What is one disadvantage of wireless networks compared to wired networks?
Requires fibre optics
Slower cable replacement
More vulnerable to interference
What is the main purpose of the fetch-execute cycle?
To store instructions in RAM
To run instructions stored in memory
To access files on the hard drive
What is a primary key used for?
Sorting data into alphabetical order
Formatting the display of a table
Uniquely identifying each record
What is the correct SQL syntax to insert data into a table?
APPEND ROW table_name (...)
ADD TO table_name SET ...
INSERT INTO table_name (...) VALUES (...)
What does the transport layer in the TCP/IP model do?
Encrypts web traffic
Manages end-to-end communication between devices
Stores network data
Which symbol means "greater than or equal to"?
>=
=>
=<
What is one argument governments use to justify data access?
It makes social media more popular
It increases online shopping
It helps prevent terrorism and crime
Which of the following is a common cyber security risk?
Software not loading quickly
Hacking into systems
Screens being too bright
Which situation would need a binary shift?
Comparing characters in a string
Multiplying a number by 4
Sorting a list alphabetically
What is a key difference between linear and binary search?
Binary search is faster on sorted lists
Linear search only works on even numbers
Binary search doesn't require a list
What is the main purpose of cyber security?
To increase computer speed
To delete unused files
To protect systems and data from unauthorised access or damage
Which SQL clause would you use to filter specific results?
FROM
WHERE
ORDER BY
Which memory is fastest to access?
Register
RAM
Hard drive
Why do programmers use subroutines?
To test random inputs
To break code into manageable parts
To slow down execution
Why is a compiler used in programming?
Runs the code line by line
Stores programs in the cloud
Translates all code at once into machine code
Which SQL command is used to delete data?
DELETE FROM table_name WHERE condition
REMOVE DATA table_name
CLEAR table_name
What does the term ‘malware’ refer to?
Malicious software designed to harm or exploit a system
Software updates
A strong encryption method
Which security method uses fingerprints or facial recognition?
Passwords
Two-factor authentication
Biometric measures
What is pharming?
A way of shoulder surfing
Redirecting users to a fake website
Encrypting files and demanding payment
Why do we use flowcharts or pseudo-code?
To clearly show how an algorithm works
To show the appearance of the final program
To test hardware components
What is the main purpose of using a constant in a program?
Its value doesn't change
It can be renamed
It stores user input
What is the decimal value of the binary number 10101010?
170
180
190
In a database table, what is a record?
A complete row of data
A column heading
A type of relationship
What is a Trojan?
Software that protects against viruses
A kind of phishing website
Malware disguised as legitimate software
What is a database?
A programming language
A network of websites
An organised collection of data
How does a binary search work?
Searches every item one at a time
Divides the list in half each time
Sorts the list using bubble sort
Why do we compress data?
To add more colours
To improve data quality
To reduce file size
What is a common feature of shoulder surfing?
Guessing weak passwords
Sending fake links via email
Watching someone type in a password
What is one risk of computer-based implants?
They increase exercise performance too much
They may be hacked or malfunction
They can't be updated
What is the hexadecimal value for binary 11110000?
F0
FF
0F
What ethical issue arises from wireless networking in public spaces?
Devices may run out of battery
The signal strength might be weak
Data could be intercepted by malicious users
What is an environmental concern related to digital technologies?
Faster data speeds
Too many users online
Increased electronic waste
How does a linear search work?
Jumps to the middle of a list each time
Checks each item one by one
Sorts the list before searching
Which command is used to retrieve specific columns from a table?
SELECT column1, column2 FROM table_name
CHOOSE column1 FROM table_name
PICK column1 IN table_name
Why is it important to use meaningful variable names?
To make code easier to understand
To confuse the examiner
To make the program faster
What does the control unit in the CPU do?
Manages execution of instructions
Stores data permanently
Performs calculations
Which of these best describes a computer program?
A visual diagram of a computer
A set of cables and hardware
An implementation of an algorithm
What does a Huffman tree help us do?
Store binary numbers
Compress text using shorter codes
Represent colour data
What is social engineering?
Physically damaging a server
Hacking a router using code
Tricking people into revealing confidential information
Which is an example of phishing?
Creating a backup file
Sending a fake email to steal passwords
Watching a screen over someone’s shoulder
What is a CAPTCHA used for?
To confirm a user is human
To test internet speed
To scan for malware
What does the SQL command SELECT * FROM Students do?
Deletes all data from the Students table
Retrieves all data from the Students table
Changes the Students table name
What’s one advantage of using a WAN over a LAN?
Requires fewer routers
Connects devices over large distances
Is not affected by firewalls
Which of these is a way to protect against malware?
Installing antivirus software
Using default passwords
Disabling firewalls
How can automatic software updates help prevent cyber attacks?
They patch known vulnerabilities
They make software look newer
They save battery life
What does the MOD operator return?
The result of a subtraction
The remainder of a division
A random number
What number base do computers use to store data and instructions?
Binary
Decimal
Hexadecimal
Which protocol would be used to send email from a client to a server?
IMAP
SMTP
HTTPS
What is the main advantage of Unicode over ASCII?
It uses fewer bits
It can represent more characters
It's easier for computers to read
What is the binary version of the decimal number 13?
1110
1101
1011
What is an algorithm?
A type of programming language
A type of computer memory
A sequence of steps to complete a task
In external penetration testing, what does the tester have access to?
No credentials or internal knowledge
Full admin access
The network firewall only
What is the role of governments in digital surveillance?
To design new operating systems
To ensure national security
To create social media platforms
Which layer of the TCP/IP model handles IP addressing and routing?
Application layer
Link layer
Internet layer
What is a relational database?
A database with multiple related tables
A spreadsheet with formulas
A text file with saved data