Computer Science Y9 EOY Exam Revision

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/73

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

74 Terms

1
New cards

What is the Copyright Designs and Patent Act of 1998?

It is illegal to copy, modify or distribute software, music, videos or other intellectual property without permission from the author.

2
New cards

What is the Data Protection Act of 2018?

Personal data must be fairly and lawfully processed
Personal data must be obtained for specified, explicit and legitimate purposes
Personal data must be adequate, relevant and not excessive
Personal data must be accurate and up to date
Personal data must not be kept for longer than is necessary
Personal data must be handled in a way that ensures security

3
New cards

What is the Computer Misuse Act?

So to make sure the people who gain access to our data without permission are prosecuted the UK Parliament created the Computer Misuse Act which made three new offences:

1) Accessing computer material without permission.
2) Accessing computer material without permission with intent to commit further criminal offences.
3) Altering computer data without permission.

4
New cards

What number system do humans use?

Base 10 (denary)

5
New cards

What numbers does Base 10 use?

0 to 9 (inclusive)

6
New cards

What number system do computers use?

Base 2 (binary)

7
New cards

What are the binary place values going from left to right?

128 64 32 16 8 4 2 1

8
New cards

Convert 88 into binary

010001110

9
New cards

What are the binary addition rules?

0 + 0 = 0
0 + 1 = 1
1 + 1 = 0 carry 1
1 + 1 + 1 = 1 carry 1

10
New cards

What is 'overflow' in binary addition?

When we add binary numbers together and we end up with a number that is too big to hold in 1 byte.

11
New cards

What number system does hexadecimal use?

Base 16

12
New cards

What is 10, 11, 12, 13, 14 and 15 (denary) equal to in Hexadecimal?

A, B, C, D, E and F

13
New cards

Convert 87 into Hexadecimal.

87/16 = 5 remainder 7
So: 57

14
New cards

Convert F3 into denary.

F = 15, So: 15x16 = 240 3 x 1 = 3 240 + 3 = 243

15
New cards

What is ASCII?

American Standard Code for Information Interchange

16
New cards

What is the ASCII value for A?

65

17
New cards

What is the ASCII value for Space?

32

18
New cards

What are all digital images made up of?

Tiny squares called pixels

19
New cards

What number represents white?

1

20
New cards

What number represents black?

0

21
New cards

How many colours would a colour depth of n create?

2ⁿ

22
New cards

In a colour depth of two, what is the binary number for black, white, blue and red?

Black: 00
White: 11
Red: 10
Blue: 01

23
New cards

In a colour depth of three, what are the binary numbers for all colours?

Black: 000
Blue: 001
Green: 010
Cyan: 011
Red: 100
Magenta: 101
Yellow: 110
White: 111

24
New cards

What is resolution?

The resolution of an image is a way of describing how tightly packed the pixels are.

25
New cards

What is compression?

Compression is the process of encoding, restructuring or otherwise modifying data in order to reduce its size.

26
New cards

What are the 2 types of compression?

Lossy & Lossless

27
New cards

What is lossy compression?

Lossy compression removes data permanently, so the file can never return to its original form; this reduces the size of a file.

28
New cards

What is lossless compression?

Lossless compression reduces the size of a file without any damage to the file or reduction in quality; however it doesn't reduce the file size as much as lossy compression.

29
New cards

What is a cipher?

A cipher is a way of disguising a message.

30
New cards

What is a Caesar cipher?

A substitution cipher that shifts characters a certain number of positions in the alphabet.

31
New cards

What is Brute Force?

An attempt to gain access by bombarding it with guesses until the password is found.

32
New cards

What is a box cipher?

The box cipher is a cryptographic technique that arranges plaintext characters in a grid, then applies transposition and permutation to encrypt the message.

33
New cards

What is a Vignere cipher?

The Vigenère cipher is a polyalphabetic substitution cipher that encrypts plaintext by shifting each letter according to a keyword, repeating the keyword if necessary, providing stronger encryption than simple monoalphabetic ciphers.

34
New cards

What is a substitution cipher?

The substitution cipher is a method of encryption where each plaintext character is replaced with a corresponding ciphertext character based on a fixed system, typically a one-to-one mapping of letters in the alphabet.

35
New cards

What is a keyboard cipher?

The keyboard cipher is a simple encryption technique that involves shifting characters by a fixed number of positions on a keyboard layout to generate ciphertext from plaintext.

36
New cards

What is a book cipher?

The book cipher is a cryptographic method that encodes plaintext by referencing specific words or passages in a pre-agreed book, where each word or phrase corresponds to a particular letter or group of letters in the message, offering a form of encryption through association with literature.

37
New cards

What is a pigcode cipher?

The Pigpen cipher, also known as the Masonic cipher, is a substitution cipher that replaces letters with symbols based on a grid of lines and dots, often resembling pigpens, to obscure the plaintext message.

<p>The Pigpen cipher, also known as the Masonic cipher, is a substitution cipher that replaces letters with symbols based on a grid of lines and dots, often resembling pigpens, to obscure the plaintext message.</p>
38
New cards

What is symmetric encryption?

Encryption where two people agree on a key in private beforehand, and then send messages using that key. The same key is used to encrypt and decrypt that message.

39
New cards

What is asymmetric encryption?

