Year 11
20 questions - revision 2
20 questions – go away and research
1. What is 3C in denary?(Times by sixteen and then the number representing C)
2. Add 4 to 00000011 =
3. Which of these is not a computational model?
(a) Multi Agent
(b) Sequential
(c) Parallel
(d) Fetch – decode – execute
4. The individual ID code on a Network Interface Card is known as the
(a) Interface location
(b) MAC address
(c) IP address
(d) TCP IP
5. This detects physical conditions (sound, light, movement that kind of thing)
(a) Actuator
(b) Motor
(c) Server
(d) Sensor
6. This is a very small computer (contains a CPU, RAM, input and output devices)
(a) Sensor
(b) CPU
(c) Micro-controller
(d) Flash memory card
7. This is used to move or control a mechanism or system
(a) Actuator
(b) RAM
(c) Sensor
(d) CPU
8. Name 3 types of network media
9. These are functions of an operating system – which is not…
(a) File management
(b) Memory management
(c) Device management
(d) Drilling for oil
10. This is the structure for an SQL statement
(a) SELECT, FROM, WHERE, ORDER BY
(b) FROM, ORDER BY, WHERE, SELECT
(c) FROM, SELECT, ORDER BY, WHERE
(d) ORDER BY, SELECT, WHERE, FROM
11. JPEG, MP3, MPEG file formats are all examples of:
(a) Encryption
(b) Lossy Compression
(c) Lossless compression
(d) Interpolation
12. When parity checking – If I wanted to create EVEN parity what would I add to 0000111
(a) 1
(b) 0
(c) +
(d) –
13. This kind of machine is an emulation of a computer system sitting inside another
(a) In built machine
(b) Virtual machine
(c) Quantum machine
(d) Private machine
14. In the natural world everything is continuous and infinite – this is:
(a) Virtual
(b) Lovely
(c) Sequential
(d) Analogue
15. When you break up this continuous and infinite(ness) into binary bits it becomes:
(a) Analogue
(b) Digital
(c) Conversion
(d) Metadata
16. A language used for describing the look and formatting of a document written in HTML is:
(a) The Style
(b) The Format list
(c) The Protocol page
(d) The CSS sheet
17. Which of these is not a type of validation?
(a) Presence check
(b) Intelligence check
(c) Range check
(d) Length check
(e) Format check
18. When computers establishes what protocol to use to control the data from one machine to another is:
(a) Handshaking
(b) Client-Server model
(c) Markup
(d) Web Address
19. The set of rules that governs the transmission of data between computers is:
(a) The Address
(b) The Client
(c) The CCS sheet
(d) The Protocol
20. The server sends – the client ____
(a) Requests
(b) Waits
(c) Searches
(d) Uses
1. What is 3C in denary?(Times by sixteen and then the number representing C)
2. Add 4 to 00000011 =
3. Which of these is not a computational model?
(a) Multi Agent
(b) Sequential
(c) Parallel
(d) Fetch – decode – execute
4. The individual ID code on a Network Interface Card is known as the
(a) Interface location
(b) MAC address
(c) IP address
(d) TCP IP
5. This detects physical conditions (sound, light, movement that kind of thing)
(a) Actuator
(b) Motor
(c) Server
(d) Sensor
6. This is a very small computer (contains a CPU, RAM, input and output devices)
(a) Sensor
(b) CPU
(c) Micro-controller
(d) Flash memory card
7. This is used to move or control a mechanism or system
(a) Actuator
(b) RAM
(c) Sensor
(d) CPU
8. Name 3 types of network media
9. These are functions of an operating system – which is not…
(a) File management
(b) Memory management
(c) Device management
(d) Drilling for oil
10. This is the structure for an SQL statement
(a) SELECT, FROM, WHERE, ORDER BY
(b) FROM, ORDER BY, WHERE, SELECT
(c) FROM, SELECT, ORDER BY, WHERE
(d) ORDER BY, SELECT, WHERE, FROM
11. JPEG, MP3, MPEG file formats are all examples of:
(a) Encryption
(b) Lossy Compression
(c) Lossless compression
(d) Interpolation
12. When parity checking – If I wanted to create EVEN parity what would I add to 0000111
(a) 1
(b) 0
(c) +
(d) –
13. This kind of machine is an emulation of a computer system sitting inside another
(a) In built machine
(b) Virtual machine
(c) Quantum machine
(d) Private machine
14. In the natural world everything is continuous and infinite – this is:
