/back buttons, home button, extensions/plugins 8. Explain the three main steps of how a search engine, such as Google or Bing, works. The user enters keywords or phrases on the subject that they are interested in. The search engine searches its database looking for references to the key words. It then returns web pages with links to the relevant websites it found.

Revision 5 1. The above design should show the type of data being entered by keyboard in Lines 2, 3 and 5. State the most appropriate data types for the following variables. numberofchickens priceperkilo fullprice Integer Real number Boolean 2. State the lines of pseudocode that contain conditional statements (if statements).

Line 6 and Line 9 3. State the part of the processor that compares the values in the conditional statements and carries out the logical thinking. ALU 4. The program is later improved to store the totalprice for each month of a year. State the data structure that would be required to store the list of totalprice values. Array 5. State the type of loop required to repeat the code in lines 1 to 12 for each month of the year. Explain why this type of loop would be used. Type of Loop Explanation Fixed loop We know in advance it will repeat each month. There are 12 months in a year so can set it to repeat that amount.

Revision 6 1. What does HTML stand for? Hyper Text Markup Language 2. What is HTML used for? Its used to deisgn the structure of web pages. 3. What is JavaScript used for? JavaScript is used to add interactivity to a website. 4. Explain the difference between an expert user and a novice user. An expert user will use the software/info system to its full potential. They will utilise all its features. A novice user will stick to the basics and will not want information overload. Novice users may use wizards to help them to certain tasks. 5. A novice user may use a wizard to perform a complex operation. Describe what a wizard is. A wizard is used to guide a user step by step through a complex operation. 6. Calculate the backing storage required for a 8-bit colour image 600 pixels by 800 pixels. Give your answer in Kilobytes and show your working below. 468.8 Kb 7. Convert the following decimal numbers to binary using the table below. 128 64 32 16 8 4 2 1 45 0 0 1 0 1 1 0 1 77 0 1 0 0 1 0 1 1 234 1 1 1 0 1 0 1 0 7. Convert the following binary numbers to decimal using the table below. 128 64 32 16 8 4 2 1 58 0 0 1 1 1 0 1 0 158 1 0 0 1 1 1 1 1 229 1 1 1 0 0 1 0 1

Revision 7 1. The company has received complaints from some customers that the website is difficult to use on their tablet or smartphone. Identify two reasons why the webpage above would be unsuitable for such portable devices. Reason 1 Navigation bar does not fit across small screen Too many columns Too much information for small screen Icons too small to click on right hand side Reason 2 Would take too long to load images on portable device 2. State two standard file formats for text. TXT and RTF 3. State two standard file formats for audio. WAV and MP3 4. State two standard file formats for video.

MP4 and AVI 5. Describe what a standard file format is. A standard file format is when a file is saved in a format that can be opened by many different applications and they are able to understand it. 6. State two input devices and two output devices below. Input Devices Output Devices Mouse Keyboard Touchpad Touch screen Scanner Digital camera / webcam Printer Monitor Projector Speakers 7. State what ROM stands for. Read Only Memory 8. State what RAM stands for. Random Access Memory 9. Describe two differences between RAM and ROM. RAM Data held in RAM can be changed All data in RAM is lost when the power is switched off ROM Data is stored permanently in ROM, Data is not lost when the power goes off Data in ROM cannot be changed

Revision 8 1. State the units of storage in order starting from Bit up to Terabyte below. Bit Byte Kilobyte Megabyte Gigabyte Terabyte 2. State one advantage of using a 8GB USB Pen Drive to store photographs on. USB pen drives are light and portable. They can be re-written to and 8GB is enough to store many photos. 3. Describe the difference between a DVD-R and DVD-RW. DVD-R can only be written to once with data. DVD-RW can be rewritten to. 4.State what LAN stands for. Local Area Network 5. State what WAN stands for. Wide Area Network 6. State one advantage and one disadvantage of using local storage. Advantages You have 100% control over the data. Very affordable, especially for large amounts of data. External hard drives come quite cheap these days. No internet connection required. Disadvantages Just like your primary hard drive, external media can fail as well. Possible theft No data access on-the-go unless you bring the media with you which might be too bulky.

7. State one advantage and one disadvantage of using cloud storage. Advantages Some services offer a basic free version, such as Dropbox (2 GB) and OneDrive (25 GB) Available anywhere there s an internet connection without having to carry anything extra Third parties handle taking care of the hardware so no worries about storing external media in a safe place Disadvantages Internet connection required. Depending on a third party that you have no control over. The third party might randomly shut down due to financial hardships or other unforeseen circumstances. Often can be more expensive if you need to store large amounts of data.

Revision 9 1. Describe what a keylogger does. They monitor and store a record of every keystroke made on the computer. This data may then be sent to a remote server without your knowledge. 2. Describe what phishing is. Phishing is a form of online fraud where criminals aim to steal valuable information such as credit cards, user IDs and passwords for bank accounts. They set up a fake website which looks identical to a legitimate company such as a bank or insurance company. They then try to trick people into logging into the site and giving their account details and security codes. 3. Describe what identity theft is. Identity theft is where criminals obtain personal information such as your date of birth, bank account numbers, your mother's maiden name, your pet's name and so on. They then use this information to impersonate you. 4. Describe what a DOS attack is. A Denial of Service attack is when the server is overwhelmed by millions of rogue requests being sent to it, effectively using up all its resources and denying normal service for legitimate users. 5. Describe what would make a password more secure. Contain a mixture of letters, numbers and symbols. 6. Describe why encryption makes communication more secure. Encryption means to scramble a message in such a way that only the people who are meant to read it can do so.

Revision 10 1. If I logged into another person's account in school, what law am I breaking? Computer Misuse Act 2. If I installed a virus on another person's computer, what law am I breaking? Computer Misuse Act 3. State the name of the law that is used to give legal rights to people who have information stored about them? Data Protection Act 4. State the name of the law that covers illegal downloading of music and videos if you do not have the permission to do so. Copyright Designs & Patents Act 5. Copying and pasting an image from a website without the owner's permission would be breaking what law? Copyright Designs & Patents Act 6. State the name of the law you would be breaking if you are using your neighbours WiFi without their permission. Communications Act 7. People can suffer a repetitive strain injury (RSI) from working on computer for a long period of time. Suggest one way the risk of this happening can be reduced. The risk can be reduced by taking regular breaks, using an ergonomic keyboard and using wrist rests.