0% found this document useful (0 votes)
15 views12 pages

Revision Many Topics Without Solutions

Uploaded by

imgayig676
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views12 pages

Revision Many Topics Without Solutions

Uploaded by

imgayig676
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

1.

Questions
1. Identify the name, value and data type of the following variables:

password = “32331”

age = 34

weight = 82.5

isPerson = False

Name Value Data type

password 32331 String

age 34 Intergers

Weight 82.5 float

2. What is another name for a float?

3. What is the difference between Integer, real and string?

4. What is a linear search? How many steps will it take to find the number 22 below?

5. Does a linear search need to be in order?

6. What could be a disadvantage of linear search?

7. Create a flowchart of the following pseudocode:


Add your flowchart here:

Add your python code here:

8. Create pseudocode from the following flowchart:


Your pseudocode:

Your python code:

9. Consider the following pseudocode:

START
INPUT num1
INPUT num2
INPUT num3
IF num1 > 30 AND num1 < 35 THEN
OUTPUT num1
ELSE
IF num2 > 30 AND num2 < 35 THEN
OUTPUT num2
ELSE
OUTPUT num3
END IF
END IF
STOP

What does the above algorithm display if given these inputs:

num1 = 12

num2 = 17

num3 = 33

_______________________________

10. What is the difference between PAN, LAN and WAN? Give examples
11. Explain the difference between Copper and fibre-optic cable.

12. Explain advantages and disadvantages of wired vs wireless networks in terms of


performance, security and cost.

13. What is echo checking? Explain how it works.

14. What is the function of a server? Give examples of uses of servers.

15. What is the difference between software and hardware?

16. What kinds of software are there?

17. What is the difference between an Operating system, utility software and normal
applications? Please, provide examples.

18. WHat kind of software is an antivirus? os/utility/application/?

19. Explain the difference between a firewall and an antivirus.

20. Does a firewall search the computer in search of infected files?

21. Does an antivirus analyze incoming data from the Internet and blocks entrance of
some suspicious data/files?

22. What is the difference between an antivirus, a firewall and an antispyware?

23. What is compression? What is it used for? Provide examples

24. Explain 1 advantage of compression and 1 disadvantage?

25. What is the difference between AR and VR.


26. Explain some applications of AR and VR (i.e. examples of how they are used).

27. Give examples of operating systems and explain their role on a computer.

28. Give 5 examples of utility software that you understand.

29. Is MS PowerPoint utility software?

30. What is ASCII?

31. What is the difference between RAM and ROM?

32. What is the difference between RAM and HDD?

33. What is the difference between primary and secondary memory?

34. What is the difference between volatile and non-volatile memory?

35. What is machine learning? Give an example. Include the role of data, learning
process and intelligent output in your explanation.

36. How could a robot cleaner make use of Machine Learning.

37. Fill in the table below and convert from binary to denary.:

128 4 2 1

0 1 1 0 0 1 1 0

Number: __________

1 0 0 0 0 0 1 1
Number: __________

0 1 0 1 1 0 1 0

Number: __________

38. Fill in the table below and convert from denary to binary using the table below:

Number 179 >>>>>>>>>>>>>>>>>> write 8-bit binary here: ____________

Number 250 >>>>>>>>>>>>>>>>>> write 8-bit binary here: ____________

Number 37 >>>>>>>>>>>>>>>>>> write 8-bit binary here: ____________

Number 113 >>>>>>>>>>>>>>>>>> write 8-bit binary here: ____________

39. Fill in the table below and convert from denary to binary.

243
243 / 2 = Remainder

= Remainder

= Remainder

= Remainder

= Remainder

= Remainder

= Remainder

Answer = _______________

c 35

= Remainder

= Remainder

= Remainder

= Remainder

= Remainder

= Remainder

= Remainder
Answer = _______________

(see next question, below)


d 95

= Remainder

= Remainder

= Remainder

= Remainder

= Remainder

= Remainder

= Remainder

Answer = _______________

40. What are the following logic gates?

41. Fill in the following table:


AND

Input A Input B OUTPUT

1 1

1 0

0 1

0 0

42. Fill in the following table:

OR

Input A Input B OUTPUT

1 1

1 0

0 1

0 0

43. Fill in the following table:

NOT

Input A OUTPUT

A B C A AND B NOT C (A AND B) OR NOT(C)

1 1 1

1 1 0

1 0 1

1 0 0

0 1 1
0 1 0

0 0 1

0 0 0

44. What is the difference between iterative project management and waterfall?

45. What are the advantages and disadvantages of the waterfall and iterative project
management methodologies?

46. What are the stages of the waterfall project management methodology?

47. What are the key aspects that occur during the planning, design and development

48. Explain how you would work iteratively in the creation of a poster for a restaurant that
will open soon.

49. Explain how you would work iteratively in the development of an app with a quiz
about the environment.

50. What is the difference between review and testing?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy