You are on page 1of 102

Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.

com

Code with Mr Baksh

AQA GCSE Computer Science

Workbook

h
ks
Ba
r
M
h
it
W
de
Co

Name: __________________________________________

1
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

Contents
Chapter 3.1 – Fundamentals of Algorithms Quizzes.............................................7
3.1.1 – Representing algorithms quiz........................................................... 7
3.1.2 – Efficiency of algorithms quiz............................................................. 7
3.1.3 – Searching algorithms quiz.................................................................7

h
3.1.4 – Sorting algorithms quiz..................................................................... 7

ks
Chapter 3.1 – Fundamentals of Algorithms Exam Questions............................... 9
3.1.1..............................................................................................................9

Ba
3.1.2............................................................................................................12
3.1.3............................................................................................................14
r
3.1.4............................................................................................................16
M
Chapter 3.2 – Programming Quizzes.................................................................. 19
3.2.1 – Data types quiz............................................................................... 19
h

3.2.2 – Programming concepts quiz........................................................... 19


it

3.2.3 – Arithmetic operations in a programming language quiz.................19


W

3.2.4 – Relational operations in a programming language quiz..................20


3.2.5 – Boolean operations in a programming language quiz.................... 20
de

3.2.6 – Data structures quiz........................................................................20


3.2.7 – Input/output and file handling quiz................................................20
Co

3.2.8 – String handling operations in a programming language quiz......... 20


3.2.9 – Random number generation in a programming language quiz...... 20
3.2.10 – Subroutines language quiz............................................................21
3.2.11 – Structured programming quiz.......................................................21

2
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.2.12 – Robust and secure programming quiz.......................................... 21
3.2.13 – Robust and secure programming quiz.......................................... 21
Chapter 3.2 – Programming Exam Questions.....................................................22
3.2.1............................................................................................................22
3.2.2............................................................................................................23
3.2.3............................................................................................................25

h
3.2.4............................................................................................................27

ks
3.2.5............................................................................................................29

Ba
Chapter 3.3 – Fundamentals of Data Representation Quizzes........................... 32
Quiz 1..........................................................................................................32
Quiz 2..........................................................................................................32
r
Quiz 3..........................................................................................................32
M
Quiz 4..........................................................................................................33
Chapter 3.3 – Fundamentals of Data Representation Exam Questions..............34
h

3.3.1............................................................................................................34
it

3.3.2............................................................................................................36
W

3.3.3............................................................................................................41
3.3.4............................................................................................................42
de

3.3.5............................................................................................................43
3.3.6............................................................................................................44
Co

Chapter 3.4 – Computer Systems Quizzes.......................................................... 45


Quiz 1..........................................................................................................45
Quiz 2..........................................................................................................45
Quiz 3..........................................................................................................45

3
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

Quiz 4..........................................................................................................45
Chapter 3.4 – Computer Systems Exam Questions............................................ 47
3.4.1............................................................................................................47
3.4.2............................................................................................................49
3.4.3............................................................................................................51

h
3.4.4............................................................................................................52

ks
3.4.5............................................................................................................53
3.4.6............................................................................................................56

Ba
Chapter 3.5 – Fundamentals of Computer Networks Quizzes............................57
Quiz 1..........................................................................................................57
r
Quiz 2..........................................................................................................57
M
Quiz 3..........................................................................................................57
Chapter 3.5 – Fundamentals of Computer Networks Exam Questions.............. 59
h

3.5.1............................................................................................................59
it

3.5.2............................................................................................................61
W

3.5.3............................................................................................................63
3.5.4............................................................................................................66
Chapter 3.6 – Fundamentals of Cyber Security Quizzes..................................... 67
de

Quiz 1..........................................................................................................67
Chapter 3.6 – Fundamentals of Cyber Security Exam Questions....................... 68
Co

3.6.1............................................................................................................68
3.6.2............................................................................................................69
3.6.3............................................................................................................70

4
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Chapter 3.7 – Ethical, legal and environmental impacts of digital technology on
wider society, including issues of privacy Quizzes..............................................71
Quiz 1..........................................................................................................71
Chapter 3.7 – Ethical, legal and environmental impacts of digital technology on
wider society, including issues of privacy Exam Questions................................ 72
3.7.1............................................................................................................72

h
Chapter 3.1 – Fundamentals of Algorithms Quiz Answers................................. 73

ks
3.1.1 – Representing algorithms quiz......................................................... 73
3.1.2 – Efficiency of algorithms quiz........................................................... 73

