What does a firewall do?
Blocks unauthorised access
Speeds up the Internet
Stores website history
What is the correct order of steps in a bubble sort?
Split list, compare, combine
Compare, swap if needed, repeat
Search, divide, search again
Which protocol is used to send emails from a client to a mail server?
SMTP
POP
FTP
Which symbol is used in a flowchart to represent a decision?
Oval
Rectangle
Diamond
What does the user interface of an operating system do?
Connects a printer
Speeds up the Internet
Lets users interact with the computer
What is the main role of the Memory Data Register (MDR)?
Holds the data being transferred to/from memory
Stores the address of the next instruction
Executes logic operations
Convert the denary number 200 into 8-bit binary.
11100010
10111000
11001000
What is an advantage of using a high-level programming language over a low-level language?
Easier to write and maintain
Requires less memory
Direct control over hardware
How can legislation protect users' rights online?
By banning smartphones
By limiting what data can be collected and used
By allowing all posts to be monitored
What does algorithmic thinking allow us to do?
Solve problems using a logical sequence of steps
Write code quickly
Memorise all functions
What is an ethical issue of using artificial intelligence in hiring decisions?
It always finds the best person
It improves the speed of hiring
It could show bias against certain groups
What does a router do in a network?
Directs data between networks
Stores data permanently
Encrypts files locally
What is a 2D array used for?
To store a list of text values only
To store data in rows and columns
To generate random numbers
What is a brute-force attack?
Guessing passwords repeatedly
Destroying a network physically
Sending an email with a virus
What is a disadvantage of lossy compression?
Data is lost and cannot be recovered
It increases file size
It reduces loading speed
What would be an example of erroneous test data for an input expecting a number?
25
"Hello"
-12.5
Which device connects a computer to a network?
CPU
USB stick
Network Interface Card (NIC)
What kind of software licence is typically not free and restricts changes to the code?
Open source
Proprietary
Shareware
Which sorting algorithm uses recursion to divide the list into halves?
Merge sort
Insertion sort
Bubble sort
What is the purpose of the Memory Address Register (MAR)?
Stores the actual data
Stores the address of data to be accessed
Stores results of calculations
How does digital technology affect energy consumption?
Reduces energy use in all cases
Increases energy use due to servers and data centres
Only affects mobile phones
What is a key difference between high-level and low-level programming languages?
Low-level languages are closer to human language
Low-level languages are easier to debug
High-level languages are easier for humans to read and write
What is stored in the Program Counter?
Address of the next instruction
The actual instruction
Data being sent to the screen
What does memory management allow an operating system to do?
Share RAM between running programs
Create new folders
Print documents
What tool in an IDE helps a programmer understand where their code is causing issues?
Error diagnostics
Run-time environment
Translators
In a truth table for the OR operator, when do you get a result of 1?
When both inputs are 0
When at least one input is 1
When both inputs are 1
In a trace table, what does each row usually represent?
A complete program
A single step of the algorithm
A flowchart
What’s the benefit of using subprograms in defensive design?
Increases input errors
Increases maintainability and reduces repetition
Reduces readability
What is the aim of a denial of service (DoS) attack?
To back up files
To connect two networks
To make a website or service crash
When combining logic gates, which of these is the first step in building the truth table?
List all possible input combinations
Set the output for each gate
Calculate the logical operations
What is the job of the ALU in the CPU?
Stores frequently used instructions
Controls input and output devices
Performs arithmetic and logic operations
Why does a computer need peripheral management?
To manage input and output devices
To record videos
To download games faster
Which of the following helps identify logic errors?
Checking file permissions
Using a trace table
Refactoring code
What is the main purpose of indentation in code?
To increase processing speed
To reduce the file size
To show the structure and improve readability
What does user management allow on an operating system?
Run games at higher speeds
Different accounts with different permissions
Install new CPUs
Which storage type is most suitable for installing games on a console?
CD-ROM
Magnetic tape
Solid state
Which of these is a Boolean value?
TRUE
3.14
"Hello"
What happens when a computer runs out of RAM?
It shuts down immediately
It deletes old data from RAM
It uses virtual memory on the hard drive
What does a software licence specify?
The keyboard layout
The battery life of your device
How you can use and share the software
What is the purpose of the error diagnostics feature in an IDE?
To compile code into machine-readable form
To help identify and correct errors in the code
To provide a debugging environment
Which is the best method to prevent an invalid password input?
Input validation and authentication
Using a print statement
Running a loop
Which of these represents a NOT operation?
Combines values
Inverts the value (1 becomes 0, 0 becomes 1)
Multiplies values
Which of these would be considered boundary data for a range 1 to 100?
50
1 and 100
0
What is cache used for in the CPU?
Storing frequently used data
Controlling external devices
Saving files permanently
What type of testing is done at the end of development before release?
Defensive testing
Iterative testing
Final/terminal testing
Which type of testing is done during development to fix issues early?
Performance testing
Iterative testing
Final testing
What data type is best to store a user's age?
String
Boolean
Integer
What is SQL injection?
Entering too many passwords incorrectly
Injecting malware through USB
Injecting code into a database query
What is anti-malware software designed to do?
Block phone calls
Clean the computer screen
Detect and remove malicious software
How would you generate a random number between 1 and 10 in Python?
generate.random(10)
random.randint(1, 10)
random.number(1,10)