10
75 Days 74 Days 73 Days Draw a diagram showing the components of a Computer System. If it takes 8 bits to store an ASCII character… How many bytes does the word ‘PROCESSOR’ take to store? When talking about Storage, what is meant by the term Volatile? Give an example. Identify and explain the following Programming Constructs? S_ _ _ _ _ _ _ S_ _ _ _ _ _ _ _ I_ _ _ _ _ _ _ _ With regards to capacity, durability, speed and portability, compare 3 storage devices. Define the following terms: Variable Opcode Operand Constant Array 72 Days 71 Days 70 Days What is meant by the following terms? Use examples to help you: Phishing Malware Denial of Service Brute Force def Birthday(Age): Age+=1 return Age Age_now = Birthday(12) print(Age_now) What will be printed when this code is executed? Bullet point the steps of this program. Explain what is meant by the term “Physical Security. Explain using examples what Abstraction is? Why is this important? List the components of the Von Neumann CPU architecture. What is meant by the following terms: Validation Verification Authentication Iterative Testing Final/Terminal Testing 69 Days 68 Days 67 Days Define the 3 different storage technologies, give examples of their use. Sort the following list of numbers using a Bubble Sort, making sure that you write down Bullet point the steps in the Fetch - Decode - Execute Cycle. Explain what a Syntax Error is making sure that you give an example of a Syntax Error. What are the main differences between RAM and ROM? If black is stored as 00 and white is stored as 01. What is the following image?

  · Web view75 Days. 74 Days. 73 Days. Draw a diagram showing the components of a Computer System. If it takes 8 bits to store an ASCII character… How many bytes does the word

Embed Size (px)

Citation preview

Page 1:   · Web view75 Days. 74 Days. 73 Days. Draw a diagram showing the components of a Computer System. If it takes 8 bits to store an ASCII character… How many bytes does the word

75 Days 74 Days 73 Days

Draw a diagram showing the

components of a Computer System.

If it takes 8 bits to store an ASCII character…

How many bytes does the word ‘PROCESSOR’

take to store?

When talking about Storage, what is meant by the term Volatile?

Give an example.

Identify and explain the following Programming

Constructs?S_ _ _ _ _ _ _

S_ _ _ _ _ _ _ _I_ _ _ _ _ _ _ _

With regards to capacity, durability,

speed and portability, compare 3 storage

devices.

Define the following terms:

VariableOpcodeOperandConstant

Array72 Days 71 Days 70 Days

What is meant by the following terms? Use examples to help you:

PhishingMalware

Denial of ServiceBrute Force

def Birthday(Age): Age+=1 return AgeAge_now = Birthday(12)

print(Age_now)What will be printed

when this code is executed?

Bullet point the steps of this program.

Explain what is meant by the term “Physical

Security.

Explain using examples what Abstraction is?

Why is this important?

List the components of the Von Neumann CPU

architecture.

What is meant by the following terms:

ValidationVerification

AuthenticationIterative Testing

Final/Terminal Testing

69 Days 68 Days 67 Days

Define the 3 different storage technologies, give examples of their

use.

Sort the following list of numbers using a Bubble Sort, making sure that

you write down the steps you have

performed.2 5 4 3 1

Bullet point the steps in the Fetch - Decode -

Execute Cycle.

Explain what a Syntax Error is making sure

that you give an example of a Syntax

Error.

What are the main differences between

RAM and ROM?

If black is stored as 00 and white is stored as

01. What is the following image?

000100000100000100010001010001000100000100000100000100

66 Days 65 Days 64 Days

Define the term “Virtual Memory”.

Explain the following SQL statement:

FROM Films SELECT *WHERE ReleaseYear >

2010

Suggest 3 ways of upgrading the

performance of a Computer, explain why

your suggestion will improve performance.

Using a flowchart or pseudocode write an

algorithm for a program that prints all the

numbers between 1 and 100.

What is Cache? Explain its purpose.

List the different data types available.

Provide an example for each.

Page 2:   · Web view75 Days. 74 Days. 73 Days. Draw a diagram showing the components of a Computer System. If it takes 8 bits to store an ASCII character… How many bytes does the word

63 Days 62 Days 61 Days

Explain how the CPU and RAM work

together.You could use a

diagram if you think that would help you.

Explain what a Logic Error is, making sure

that you give an example of a Logic

Error.

Give 5 rules that people should follow when creating passwords.

Explain using examples what Decomposition is?

Why is it important?

Explain what the following CPU parts do?

AccumulatorProgram Counter

ALUMARMDR

What is the best search method for finding the number 7 in this list? Explain your answer:

9 3 2 4 5 6 7 8 1 10

Page 3:   · Web view75 Days. 74 Days. 73 Days. Draw a diagram showing the components of a Computer System. If it takes 8 bits to store an ASCII character… How many bytes does the word

60 Days 59 Days 58 Days

Using examples, what is meant by the term

“Cores”? How do they affect the performance

of a CPU?

