Professional Documents
Culture Documents
AQA GCSE Quizzing and Exam Questions Workbook
AQA GCSE Quizzing and Exam Questions Workbook
com
Workbook
h
ks
Ba
r
M
h
it
W
de
Co
Name: __________________________________________
1
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Contents
Chapter 3.1 – Fundamentals of Algorithms Quizzes.............................................7
3.1.1 – Representing algorithms quiz........................................................... 7
3.1.2 – Efficiency of algorithms quiz............................................................. 7
3.1.3 – Searching algorithms quiz.................................................................7
h
3.1.4 – Sorting algorithms quiz..................................................................... 7
ks
Chapter 3.1 – Fundamentals of Algorithms Exam Questions............................... 9
3.1.1..............................................................................................................9
Ba
3.1.2............................................................................................................12
3.1.3............................................................................................................14
r
3.1.4............................................................................................................16
M
Chapter 3.2 – Programming Quizzes.................................................................. 19
3.2.1 – Data types quiz............................................................................... 19
h
2
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.2.12 – Robust and secure programming quiz.......................................... 21
3.2.13 – Robust and secure programming quiz.......................................... 21
Chapter 3.2 – Programming Exam Questions.....................................................22
3.2.1............................................................................................................22
3.2.2............................................................................................................23
3.2.3............................................................................................................25
h
3.2.4............................................................................................................27
ks
3.2.5............................................................................................................29
Ba
Chapter 3.3 – Fundamentals of Data Representation Quizzes........................... 32
Quiz 1..........................................................................................................32
Quiz 2..........................................................................................................32
r
Quiz 3..........................................................................................................32
M
Quiz 4..........................................................................................................33
Chapter 3.3 – Fundamentals of Data Representation Exam Questions..............34
h
3.3.1............................................................................................................34
it
3.3.2............................................................................................................36
W
3.3.3............................................................................................................41
3.3.4............................................................................................................42
de
3.3.5............................................................................................................43
3.3.6............................................................................................................44
Co
3
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Quiz 4..........................................................................................................45
Chapter 3.4 – Computer Systems Exam Questions............................................ 47
3.4.1............................................................................................................47
3.4.2............................................................................................................49
3.4.3............................................................................................................51
h
3.4.4............................................................................................................52
ks
3.4.5............................................................................................................53
3.4.6............................................................................................................56
Ba
Chapter 3.5 – Fundamentals of Computer Networks Quizzes............................57
Quiz 1..........................................................................................................57
r
Quiz 2..........................................................................................................57
M
Quiz 3..........................................................................................................57
Chapter 3.5 – Fundamentals of Computer Networks Exam Questions.............. 59
h
3.5.1............................................................................................................59
it
3.5.2............................................................................................................61
W
3.5.3............................................................................................................63
3.5.4............................................................................................................66
Chapter 3.6 – Fundamentals of Cyber Security Quizzes..................................... 67
de
Quiz 1..........................................................................................................67
Chapter 3.6 – Fundamentals of Cyber Security Exam Questions....................... 68
Co
3.6.1............................................................................................................68
3.6.2............................................................................................................69
3.6.3............................................................................................................70
4
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Chapter 3.7 – Ethical, legal and environmental impacts of digital technology on
wider society, including issues of privacy Quizzes..............................................71
Quiz 1..........................................................................................................71
Chapter 3.7 – Ethical, legal and environmental impacts of digital technology on
wider society, including issues of privacy Exam Questions................................ 72
3.7.1............................................................................................................72
h
Chapter 3.1 – Fundamentals of Algorithms Quiz Answers................................. 73
ks
3.1.1 – Representing algorithms quiz......................................................... 73
3.1.2 – Efficiency of algorithms quiz........................................................... 73
Ba
3.1.3 – Searching algorithms quiz...............................................................74
3.1.4 – Sorting algorithms quiz................................................................... 74
r
Chapter 3.2 – Programming Quiz Answers.........................................................75
M
3.2.1 – Data types quiz............................................................................... 75
3.2.2 – Programming concepts quiz........................................................... 75
h
5
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
3.4 Computer Systems....................................................................................82
ks
Quiz 1..........................................................................................................82
Quiz 2..........................................................................................................82
Ba
Quiz 3..........................................................................................................82
Quiz 4..........................................................................................................83
r
3.5 Fundamentals of Computer Networks..................................................... 84
M
Quiz 1..........................................................................................................84
Quiz 2..........................................................................................................84
h
Quiz 3..........................................................................................................85
it
Quiz 1..........................................................................................................87
3.7 Ethical, legal and environmental impacts of digital technology on wider
society, including issues of privacy................................................................. 88
de
Quiz 1..........................................................................................................88
Co
6
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Chapter 3.1 – Fundamentals of Algorithms Quizzes