Ba
3.1.3 – Searching algorithms quiz...............................................................74
3.1.4 – Sorting algorithms quiz................................................................... 74
r
Chapter 3.2 – Programming Quiz Answers.........................................................75
M
3.2.1 – Data types quiz............................................................................... 75
3.2.2 – Programming concepts quiz........................................................... 75
h

3.2.3 – Arithmetic operations in a programming language quiz.................76


it

3.2.4 – Relational operations in a programming language quiz..................76


W

3.2.5 – Boolean operations in a programming language quiz.................... 76


3.2.6 – Data structures quiz........................................................................76
3.2.7 – Input/output and file handling quiz................................................76
de

3.2.8 – String handling operations in a programming language quiz......... 77


3.2.9 – Random number generation in a programming language quiz...... 77
Co

3.2.10 – Subroutines language quiz............................................................77


3.2.11 – Structured programming quiz.......................................................78
3.2.12 – Robust and secure programming quiz.......................................... 78
3.2.13 – Robust and secure programming quiz.......................................... 78

5
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

3.3 Fundamentals of data representation...................................................... 79


Quiz 1..........................................................................................................79
Quiz 2..........................................................................................................79
Quiz 3..........................................................................................................80
Quiz 4..........................................................................................................80

h
3.4 Computer Systems....................................................................................82

ks
Quiz 1..........................................................................................................82
Quiz 2..........................................................................................................82

Ba
Quiz 3..........................................................................................................82
Quiz 4..........................................................................................................83
r
3.5 Fundamentals of Computer Networks..................................................... 84
M
Quiz 1..........................................................................................................84
Quiz 2..........................................................................................................84
h

Quiz 3..........................................................................................................85
it

3.6 Fundamentals of Cyber Security...............................................................87


W

Quiz 1..........................................................................................................87
3.7 Ethical, legal and environmental impacts of digital technology on wider
society, including issues of privacy................................................................. 88
de

Quiz 1..........................................................................................................88
Co

6
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Chapter 3.1 – Fundamentals of Algorithms Quizzes
3.1.1 – Representing algorithms quiz
1. What is an algorithm?
2. How does decomposition work?
3. What is abstraction?
4. What is pattern recognition

h
5. The process of removing unnecessary detail from a problem is

ks
known as …..
6. What is the purpose of pseudocode?

Ba
7. Give an example of how data is input into a computer system.
8. Give an example of how a computer system might process
data.
9. What do we mean by output? r
M
3.1.2 – Efficiency of algorithms quiz
h

1. Why is it typically possible to design more than one type of


it

algorithm?
W

2. What is the advantage of different types of algorithm solving the


same problem?
de

3.1.3 – Searching algorithms quiz


Co

1. What is a linear search algorithm?


2. State one advantage of a linear search algorithm
3. What one disadvantage of a linear search algorithm?
4. What is a binary search algorithm?
5. What is the advantage of a binary search algorithm?
7
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

6. State one disadvantage of a binary search algorithm

3.1.4 – Sorting algorithms quiz


1. What does a merge sort algorithm do?
2. What is a sublist?
3. What is produced when a pair of sublists are merged?

h
4. What is the advantage of merging sublists?

ks
5. How does a bubble sort algorithm work?
6. What is the disadvantage of a bubble sort algorithm?

Ba
r
M
h
it
W
de
Co

8
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Chapter 3.1 – Fundamentals of Algorithms Exam
Questions
3.1.1

h
ks
Ba
r
M
h
it
W
de
Co

9
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

10
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

11
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

12
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

13
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

3.1.2

h
ks
Ba
r
M
h
it
W
de
Co

14
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

15
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

3.1.3

h
ks
Ba
r
M
h
it
W
de
Co

16
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

17
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

18
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.1.4

h
ks
Ba
r
M
h
it
W
de
Co

19
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

20
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

21
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

Chapter 3.2 – Programming Quizzes


3.2.1 – Data types quiz
1. 3, 45, -453 are examples of what data type?
2. 34.456 and 4.10 and examples of what data type?
3. ?, 4, a are examples of what data type
4. Give an example of a string data type:

h
5. Is male/female a valid boolean data type?

ks
6. What is the difference between data and process?
7. In Computing, define the term output

