Based on past papers Flashcards

(28 cards)

1
Q

What is the purpose of a FOR loop?

A

A FOR loop repeats a block of code a specific number of times based on a counter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a WHILE loop?

A

A WHILE loop repeats a block of code as long as a condition remains true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you use a variable in a program?

A

A variable stores data that can be changed or accessed during program execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of a subroutine?

A

A subroutine is a set of instructions that perform a task and can be reused throughout the program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does an IF statement work?

A

An IF statement checks if a condition is true and executes a block of code if it is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a constant?

A

A constant is a value that remains unchanged during the execution of the program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an IP address?

A

An IP address is a unique identifier assigned to each device on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between IPv4 and IPv6?

A

IPv4 uses 32-bit addresses (e.g., 192.168.1.1), whereas IPv6 uses 128-bit addresses for a larger address space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the role of DNS?

A

The Domain Name System (DNS) translates domain names (e.g., www.example.com) into IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between TCP and UDP?

A

TCP is a reliable, connection-based protocol, while UDP is faster but does not guarantee delivery of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of a router?

A

A router directs data packets between networks, often determining the best path to forward them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a MAC address?

A

A Media Access Control (MAC) address is a unique identifier assigned to network interfaces for communication on a local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you convert hexadecimal A2 to binary?

A

Hexadecimal A2 is binary 10100010.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the binary equivalent of the denary number 37?

A

Binary 37 is 100101.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is a character represented in ASCII?

A

Each character is assigned a unique 7- or 8-bit code, such as ‘A’ = 65.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of the Unicode standard?

A

Unicode assigns a unique code point to characters from different writing systems, supporting many languages.

17
Q

How is an image stored as binary?

A

An image is stored as a series of pixels, each pixel represented by binary values for color, e.g., RGB values.

18
Q

What is a firewall?

A

A firewall is a network security system that monitors and controls incoming and outgoing network traffic.

19
Q

What is encryption?

A

Encryption is the process of converting data into a coded form to prevent unauthorized access.

20
Q

What is malware?

A

Malware is malicious software designed to harm or exploit systems or networks.

21
Q

What is phishing?

A

Phishing is a fraudulent attempt to obtain sensitive information, typically through deceptive emails.

22
Q

What is a Trojan horse?

A

A Trojan horse is a type of malware that disguises itself as a legitimate program but performs harmful actions.

23
Q

What is a DoS attack?

A

A Denial of Service (DoS) attack is an attempt to disrupt or overwhelm a service, making it unavailable to users.

24
Q

What is intellectual property?

A

Intellectual property refers to legal rights that protect creations of the mind, such as inventions, designs, and software.

25
What are some ethical issues in computing?
Ethical issues include privacy concerns, data protection, and the impact of automation on jobs.
26
What is data protection?
Data protection involves safeguarding personal data from unauthorized access, loss, or corruption.
27
What is the Data Protection Act?
The Data Protection Act regulates the processing of personal data, ensuring data privacy rights.
28
What is the digital divide?
The digital divide refers to the gap between those who have access to modern technology and those who do not.