3.1.1 – Representing algorithms quiz
1. What is an algorithm?
2. How does decomposition work?
3. What is abstraction?
4. What is pattern recognition
h
5. The process of removing unnecessary detail from a problem is
ks
known as …..
6. What is the purpose of pseudocode?
Ba
7. Give an example of how data is input into a computer system.
8. Give an example of how a computer system might process
data.
9. What do we mean by output? r
M
3.1.2 – Efficiency of algorithms quiz
h
algorithm?
W
h
4. What is the advantage of merging sublists?
ks
5. How does a bubble sort algorithm work?
6. What is the disadvantage of a bubble sort algorithm?
Ba
r
M
h
it
W
de
Co
8
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Chapter 3.1 – Fundamentals of Algorithms Exam
Questions
3.1.1
h
ks
Ba
r
M
h
it
W
de
Co
9
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
10
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
11
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
12
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
13
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.1.2
h
ks
Ba
r
M
h
it
W
de
Co
14
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
15
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.1.3
h
ks
Ba
r
M
h
it
W
de
Co
16
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
17
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
18
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.1.4
h
ks
Ba
r
M
h
it
W
de
Co
19
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
20
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
21
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
5. Is male/female a valid boolean data type?
ks
6. What is the difference between data and process?
7. In Computing, define the term output
Ba
3.2.2 – Programming concepts quiz
1. What is variable declaration?
2. What is the difference between a variable and constant declaration?
3. What is iteration?
r
M
4. Give two examples of iteration:
5. what is the difference between iteration and selection?
h
6. What is a subroutine?
7. Give one advantage of a procedure
it
22
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.2.4 – Relational operations in a programming language quiz
1. Describe the relational operation (=)
2. Describe the relational operation (!=)
3. Describe the relational operation (<)
4. Describe the relational operation (>)
5. Describe the relational operation (<=)
6. Describe the relational operation (>=)
h
ks
3.2.5 – Boolean operations in a programming language quiz
1. Describe the Boolean operation: NOT
Ba
2. Describe the Boolean operation: AND
3. Describe the Boolean operation OR
2. What is position?
3. What is a substring?
4. Write an example of a substring
5. What is concatenation?
23
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
2. What is a procedure?
ks
3. What is the difference between a function and a
procedure?
Ba
4. How are local variables used with subroutines?
24
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
2. Give an example of a high level programming language
3. Give an example of a low level programming language
4. What is machine code?
5. What is assembly language and how is it translated?
6. What is the purpose of an interpreter?
7. What is a the purpose of a compiler?
8. What is the purpose of an assembler?
h
ks
Ba
r
M
h
it
W
de
Co
25
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
26
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.2.2
h
ks
Ba
r
M
h
it
W
de
Co
27
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
28
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.2.3
h
ks
Ba
r
M
h
it
W
de
Co
29
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
30
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.2.4
h
ks
Ba
r
M
h
it
W
de
Co
31
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
32
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
33
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.2.5
h
ks
Ba
r
M
h
it
W
de
Co
34
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
35
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
36
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Chapter 3.3 – Fundamentals of Data Representation
Quizzes
Quiz 1
1. A switch only has two states which can be represented as?
2. Bit is short for?
3. A group of eight bits is called?
h
4. 1000 bytes equals?
ks
5. 1,000,000 bytes equals?
6. 1,000,000,000 bytes equals?
Ba
7. 1,000,000,000,000 bytes equals?
8. 1,000,000,000,000,000 bytes equals?
9. How many digits does our decimals system use?
r
10. What are the column headings needed when converting to binary?
M
Quiz 2
1. What is the biggest number you can represent with 8 bits?
h
2. When you cannot represent the number in the amount space because it’s
it
times?
6. Dividing a number by 8 requires the binary number to be shifted to the right
Co
37
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Quiz 3
1. ASCII characters use how many bits?
2. What is the new standard for representing the characters of all the languages
h
of the world?