Describe using the following terms how sound is stored on a

computer:Sample Rate Amplitude

Bit rateBit depth

Describe what is meant by hardware and software and give

2 examples of each.

How many different colours can be stored

using: A bit?

A nibble? A byte?

Describe what is meant by an embedded system. Give an example of an

embedded system.

Draw the logic diagram for the statement NOT

(A and B).

Create a Truth Table for this statement.

57 Days 56 Days 55 DaysWhat is the job of the

Memory Address Register (MAR) and the Memory Data Register

(MDR)?

Explain using an example of how data is stored in, and accessed

from an Array.

Define primary, secondary and tertiary

storage and give an example of each.

What is an overflow error? How do they

occur? Use an example to help you explain your

answer.

What is a checksum?What is a check digit?Why and where are

they used?

What features are there in IDLE that aid in the

writing of Python programs?

54 Days 53 Days 52 Days

What are the factors that affect the

performance of a CPU?

Convert 36 from Hexadecimal to binary.

List the common protocols encountered

when using the Internet and Email.

What is 5C converted from Hex to Binary and

Denary?

Define the term “Operating System”?

What is the purpose of an Operating System?

Add 10100100 to 0100110

Show your working.

51 Days 50 Days 49 DaysHow many bits are in:

A Nibble?A Byte?

How many bytes are in:A Kilobyte?

A Megabyte?A Gigabyte?A Terabyte?A Petabyte?

Explain how digital images are stored,

make sure you include: Bit Depth, Resolution,

Pixels.

Place these in order of capacity from smallest

to largest:CD, 32GB Flash Drive,

Blu-Ray,1TB HDD, 512MB SD card

What is 11010010 converted to Denary

and Hex?What is 11111111

converted to Hexadecimal?

What is 0F in binary?

List the most common system security threats and the methods used

to counteract them.

Write a pseudocode program that simulates 3 hands of Rock, Paper,

and Scissors.

Use Loops & IF statements.

48 Days 47 Days 46 DaysWhat is a client server

and peer to peer network and where you

Draw the common flowchart symbols used for Algorithms, explain

What is the difference between a WAN and a

LAN?

Explain why a programmer would use

Hexadecimal.

Describe what is meant by the terms “DNS”, “Hosting” and “The

What can programmers do to their code in

order to make it easier

Page 4:   · Web view75 Days. 74 Days. 73 Days. Draw a diagram showing the components of a Computer System. If it takes 8 bits to store an ASCII character… How many bytes does the word

might see them? Give one advantage and

disadvantage of each.

what each symbol is used for and give an

example of usage showing your

understanding.

Cloud”. to maintain?

Page 5:   · Web view75 Days. 74 Days. 73 Days. Draw a diagram showing the components of a Computer System. If it takes 8 bits to store an ASCII character… How many bytes does the word

45 Days 44 Days 43 Days

List three things that a data packet contains.

Draw a Truth Table for:ANDOR

NOTA = (B AND C) NOT D

List the 4 layers of network protocols. Give three reasons why we divide protocols into

layers.

Describe how a linear search algorithm works.

Describe what is meant by utility software. Give two examples of utility

software.

A user has a list of names stored in a list. Write an algorithm in pseudocode to check

whether a certain name is on the list.

42 Days 41 Days 40 DaysState the difference between proprietary

and open source software. Given an

advantage and disadvantage for each.

Describe the stages of a binary search on a list

of items sorted in ascending order.

Discuss how network and password policies

can reduce the security threats posed by users.

Describe the stages of insertions sort

algorithm as it sorts data into an ascending

order.

Explain the role of penetration testing in

assessing network security.

Write a list of 7 numbers. Using insertion sort, put

the data into an ascending order. Make

sure you show each stage.

39 Days 38 Days 37 DaysWhat is a stakeholder?

Identify who the stakeholders would be

in the release of the new iPhone.

Describe how a merge sort works. Explain the advantage of using this

technique.

List three rights that people have regarding the data that is stored

about them.

Explain what is meant by the term “trace

tables”.

Explain what is meant by the term “digital

divide”.

Provide 3 reasons why you would add

comments into your code.

36 Days 35 Days 34 Days

Describe what is held in the Memory Address

Register (MAR).

Create an algorithm to represent a merge sort.

Explain the role of the Program Counter.

State why variables and constants should be

given meaningful names.

List three common characteristics of CPU’s

that affect their performance.

Create an algorithm to represent a bubble sort.

33 Days 32 Days 31 Days

Discuss the advantages and disadvantages of an embedded system.

Describe what is meant by the term “iteration”?What are the two types

of iteration loops?

State three checks that the BIOS carries out at

start-up.

Create an algorithm to represent an insertion

sort.