Ba
3.2.2 – Programming concepts quiz
1. What is variable declaration?
2. What is the difference between a variable and constant declaration?
3. What is iteration?
r
M
4. Give two examples of iteration:
5. what is the difference between iteration and selection?
h

6. What is a subroutine?
7. Give one advantage of a procedure
it

8. What is the difference between a procedure and a function


W

3.2.3 – Arithmetic operations in a programming language quiz


1. State the arithmetic operation for (+)
2. State the arithmetic operation for (-)
de

3. State the arithmetic operation for (*)


4. State the arithmetic operation for (/)
Co

5. State the arithmetic operation for (//)


6. Modulus to return remainder (%)

22
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.2.4 – Relational operations in a programming language quiz
1. Describe the relational operation (=)
2. Describe the relational operation (!=)
3. Describe the relational operation (<)
4. Describe the relational operation (>)
5. Describe the relational operation (<=)
6. Describe the relational operation (>=)

h
ks
3.2.5 – Boolean operations in a programming language quiz
1. Describe the Boolean operation: NOT

Ba
2. Describe the Boolean operation: AND
3. Describe the Boolean operation OR

3.2.6 – Data structures quiz


1. What is a data structure
r
M
2. Give one example of a data structure
3. What is the difference between an array and a 2-D array?
h

4. What is an array (list)?


it

5. What is a multi-dimensional list?


W

3.2.7 – Input/output and file handling quiz


1. What is writing to a file?
2. What is reading to a file?
de

3.2.8 – String handling operations in a programming language quiz


1. What is length?
Co

2. What is position?
3. What is a substring?
4. Write an example of a substring
5. What is concatenation?

23
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

3.2.9 – Random number generation in a programming language quiz


1. What does ‘Random.randint(1,10)’ generate?
2. What does ‘Random.randint(1,100)’ generate?
3. What does ‘Random.randint(50,100)’ generate?

3.2.10 – Subroutines language quiz


1. List 3 advantages of using subroutines

h
2. What is a procedure?

ks
3. What is the difference between a function and a
procedure?

Ba
4. How are local variables used with subroutines?

3.2.11 – Structured programming quiz


1. What modular programming? r
M
2. What is a parameter?
3. What is a return value?
h

4. What is a modularised approach?


5. List three advantages of using a modularised approach
it
W

3.2.12 – Robust and secure programming quiz


1. What is data validation?
2. Describe an example of an authentication routine
de

3. What is normal data?


4. What is boundary data?
Co

5. What is erroneous data?

3.2.13 – Robust and secure programming quiz


1. What is the difference between a low level and high level
programming language?

24
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
2. Give an example of a high level programming language
3. Give an example of a low level programming language
4. What is machine code?
5. What is assembly language and how is it translated?
6. What is the purpose of an interpreter?
7. What is a the purpose of a compiler?
8. What is the purpose of an assembler?

h
ks
Ba
r
M
h
it
W
de
Co

25
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

Chapter 3.2 – Programming Exam Questions


3.2.1

h
ks
Ba
r
M
h
it
W
de
Co

26
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.2.2

h
ks
Ba
r
M
h
it
W
de
Co

27
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

28
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.2.3

h
ks
Ba
r
M
h
it
W
de
Co

29
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

30
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.2.4

h
ks
Ba
r
M
h
it
W
de
Co

31
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

32
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

33
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

3.2.5

h
ks
Ba
r
M
h
it
W
de
Co

34
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

35
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

36
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Chapter 3.3 – Fundamentals of Data Representation
Quizzes
Quiz 1
1. A switch only has two states which can be represented as?
2. Bit is short for?
3. A group of eight bits is called?

h
4. 1000 bytes equals?

ks
5. 1,000,000 bytes equals?
6. 1,000,000,000 bytes equals?

Ba
7. 1,000,000,000,000 bytes equals?
8. 1,000,000,000,000,000 bytes equals?
9. How many digits does our decimals system use?
r
10. What are the column headings needed when converting to binary?
M
Quiz 2
1. What is the biggest number you can represent with 8 bits?
h

2. When you cannot represent the number in the amount space because it’s
it

too big, this is called?


W

3. Shifting a binary number to the left is equivalent to?


4. Shifting a binary number to the right is equivalent to?
5. Multiplying a number by 4, requires the binary to be shifted left how many
de

times?
6. Dividing a number by 8 requires the binary number to be shifted to the right
Co

how many times?