3. How many bits does Unicode use per character?
ks
4. What’s the advantage of using Unicode?
5. What is a vector graphic?
Ba
6. What is a pixel?
7. What is the main difference between a bitmap and vector graphic?
8. How many colours can be stored with 2 bits?
r
9. How many colours can be stored with 3 bits?
M
10. What’s the formula to work out the colour depth?
11. What is colour depth?
h
Quiz 4
1. Sound waves are continuously changing and are described as…?
2. Anything stored on a computer must be stored in digital format as a series
de
of…?
3. The device that takes real-world analogue signals and converts them to a
Co
38
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
6. Sample resolution is…?
7. Sample rate is…?
8. Formula for the file size for a sample =
9. One way to speed up the rate of file transfer is to…?
10. Compression is used to…?
11. What is lossy compression?
12. What is lossless compression?
h
13. What is run length encoding (RLE)
ks
14. What is Huffman coding?
Ba
r
M
h
it
W
de
Co
39
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
40
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
41
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
42
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.3.2
h
ks
Ba
r
M
h
it
W
de
Co
43
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
44
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
45
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
46
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
47
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.3.3
h
ks
Ba
r
M
h
it
W
de
Co
48
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.3.4
h
ks
Ba
r
M
h
it
W
de
Co
49
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.3.5
h
ks
Ba
r
M
h
it
W
de
Co
50
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
51
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.3.6
h
ks
Ba
r
M
h
it
W
de
Co
52
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Chapter 3.4 – Computer Systems Quizzes
Quiz 1
1. Circuits in computers are made of many logic gates, name the main three
2. Boolean variables are either…?
3. A NOT gate…
4. The property of a the AND gate…
h
5.
ks
What is a truth table?
Quiz 2
Ba
1. Define the term hardware?
2. Define the term software
3. Define the term system software r
M
4. Define the term application software
5. Give examples of application software
h
6.
it
Quiz 3
1. What is in the Von Neumann architecture?
2. The processor responds to and processes the instructions that drive the
computer. It contains the…?
53
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
Quiz 4
1.
ks
Describe the fetch execute cycle
2. What happens during the fetch stage?
Ba
3. What happens during the decode part of the cycle?
4. What happens during the execute stage?
5. r
How does greater clock speed affect instructions?
M
6. How is clock speed measured?
7. What is cache memory?
h
8.
it
54
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Chapter 3.4 – Computer Systems Exam Questions
3.4.1
h
ks
Ba
r
M
h
it
W
de
Co
55
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
56
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.4.2
h
ks
Ba
r
M
h
it
W
de
Co
57
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
58
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.4.3
h
ks
Ba
r
M
h
it
W
de
Co
59
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.4.4
h
ks
Ba
r
M
h
it
W
de
Co
60
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.4.5
h
ks
Ba
r
M
h
it
W
de
Co
61
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
62
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
63
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.4.6
h
ks
Ba
r
M
h
it
W
de
Co
64
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
65
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
4. What is packet switching?
ks
5. What is needed to create a network of computers?
6. What is the purpose of a router?
Ba
7. What is a switch?
8. What is an NIC?
9. What is WiFi?
Quiz 2 r
M
1. What is a LAN?
2. State two benefits of networking computers
3. State three disadvantages of using networks
h
7. What is a PAN?
8. What does Ethernet refer to?
9. What is Bluetooth?
de
Quiz 3
Co
66
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
4. State which protocol would be the most suitable in each of the following
situations:
a. Making a payment securely when purchasing something over the
internet
b. Transferring a file to another computer on a wide area network
c. Transferring an email from one server to another server
5. What protocols are on the Application layer?
h
6. What protocols are on the Transport layer?
7. What protocols are on the Network/Internet layer?
ks
8. What protocols are on the Link layer?
Ba
r
M
h
it
W
de
Co
67
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
68
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
69
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
70
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.5.2
h
ks
Ba
r
M
h
it
W
de
Co
71
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
72
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.5.3
h
ks
Ba
r
M
h
it
W
de
Co
73
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
74
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
75
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
76
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.5.4
h
ks
Ba
r
M
h
it
W
de
Co
77
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
5. What is phishing?
ks
6. Describe one way to detect a phishing email
7. What is meant by shouldering
8. Describe one other way in which a criminal may obtain personal information
Ba
about someone without their consent or knowledge
9. What is penetration testing?
10. Describe two different types of penetration testing
r
11. Describe a method of identification, and give an example of where it might
M
be used
h
it
W
de
Co
78
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Chapter 3.6 – Fundamentals of Cyber Security Exam
Questions
3.6.1
h
ks
Ba
r
M
h
it
W
de
Co
79
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.6.2
h
ks
Ba
r
M
h
it
W
de
Co
80
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.6.3
h
ks
Ba
r
M
h
it
W
de
Co
81
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Quiz 1
h
1. State three ways technology has changed the way we live and work
ks
2. What are the benefits of driverless cars?
3. What are the drawbacks of driverless cars?
Ba
4. What are the dangers of social networking sites such as Facebook
5. What are the benefits of social networking sites such as Facebook?
6. What factors would you take into consideration when rating an Uber tax
driver?
r
M
7. Name three jobs that you think could be computerised
8. State five jobs that can’t be computerised easily
h
it
W
de
Co
82
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Chapter 3.7 – Ethical, legal and environmental impacts
of digital technology on wider society, including issues
of privacy Exam Questions
3.7.1
h
ks
Ba
r
M
h
it
W
de
Co
83
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
smaller problems, so that each smaller problem can be
ks
solved
3. Abstraction is the process of removing unnecessary detail
Ba
from a problem
4. Pattern recognition involves finding similarities or patterns to
r
help us solve more complex problems more efficiently.
M
5. Abstraction
6. Pseudocode: a simple way of describing a set of instructions
that does not have to use specific syntax
h
on a microwave
W
84
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
1. More than one algorithm can be used to solve the same
problem
2. You can create more efficient solutions to problems given
the resources available.
h
3.1.3 – Searching algorithms quiz
ks
1. Linear search algorithm: a simple search from the beginning
Ba
to the end of the list until the item you want is found
2. Advantages: Quick if searching just a few items, can be
performed on an unsorted list – the items do not have to be
r
in sequence.
M
3. Disadvantages: For very large number of items, it is
inefficient
h
the portion of the list that could contain the item, until
W
85
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
5. Disadvantages: Slow and inefficient for large lists
ks
Chapter 3.2 – Programming Quiz Answers
Ba
3.2.1 – Data types quiz
1. Integer
2. Real/Float
3. Char/character
r
M
4. A string can be any letter, digit, punctuation mark or symbol
that can be typed Is male/female a valid boolean data
h
type?
it
contents
6. Output: meaning information produce by a computer e.g.,
de
86
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
amount of memory can be reserved to store the data, e.g., x
= 10
2. Constant declaration: there are certain values that remain
the same (constant) while the program runs
3. Iteration: repeating steps, or instructions, over and over
again, e.g., FOR loops (count controlled), WHILE loops
(condition controlled)
h
4. FOR and WHILE loops
ks
5. Selection: a decision or question e.g., IF statement
6. Subroutine: a section of code that performs a specific task
Ba
i.e., procedure or function
7. Procedures reducing coding and debugging time
r
8. Function: similar to procedures, they are named,
M
self-contained sections of code. The key difference is that
they always return a value, using a RETURN statement
whereas a procedure does not
h
it
2. Subtraction
3. Multiplication
de
4. Real division
5. Integer division
6. Modulus to return remainder
Co
87
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
4. Greater than
5. Less than or equal to
6. Greater than or equal to
h
3. OR: True if at least one is true
ks
3.2.6 – Data structures quiz
Ba
1. Data structures: a method of organising and storing data
2. List/array
3. 1D array is a list of variables with the same datatype,
r
whereas 2D arrays have similar data types
M
4. Array (list): a series of data in order with a corresponding
value
h
names
2. Read: and then we can read them back and print them out
de
88
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
4. “Ark” is a substring of “Ark Kings Academy”
5. Concatenation: “joining together”
h
between 1 and 100
ks
3. Random.randint(50,100): generates a random number
between 50 and 100
Ba
3.2.10 – Subroutines language quiz
1. Advantage of subroutines include:
o Makes the problem easier to solve because it has
r
been decomposed into smaller parts
M
o Each subroutine can be tested separately
o Subroutines can be used several times within a
h
program
it
89
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
approach that subdivides a system into smaller parts called
ks
modules A value passed to a function (or method) when
calling the function
Ba
2. A return statement ends the execution of the function call
and "returns" the result, i.e. the value of the expression
following the return keyword, to the caller
r
3. This means it uses subroutines to break down the program in
M
to manageable chunks of code.