(a) Virtual
(b) Lovely
(c) Sequential
(d) Analogue
15. When you break up this continuous and infinite(ness) into binary bits it becomes:
(a) Analogue
(b) Digital
(c) Conversion
(d) Metadata
16. A language used for describing the look and formatting of a document written in HTML is:
(a) The Style
(b) The Format list
(c) The Protocol page
(d) The CSS sheet
17. Which of these is not a type of validation?
(a) Presence check
(b) Intelligence check
(c) Range check
(d) Length check
(e) Format check
18. When computers establishes what protocol to use to control the data from one machine to another is:
(a) Handshaking
(b) Client-Server model
(c) Markup
(d) Web Address
19. The set of rules that governs the transmission of data between computers is:
(a) The Address
(b) The Client
(c) The CCS sheet
(d) The Protocol
20. The server sends – the client ____
(a) Requests
(b) Waits
(c) Searches
(d) Uses
Year 11
20 questions - revision 1
1. An error given by a fault in the language of the written code:
(a) Syntax
(b) Logic
(c) Runtime
(d) Interrupt
2. The state in which data is exactly what it should be:
(a) Integrity
(b) Source
(c) Meaning
(d)Construct
3. A High level language:
(a) Python
(b) Machine code
(c) Assembly code
(d) Multi thread
4. A section of the hard disk used as if it were RAM to supplement the amount of main memory available to the computer:
(a) Dynamic memory
(b) TCP/IP
(c) Network Interface Card
(d) Virtual memory
5. Where letters in words are rearranged to hide the original words
(a) Client
(b) Cypher
(c) Cryptic
(d) Chronic
6. Piece of software for testing errors in a program
(a) Debugger
(b) Data checker
(c) Validation
(d) Verification
7. Process of checking data as it is input to make sure that it is reasonable
(a) Verification
(b) Validation
(c) Variable
(d) Varience
8. Arrangement of devices on a network
(a) Network config
(b) Topology
(c) Translator
(d) Topography
9. This provides services to clients
(a) Client base
(b) Topology
(c) Server
(d) Switch
10. An instruction in binary used by the CPU
(a) Machine code
(b) High level code
(c) Hexadecimal
(d) Assembly code
11. This is part of the computers architecture and transfers; data, address control signals between components.
(a) Arc
(b) Bus
(c) ALU
(d) BNC
12. A programming construct that is executed until a condition is met.
(a) Selection
(b) Sequence
(c) Iteration
(d) Cycle
13. A number that identifies a device on the network
(a) IP address
(b) TCP / IP
(c) HTTPS
(d) FTP
14. A text based system for defining webpages
(a) VOIP
(b) HTTP
(c) HTML
(d) FTP
15. A database that consists of one table
(a) Single file
(b) Flat file
(c) Relational
(d) Standard file
16. A number that can have decimal or fractional parts
(a) Real
(b) Integer
(c) Float
(d) Character
17. A store for data in a computer that cannot be overwritten
(a) RAM
(b) HDD
(c) ROM
(d) CPU
18. All the data about one item in a database
(a) Primary Key
(b) Field
(c) Record
(d) Relationship
19. A simple set of instructions that defines how a task is performed
(a) Sequence
(b) Algorithm
(c) Procedure
(d) Function
20. This links the CPU to the memory and all other components
(a) Bus
(b) Motherboard
(c) Architecture
(d) Serial
(a) Syntax
(b) Logic
(c) Runtime
(d) Interrupt
2. The state in which data is exactly what it should be:
(a) Integrity
(b) Source
(c) Meaning
(d)Construct
3. A High level language:
(a) Python
(b) Machine code
(c) Assembly code
(d) Multi thread
4. A section of the hard disk used as if it were RAM to supplement the amount of main memory available to the computer:
(a) Dynamic memory
(b) TCP/IP
(c) Network Interface Card
(d) Virtual memory
5. Where letters in words are rearranged to hide the original words
(a) Client
(b) Cypher
(c) Cryptic
(d) Chronic
6. Piece of software for testing errors in a program
(a) Debugger
(b) Data checker
(c) Validation
(d) Verification
7. Process of checking data as it is input to make sure that it is reasonable
(a) Verification
(b) Validation
(c) Variable
(d) Varience
8. Arrangement of devices on a network
(a) Network config