7. A group of four bits is known as…?
8. Base 16 is more commonly known as…?
9. 12 in Hex is…?
10. Converting the binary number 1101 to Hex is…?

37
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

11. Why use Hexadecimal?

Quiz 3
1. ASCII characters use how many bits?
2. What is the new standard for representing the characters of all the languages

h
of the world?
3. How many bits does Unicode use per character?

ks
4. What’s the advantage of using Unicode?
5. What is a vector graphic?

Ba
6. What is a pixel?
7. What is the main difference between a bitmap and vector graphic?
8. How many colours can be stored with 2 bits?
r
9. How many colours can be stored with 3 bits?
M
10. What’s the formula to work out the colour depth?
11. What is colour depth?
h

12. The formula for size in bits =


it

13. The formula for size in bytes =


W

Quiz 4
1. Sound waves are continuously changing and are described as…?
2. Anything stored on a computer must be stored in digital format as a series
de

of…?
3. The device that takes real-world analogue signals and converts them to a
Co

digital representation is called an…?


4. A sample is…?
5. The accuracy which a/n analogue sound wave is converted to a digital format
depends on…?

38
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
6. Sample resolution is…?
7. Sample rate is…?
8. Formula for the file size for a sample =
9. One way to speed up the rate of file transfer is to…?
10. Compression is used to…?
11. What is lossy compression?
12. What is lossless compression?

h
13. What is run length encoding (RLE)

ks
14. What is Huffman coding?

Ba
r
M
h
it
W
de
Co

39
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

Chapter 3.3 – Fundamentals of Data Representation


Exam Questions
3.3.1

h
ks
Ba
r
M
h
it
W
de
Co

40
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

41
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

42
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.3.2

h
ks
Ba
r
M
h
it
W
de
Co

43
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

44
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

45
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

46
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

47
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

3.3.3

h
ks
Ba
r
M
h
it
W
de
Co

48
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.3.4

h
ks
Ba
r
M
h
it
W
de
Co

49
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

3.3.5

h
ks
Ba
r
M
h
it
W
de
Co

50
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

51
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

3.3.6

h
ks
Ba
r
M
h
it
W
de
Co

52
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Chapter 3.4 – Computer Systems Quizzes
Quiz 1
1. Circuits in computers are made of many logic gates, name the main three
2. Boolean variables are either…?
3. A NOT gate…
4. The property of a the AND gate…

h
5.

ks
What is a truth table?

Quiz 2

Ba
1. Define the term hardware?
2. Define the term software
3. Define the term system software r
M
4. Define the term application software
5. Give examples of application software
h

6.
it

What is an operating system?


7. What is memory management?
W

8. What are embedded systems?


9. What is utility software?
de

10. What is encryption used for?


11.
Co

What is the purpose of compression software and name an example?

Quiz 3
1. What is in the Von Neumann architecture?
2. The processor responds to and processes the instructions that drive the
computer. It contains the…?
53
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

3. What functions does the ALU carry out?


4. What is the purpose of the control unit?
5. What is the purpose of the clock?
6. What is the purpose of the bus?

h
Quiz 4
1.

ks
Describe the fetch execute cycle
2. What happens during the fetch stage?

Ba
3. What happens during the decode part of the cycle?
4. What happens during the execute stage?
5. r
How does greater clock speed affect instructions?
M
6. How is clock speed measured?
7. What is cache memory?
h

8.
it

What is the purpose of RAM?


9. State the properties of ROM
W

10.What does secondary storage refer to?


11.How does a magnetic disk (e.g., HDD) read and write data?
de

12.How does an SSD work?


13.How does an optical disk work?
Co

14.What does cloud storage refer to?


15.

54
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Chapter 3.4 – Computer Systems Exam Questions
3.4.1

h
ks
Ba
r
M
h
it
W
de
Co

55
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

56
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.4.2

h
ks
Ba
r
M
h
it
W
de
Co

57
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

58
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.4.3

h
ks
Ba
r
M
h
it
W
de
Co

59
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

3.4.4

h
ks
Ba
r
M
h
it
W
de
Co

60
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.4.5

h
ks
Ba
r
M
h
it
W
de
Co

61
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

62
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

63
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

3.4.6

h
ks
Ba
r
M
h
it
W
de
Co

64
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

65
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

Chapter 3.5 – Fundamentals of Computer Networks


Quizzes
Quiz 1
1. What is the internet?
2. What is the world wide web (www)?
3. What are WANs?

h
4. What is packet switching?

ks
5. What is needed to create a network of computers?
6. What is the purpose of a router?