4. The structured approach has the advantages listed above.
h
and password
3. Normal data: typical
Co
90
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.2.13 – Robust and secure programming quiz
1. High level is nearer to human understanding whereas low
level is near to machine code
2. High-level language: such as Python visual Basic, Delphi,
Java and many others
3. Low-level language: processor-specific assembly langauges
and machine code
h
4. Machine code: a computer programming language
ks
consisting of binary or hexadecimal instructions which a
computer can respond to directly
Ba
5. Assembly language: translated using an assembler. One
statement translates into one machine code instruction
6. Interpreter: used to translate high-level language code into
r
M
machine code
7. Compiler: translates a program written in a high-level
programming language into machine code
h
Quiz 1
1. 1 or 0, on or off
de
5. A megabyte
6. A gigabyte
7. A terabyte
8. A petabyte
9. Ten digits (0 – 9)
10. 128,64,32,16,8,4,2,1
91
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Quiz 2
1. 255
2. Overflow
3. Multiplying
4. Dividing
5. 2
6. 3
h
7. A nibble
ks
8. Hexadecimal (or Hex)
9. C
Ba
10. D
11. Numbers are expressed more compactly and they are easier to understand
and remember
Quiz 3 r
M
1. 7-bits (8-bits for extended ASCII)
2. Unicode
3. 8-32
h
5. A digital drawing made up of lines and shapes with specific properties such
as line style, line colour, fill colour, start point and end point
W
6. Short for picture element, a single point in an image, which can have its
colour set independently
7. For bitmap images, as the size of the picture increases, more pixels will be
de
needed
8. 4
Co
9. 8
10. The number of colours to the power of 2
11. Used to describe the number of bits used to represent each pixel
12. Image width x image height x colour depth
13. (image width x image height x colour depth)/8
92
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Quiz 4
1. Analogue
2. Binary numbers
3. Analogue-to-digital converter
4. A measure of amplitude at a point in time
5. Sample resolution and sample rate
6. The number of bits used to store each sample
h
7. The frequency with which you record the amplitude of the sound
8. Sample rate x sample resolution x number of seconds
ks
9. Compress them to make them smaller
10. Reduce the amount of storage space needed, allow large files to be
Ba
transmitted as an attachment, allow a file to be transmitted in less time
11. Data encoding where files are compressed by removing some of the detail
12. Data encoding method where files are compressed but no data is lost
13. r
Data having the same value is stored using frequency
M
14. A compression technique used to reduce the number of bits used to
represent each letter. The more frequently a letter appears in the text, the
fewer bits are used to represent in a text file
h
15.
it
W
de
Co
93
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
5. Used to assess possible results of a Boolean algebra statement.
ks
Quiz 2
1. Any physical component that makes up the computer
Ba
2. Any program that runs on the computer
3. Programs that are needed to enable the computer to function
4. Programs that enable a user to perform a task
5. Word processing software, spreadsheets, databases, games, mobile phone
aps
r
M
6. A group of programs that manages the computer’s resources
7. Managing where in memory each program and the data it needs will go
h
9. The operating system, or software that controls and manages the computer
system
W
Quiz 3
Co
1. The program is stored in main memory and instructions are fetched and
executed sequentially, and there is a single memory (and bus system) for
accessing both data and programs
2. Arithmetic Logic Unit (ALU), Control Unit (CU), clock and bus
3. Logical operations, shift operations and arithmetic operations
4. Coordinates all the activities taking place inside the CPU
94
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
5. Controls processor timing
6. Passes data between the components of the CPU
Quiz 4
1. Processor fetches and instruction, decodes it and then executes it. The
processor executes one instruction at a time
2. The address of the next instruction to be executed is fetched from the
register (a special fast memory location in the processor) where it is held.
h
The register is incremented so it points to the next instruction to be fetched.
ks
The instruction at address A is fetched from memory and put into a special
register ready to be decode
Ba
3. The control unit decodes the instruction to see what has to be done next
4. The instruction is executed. Depending on what the instruction is, this could
involve fetching data from memory and loading or adding it into the register,
or jumping to another instruction in the program
r
5. Instructions will be executed more quickly
M
6. In Gigahertz (GHz), one billion cycles per second
7. Intermediary between the main physical RAM and the CPU, it makes data
h
using
W
9. You cannot write over the contents once it is created and is non-volatile
10. Long term storage such as HDDs, optical disks, SSDs
11. Rigid rotating platters coated with magnetic material. Ferrous (iron) particles
de
on the disk are polarised to become either a north or south state which
represent 0s and 1s.