Where there is a public key, that is accessible to everyone, so that they can encrypt their messages, but only one person has the private key to decrypt the messages.

40
New cards

What is a public key?

A key that is open to the public and can be accessed by anyone to encrypt a message.

41
New cards

What is a private key?

A key that is only accessible to one person and only they can decrypt the messages that were sent using the public key.

42
New cards

What is sequence in python?

A program that runs in order.

43
New cards

What is selection in python?

When a program will need to make a decision based on an input, or as the result of a calculation.

44
New cards

What is iteration in python?

When all/some of the program has to repeat. This can be done in two ways: count-controlled (for loop) or condition-controlled (while loop)

45
New cards

What is a variable?

A temporary place to hold data that can be changed.

46
New cards

What do x,y,z mean in the following code:
for i in range(x,y,z)
print(i)

x is the start the point (inclusive)
y is the end point (exclusive)
z is the step (how much it increments by)

47
New cards

When printing in python, what will this print? print(name, "owes £", amount) name = Dave amount = 3.50

Dave owes £ 3.50
When using a comma, you can't control the spacing.

48
New cards

When printing in python, what will this print? print(name + "owes £" + str(amount))name = Dave amount = 3.50

Dave owes £3.50 When using a plus, you can control the spacing, but you need to cast into a string before concatenating the strings.

49
New cards

What do str(), int(), and float() do and what is this process called?

str() converts anything in the brackets to a string
int() converts anything in the brackets to an integer
float() converts anything in the brackets to a float
This process is called casting.

50
New cards

What are the symbols for mathematical operations in python?

+ is addition
- is subtraction
* is multiplication
/ is division
** is exponentiation (powers)
// is integer division (only integers, no remainders/decimals)
% is modulo (only gives the remainder)

51
New cards

What do the following symbols mean?:
'=='
'!='
'>='
'<='

Equal to
Not equal to
Greater than or equal to
Less than or equal to

52
New cards

What are the logical operators in python?

and, or, not

53
New cards

What are the 2 types of search algorithms?

Linear and Binary

54
New cards

How does the Linear searching algorithm work?

1) Find out the length of the data set.
2) Set the position to 0.
3) Check the value held in the position.
4) Does it match our search value? If it does, the value is found. End the search.
5) If not, add 1 to the position value and repeat from step 3.
6) If we have reached the length of the data set, search value not found.

It checks each value in the data set until the search value is found.

55
New cards

How does the Binary searching algorithm work?

1) Find the length of the data set
2) Calculate the midpoint of the data set.
3) Use this as search position.
4) If the search value is found, the search ends.
5) If the value at the midpoint is less than the value to be found, the list is divided in half. The lower half of the list, with midpoint is ignored and the search keeps to the upper half of the list.
6) Otherwise, if the value at the midpoint is greater than the value to be found, the upper half, with midpoint of the list is ignored and the search keeps to the lower half of the list.
7) The search moves to the midpoint of the remaining items, if length of data is greater than 0. Repeat the process from step 2.
If length of the data set reached and no value found, end the search.

THE DATA MUST BE ORDERED.

56
New cards

How does the bubble sort algorithm work?

It looks at two elements and swaps them if they in the wrong order. For example, if I had the list: 1 5 3 6 2
The algorithm would first check 1 and 5. It would leave them and move on. Then it would check 5 and 3. It would swap them around. It would check 5 and 6. It would leave them and move on. It would then check 6 and 2, and swap them around. A PASS has been completed. The algorithm would then repeat the process until there are no swaps required for a pass to happen.

57
New cards

How would you print 'John' from the list?: friends = [Alex', 'William', 'John', 'Harry']

print(friends[2])

58
New cards

What does 'len' do?

Calculates the length of a list.

59
New cards

How would you add an item to the end of a list?

listname.append(item)

60
New cards

How would you add an item to a list at a specific position?

listname.insert(position, item)

61
New cards

How would I remove an item from a list?

del listname[position]

62
New cards

How would I sort a list?

listname.sort()

63
New cards

What are the two sub-programs in python?

Function and Procedure

64
New cards

What is the difference between a function and a procedure?

What is the difference between a function and a procedure?
A function returns a value. A procedure prints out a value.

65
New cards

How do you create a sub-program?

You use the keyword def:
def functionname():

66
New cards

What is an parameter?

A variable in a function that takes in an input.
def function(variable):
variable is the parameter

67
New cards

What is an argument?

The value that is held in the parameters of the sub-program.
def function(variable):
print(variable)

68
New cards

What would this sub-program print?
def function(a,b):
print(a+b)
function(7,9)

16

69
New cards

What would this sub-program print?
def function(a,b):
return(a*b)
variable = function(3,4)
print(variable)

12

70
New cards

What is a bit?

A binary digit, a 0 or a 1.

71
New cards

What is a nibble?

Half a byte or 4 bits

72
New cards

What is a byte?

8 bits

73
New cards

What is a kilobyte?

1024 bytes - this continues for every subsequent prefix.

74
New cards

What is the order of prefixes?

Bit, Nibble, Byte, Kilobyte, Megabyte, Gigabyte, Terabyte, Petabyte, Exabyte, Zettabyte, Yottabyte, Ronnabyte, Quettabyte