Discuss the role of ROM in a computer system.

When you convert from one data type to

another it is known as what? Why would you

do this?

Page 6:   · Web view75 Days. 74 Days. 73 Days. Draw a diagram showing the components of a Computer System. If it takes 8 bits to store an ASCII character… How many bytes does the word

30 Days 29 Days 28 Days

Explain the benefit of virtual memory.

Write an algorithm that prompts the teacher to enter a mark and then display the appropriate

comment: Excellent, Very Good,

Good, Satisfactory andUnsatisfactory.

Give two reasons, with appropriate examples,

of why secondary storage is needed.

A number trick asks you to think of a number,

double it, add six, divide it in half and then subtract the

number you started with. Write pseudocode

to represent this.

Give two advantages and two disadvantages of solid-state storage.

A user wants to write the names and scores of students to a text

file. Write the pseudocode for this.

27 Days 26 Days 25 Days

Define the term “LAN”.

Explain what is meant by a subprogram.

Describe two advantages to a

programmer of using subprograms.

Give two advantages and two disadvantages

of magnetic storage.

State the difference between functions and

procedures.

Define the term “WAN”.

Explain the difference between IF statement

and Switch-CaseStatement.

24 Days 23 Days 22 Days

Give two advantages and two disadvantages

of optical storage.

An alarm system uses three switches, A B C. Switch C is the master switch and the alarm

will not sound unless it is on. The alarm will

then sound when either switches A or B are on.Draw a logic diagram

for this.

Give 3 features of a star network.

Describe two advantages for a

programmer of writing programs in a high-level

language.

Give 3 features of a mesh network.

Describe two advantages for a

programmer of writing programs in a low-level

language.

21 Days 20 Days 19 Days

Give 2 advantages of a client-server network.

Outline one advantage and one disadvantage

of each method for programmers and

users:Compiler and

Interpreter

Give 2 disadvantages of a client-server network.

Why is it important for programs to have a defensive design?

Give 2 advantages of a peer-to-peer network.

A file has a size of 72000000000 bits.

Calculate the file size in megabytes and

gigabytes. Show your working.

Page 7:   · Web view75 Days. 74 Days. 73 Days. Draw a diagram showing the components of a Computer System. If it takes 8 bits to store an ASCII character… How many bytes does the word

18 Days 17 Days 16 Days

Give 2 disadvantages of a peer-to-peer network.

Convert the decimal number 199 into an 8-

bit binary number. Show your working

Explain the role of a router in a network.

Explain what is meant by a binary shift.

Describe the purpose of a NIC.

Complete a 2 place left shift on the binary number 10101011.

Page 8:   · Web view75 Days. 74 Days. 73 Days. Draw a diagram showing the components of a Computer System. If it takes 8 bits to store an ASCII character… How many bytes does the word

15 Days 14 Days 13 Days

Discuss the advantages and disadvantages of

wireless networks.

State the effect of performing a

2 place right shift on a binary number.

Explain the role of the DNS server.

Convert the 8-bit binary number 11010101 and

10111101 into hexadecimal number. Show your working.

Describe the advantages of using

cloud computing.

Unicode can be used to represent text in a computer system.

Explain the difference between the character

sets of Unicode and ASCII.

12 Days 11 Days 10 Days

Define the term “Ethernet”.

Describe the difference between lossless and

lossy compression.

Explain the difference between a MAC

address and an IP address.

Describe an advantage of compressing files.

Describe the function of TCP and IP protocols.

An image has the following properties: width = 2000 height

= 3000 colour depth = 24. Calculate the file size of this image in

megabytes. Show your working.

9 Days 8 Days 7 Days

Explain how data packets travel.

State what is meant by sampling frequency.

Describe the benefits of using network layers.

Describe the effect of increasing the sampling

frequency.

Give three advantages of packet switching.

Define what is meant by the “bit-rate” of a

recording and explain how it can be calculated.

6 Days 5 Days 4 Days

Define “Network Forensics”.

One type of testing is iterative. Describe iterative testing.

List six features that an operating system

includes.

When entering user input into a program,

we often use validation. What is validation and

what does it do?

Describe how an operating system

manages memory.

If Rebecca decides to use a high-level

programming language, why will she need a

translator?3 Days 2 Days 1 Day

Define the term “character set” and give

two examples.

A tablet receives sound from a microphone.

Explain how the tablet converts the sound to a

file.

Explain how the following list of

numbers is sorted using a merge sort: 54 26 93 17

When programming, there are three basic

constructs that we can use to control the flow of the program. Name,

describe and give an

Explain why we test programs.

Explain why data are represented in binary form for a computer system rather than using denary form.

Page 9:   · Web view75 Days. 74 Days. 73 Days. Draw a diagram showing the components of a Computer System. If it takes 8 bits to store an ASCII character… How many bytes does the word

example of each.