12. Solid State Drives are built from special types of transistors that do not lose
Co
95
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
medium/large companies
4. A file is broken up into data packets and each packet is given a header
ks
containing key information
5. Routers, switches and Network Interface Cards
Ba
6. Designed to route data packets across a wide area network such as the
internet
7. A component of a LAN than knows the MAC address of each individual
device connected to it locally r
M
8. Required to connect any network-enabled evice
9. A wireless connection, a family of protocols or rules that make wireless
networking run smoothly
h
Quiz 2
it
1. Local area network which usually covers a relatively small geographical area
2. Sharing resources, centralised management
W
3. If the main server goes down files cannot be accessed, if there’re many users
bandwidth can be reduced, difficult to secure the system from hackers,
viruses may affect the network, larger networks are difficult to maintain
de
96
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
7. A computer network used for data transmission among devices such as
computers, cell phones and laptops
8. A family of protocols of networking rules used in LANs
9. Wireless technology using short-range radio waves/up to 10m.
10. PANs are centred around an individual user. LANs are intended for multiple
users. PANs can only communicate with devices within a few metres of each
other. LANs can be connected via cable over several hundred metres.
h
Quiz 3
ks
1. Usernames and password combinations; biometric methods such as
fingerprint recognition, iris or retina scanners, voice or face recognition, palm
Ba
scanners.
scan. The genuine scan is stored when the person registers and that is
compared with the scan taken when trying to gain entry to an area building,
it
Automatic software updates will remove harmful code that has been planted
in the software by a hacker
3. A set of rules governing data transmission.
4. Answers:
a. HTTPS
97
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
b. FTP
c. SMTP
5. HTTP, FTP, SMTP, IMAP
6. TCP, UDP
7. IP
h
ks
Ba
r
M
h
it
W
de
Co
98
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.6 Fundamentals of Cyber Security
Quiz 1
1. They may be inserted into a computer that has a virus, which is transferred
to the network.
2. By not having a virus checker installed on their machine. By using a week
password or leaving the default password when installing new software
3. Blagging is getting a friend, colleague or total stranger to divulge their
h
personal details e.g. password or bank account number.
ks
4. Staff training
5. Phishing emails are designed to steal money, get login details, or steal an
identity.
Ba
6. Not personally addressed. Poor spelling and grammar. You may be asked to
enter data such as a bank account number or password as well as personal
details such as name, address, birth date and so on. You may be asked to
r
click on a link to download a free game or verify your bank account details.
M
7. Shouldering is looking over someone’s shoulder while they enter a password
or PIN, to get that information.
8. Pharming, where code is put on your hard drive or on the actual server itself.
h
99
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
100
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.7 Ethical, legal and environmental impacts of digital technology on
wider society, including issues of privacy
Quiz 1
1. Online shopping, texting, social media, able to get information on anything
via the Internet, etc.
2. Cheaper to run because you don’t have to pay a driver
No driver to get tired so can keep going without a break
h
Will drive in a way that optimises fuel consumption/more efficient
ks
Fewer accidents (often driver’s fault, inattention, tiredness etc)
Instead of driving the car you can do something else
Ba
3. It isn’t clear who is at fault in an accident
Expensive at the moment
People might not trust them
A car could be hacked and driven by remote control
r
4. Your information is being shared with third parties
M
Privacy settings revert to a less safe default mode after each redesign
Facebook ads may contain malware
h
Your real friends unknowingly make you vulnerable by sharing with others
Scammers are creating fake profiles so could be grooming young people
it
Bullying, trolling
5. Easy way to share information with friends and family
W
Can use it on your phone so portable, can use it anywhere in the world to
stay in touch
Entertaining
de
Easy to use
6. Cleanliness of car
Co
Politeness of driver
How safe the driving was
Whether the driver knew how to get to the destination
Did the driver help with luggage
7. bank clerk, test pilot, bomb disposal, checkout operator
101
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
h
ks
Ba
r
M
h
it
W
de
Co
102
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017