What is an example of hacking?
Gaining unauthorized access to a computer system
Using software legally purchased online
Installing a firewall for protection
What is a general ethical concern around digital technologies in society?
They are hard to learn
They may reduce personal interaction and privacy
They always require subscriptions
What is a protocol in networking?
A type of IP address
A set of rules for communication between devices
A network security tool
What is the first step in bubble sort?
Split the list in half
Compare two adjacent items
Add all values together
Why do some people oppose government access to private data?
It slows down cloud performance
It increases data download speeds
It violates their right to privacy
What does HTTP stand for?
High Transfer Protocol
Host Tracking Protocol
Hypertext Transfer Protocol
What does a truth table show?
File sizes
Memory locations
All possible input and output combinations
What is penetration testing used for?
Fixing coding bugs in software
Identifying security weaknesses by simulating an attack
Writing secure password policies
What does the NOT Boolean operator do?
Reverses the condition
Combines two conditions
Checks if something is true
Which of these would output a remainder when dividing 11 by 2?
2
5
1
What is an array?
A piece of code that checks input
A structure to store multiple items
A mathematical formula
How would you update a record in SQL?
MODIFY FROM table_name ...
CHANGE RECORD table_name ...
UPDATE table_name SET column=value WHERE ...
Which of the following is an example of malware?
CAPTCHA
Trojan
Firewall
What is a pixel?
A group of characters in an image
A type of colour used in graphics
A single point in an image
Why are autonomous vehicles ethically controversial?
They can't access the internet
They use petrol instead of electricity
They may have to make life-or-death decisions
What is a local variable?
A variable used everywhere
A variable used only within a subroutine
A constant
What are the three main factors that affect CPU performance?
RAM, SSD size, screen resolution
Clock speed, cache size, number of cores
Clock speed, colour depth, binary shift
Which of these is a real data type?
"3.14"
3.14
3
What does a FOR loop do?
Runs code while a condition is true
Chooses between two actions
Repeats a block of code a set number of times
Why might cloud storage create legal issues?
It uses unfamiliar file formats
Data may be stored in different countries with different laws
It doesn't allow editing of files
What benefit does a relational database offer over a flat-file database?
It reduces data redundancy
It allows sorting by font size
It eliminates the need for data types
Why might mobile technologies pose a privacy risk?
They don't have USB ports
They constantly collect location data
They can’t run complex programs
Which compression method uses frequency/data pairs?
ASCII
Huffman Coding
Run Length Encoding
What does the Boolean expression A.B + C̅ mean?
A OR B AND NOT C
A AND B OR NOT C
A AND B XOR C
Which of the following is a legal issue associated with cloud storage?
Who owns the data and where it is stored
How fast the internet connection is
Whether users can upload large files
What is the binary version of the decimal number 25?
110011
11011
11001
Why is cloud storage considered useful?
It runs faster than RAM
It’s stored in ROM
It allows access to data from any internet-connected device
What is the character code for capital 'A' in ASCII?
64
65
66
What is MAC address filtering used for?
Controlling which devices can access a network
Blocking websites
Sending emails securely
What does the SQL clause ORDER BY ... DESC do?
Filters out duplicate rows
Deletes rows from a table
Sorts results in descending order
What would be the result of good decomposition?
A longer, more confusing program
Combining many tasks into one
Easier to solve and manage sub-problems
What is a computer network?
Two or more connected devices sharing data
A single device connected to the Internet
A group of users playing games together
Which storage type uses lasers to read data?
Optical
Magnetic
Solid state
What is the formula to calculate the file size (in bits) of a sound file?
Time × resolution ÷ sample rate
Resolution ÷ time × sample rate
Sample rate × resolution × time
Which of these represents the largest amount of data?
1 TB
1 GB
1 MB
What is a field in a database?
The name of the database
A full set of user data
A column that stores one type of data
Why is hexadecimal used instead of binary in some situations?
It's easier for humans to read
It's easier for computers to use
It stores more data than binary
Which protocol is used for secure web traffic?
UDP
FTP
HTTPS
What are the three key parts of an algorithm?
Inputs, processing, outputs
Code, memory, storage
Loops, conditions, branches
What is one risk of using removable media like USB sticks?
They improve network performance
They can introduce malware to a system
They encrypt data by default
Why might merge sort be less efficient in some cases?
It skips some data
It doesn’t work with numbers
It uses more memory
A sound is sampled at 44,100 Hz with 16-bit resolution for 10 seconds. What is the file size in bits?
441,000
7,056,000
70,560,000
Which of these is an example of nested iteration?
Choosing from multiple options
A loop inside another loop
Declaring two variables
Which file is likely to be the biggest in size?
Image: 500 x 500, 16-bit colour
Image: 100 x 100, 8-bit colour
Image: 700 x 700, 24-bit colour
What type of test data would include the number 10 in a 1–10 range?
Boundary
Erroneous
Random
Which sort algorithm splits the list before sorting?
Bubble sort
Binary sort
Merge sort
What type of memory is non-volatile and contains start-up instructions?
ROM
RAM
Cache
What is the difference between hardware and software?
Hardware is physical, software is programs
Hardware is stored in RAM, software in ROM
Hardware can’t break, software can
Which type of network typically covers a small geographical area like a school?
PAN
WAN
LAN
What is the difference between TCP and UDP?
UDP encrypts data, TCP does not
TCP ensures reliable delivery, UDP is faster but less reliable
TCP is used only for video
What is the function of a firewall?
Blocks or allows network traffic based on rules
Repairs broken network cables
Increases Internet speed
What is a foreign key?
A key used to encrypt SQL queries
The longest text field in a record
A field linking to a primary key in another table
What is the main advantage of merge sort over bubble sort?
It doesn't use any memory
It is easier to understand
It is more efficient on large lists
What is the purpose of using a foreign key in a database?
To create a relationship between two tables
To filter data within a single table
To encrypt sensitive data
Which of these is an example of application software?
Disk defragmenter
Operating system
Word processor
What is the purpose of selection in a program?
To repeat code forever
To make decisions using conditions
To store multiple values
Which statement about system software is correct?
It’s used to create videos
It manages hardware and runs applications
It’s stored on an SD card
What is a Boolean data type used for?
Whole numbers only
True or false values
Long pieces of text
Which method is best to understand an algorithm’s output?
SQL queries
Circuit diagrams
Trace tables
Which logic gate gives an output of 1 only when inputs are different?
OR
XOR
AND
What security method scrambles data so it cannot be read if intercepted?
Encryption
Authentication
MAC filtering
Why are low-level languages used in embedded systems?
They are easier to learn
They give direct control over hardware
They run faster on mobile data
What does a logical left binary shift by 1 do to the number 00001111?
Reverses the digits
Divides it by 2
Multiplies it by 2
What is abstraction in computing?
Writing very detailed code
Removing unnecessary detail
Ignoring important steps
How does increasing colour depth affect an image file?
It increases file size
It lowers image resolution
It reduces the number of pixels
Which topology connects each device to a central switch or hub?
Bus
Star
Ring