(b) Topology
(c) Translator
(d) Topography
9. This provides services to clients
(a) Client base
(b) Topology
(c) Server
(d) Switch
10. An instruction in binary used by the CPU
(a) Machine code
(b) High level code
(c) Hexadecimal
(d) Assembly code
11. This is part of the computers architecture and transfers; data, address control signals between components.
(a) Arc
(b) Bus
(c) ALU
(d) BNC
12. A programming construct that is executed until a condition is met.
(a) Selection
(b) Sequence
(c) Iteration
(d) Cycle
13. A number that identifies a device on the network
(a) IP address
(b) TCP / IP
(c) HTTPS
(d) FTP
14. A text based system for defining webpages
(a) VOIP
(b) HTTP
(c) HTML
(d) FTP
15. A database that consists of one table
(a) Single file
(b) Flat file
(c) Relational
(d) Standard file
16. A number that can have decimal or fractional parts
(a) Real
(b) Integer
(c) Float
(d) Character
17. A store for data in a computer that cannot be overwritten
(a) RAM
(b) HDD
(c) ROM
(d) CPU
18. All the data about one item in a database
(a) Primary Key
(b) Field
(c) Record
(d) Relationship
19. A simple set of instructions that defines how a task is performed
(a) Sequence
(b) Algorithm
(c) Procedure
(d) Function
20. This links the CPU to the memory and all other components
(a) Bus
(b) Motherboard
(c) Architecture
(d) Serial
Year 10
Homework - Networks
Exam preparation home study task.
Research the following to get a good understanding...
Split an A4 sheet in 2 / Make 2 columns : This is to be done BY HAND
Research the following to get a good understanding...
Split an A4 sheet in 2 / Make 2 columns : This is to be done BY HAND
What is a LAN?
Diagram? Why use them? Advantages? |
What is a VPN?
Diagram? Why use them? Disadvantages? |
Starting points:
Get on Youtube type in
http://computer.howstuffworks.com/vpn.htm http://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/14106-how-vpn-works.html
http://compnetworking.about.com/od/vpn/f/vpn_benefits.htm
http://www.techopedia.com/2/29090/networks/lanwanman-an-overview-of-network-types
Get on Youtube type in
http://computer.howstuffworks.com/vpn.htm http://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/14106-how-vpn-works.html
http://compnetworking.about.com/od/vpn/f/vpn_benefits.htm
http://www.techopedia.com/2/29090/networks/lanwanman-an-overview-of-network-types
What MUST be included: How are they interlinked?
What is a computer? Input, process and output? Definition?
Hardware? Different elements in a comp? Bus?
Software?
Operating software? What does it do? Its main functions?
The CPU? Clock speed? Whats inside? Limitations?
Memory (reading and writing process)
Input and output devices? Name some?
Different types of data storage?
Stored program concept?
Fetch – decode – execute cycle?
Homework 1
•4 pieces of programming code (that work) that demonstrate the use of constants and variables.
•Annotate each code to show constants and variables + data types you have assigned.
•Show me evidence by next week that you have completed at least 20% of code academy
Homework 2
•Revise for programming and theory assessment
•What is a list / array used for?
•Evidence that you can create a list / array
•Evidence that you can write code to manipulate* a list / array
ROCK PAPER SCISSORS HWK
programming challenge
Create pseudocode, flowchart and a programmed solution (which I'd like to see work)
Create a Rock, Paper Scissors simulator that allows you to play against the computer...
(NO, I WAS NOT THINKING ABOUT ROCK PAPER SCISSORS SPOCK LIZARD)
The human player enters a choice
The computer RANDOMLY selects a choice
IF the two choices meet a criteria then RETURN a win or PRINT a message
This homework is based around work to do with SEQUENCE, SELECTION, ITERATION
IF, THEN ELSE constructs + ELIF (Case) constructs
EXTENSION:
Get the game to start again...
Keep score
THE PURPOSE OF THE HOMEWORK:
To get you, planning, problem solving, research + independently programming
See the sample python page for some sample code
The internet is a brilliant resource for learning python code