Ba
7. What is a switch?
8. What is an NIC?
9. What is WiFi?

Quiz 2 r
M
1. What is a LAN?
2. State two benefits of networking computers
3. State three disadvantages of using networks
h

4. What is a network topology?


it

5. Describe a STAR topology


6. Describe a BUS topology
W

7. What is a PAN?
8. What does Ethernet refer to?
9. What is Bluetooth?
de

10. Describe one difference between PAN and LAN?

Quiz 3
Co

1. State two methods of authentication


2. State two ways of keeping network data secure
3. When two computers on a network communicate, they have to use the same
protocol. What is a protocol?

66
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
4. State which protocol would be the most suitable in each of the following
situations:
a. Making a payment securely when purchasing something over the
internet
b. Transferring a file to another computer on a wide area network
c. Transferring an email from one server to another server
5. What protocols are on the Application layer?

h
6. What protocols are on the Transport layer?
7. What protocols are on the Network/Internet layer?

ks
8. What protocols are on the Link layer?

Ba
r
M
h
it
W
de
Co

67
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

Chapter 3.5 – Fundamentals of Computer Networks


Exam Questions
3.5.1

h
ks
Ba
r
M
h
it
W
de
Co

68
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

69
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

70
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.5.2

h
ks
Ba
r
M
h
it
W
de
Co

71
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

72
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.5.3

h
ks
Ba
r
M
h
it
W
de
Co

73
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

74
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

75
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

h
ks
Ba
r
M
h
it
W
de
Co

76
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.5.4

h
ks
Ba
r
M
h
it
W
de
Co

77
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

Chapter 3.6 – Fundamentals of Cyber Security Quizzes


Quiz 1
1. Why is removable media a threat to the security of a network?
2. Suggest two ways that computer users can leave themselves open to hackers
3. Explain what is meant by ‘blagging’
4. What can a company do to reduce or eliminate incidents of blagging?

h
5. What is phishing?

ks
6. Describe one way to detect a phishing email
7. What is meant by shouldering
8. Describe one other way in which a criminal may obtain personal information

Ba
about someone without their consent or knowledge
9. What is penetration testing?
10. Describe two different types of penetration testing
r
11. Describe a method of identification, and give an example of where it might
M
be used
h
it
W
de
Co

78
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Chapter 3.6 – Fundamentals of Cyber Security Exam
Questions
3.6.1

h
ks
Ba
r
M
h
it
W
de
Co

79
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

3.6.2

h
ks
Ba
r
M
h
it
W
de
Co

80
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.6.3

h
ks
Ba
r
M
h
it
W
de
Co

81
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

Chapter 3.7 – Ethical, legal and environmental impacts


of digital technology on wider society, including issues
of privacy Quizzes

Quiz 1

h
1. State three ways technology has changed the way we live and work

ks
2. What are the benefits of driverless cars?
3. What are the drawbacks of driverless cars?

Ba
4. What are the dangers of social networking sites such as Facebook
5. What are the benefits of social networking sites such as Facebook?
6. What factors would you take into consideration when rating an Uber tax
driver?
r
M
7. Name three jobs that you think could be computerised
8. State five jobs that can’t be computerised easily
h
it
W
de
Co

82
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Chapter 3.7 – Ethical, legal and environmental impacts
of digital technology on wider society, including issues
of privacy Exam Questions
3.7.1

h
ks
Ba
r
M
h
it
W
de
Co

83
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

Chapter 3.1 – Fundamentals of Algorithms Quiz


Answers
3.1.1 – Representing algorithms quiz
1. An algorithm is a sequence of steps that can be followed to
solve a task
2. Decomposition involves breaking a problem into a number of

h
smaller problems, so that each smaller problem can be

ks
solved
3. Abstraction is the process of removing unnecessary detail

Ba
from a problem
4. Pattern recognition involves finding similarities or patterns to
r
help us solve more complex problems more efficiently.
M
5. Abstraction
6. Pseudocode: a simple way of describing a set of instructions
that does not have to use specific syntax
h

7. Input: putting data into a computer e.g., pressing the buttons


it

on a microwave
W

8. Process: data is processed by a computer e.g., the


microwave switches to the right mode and heats up the
contents
de

9. Output: meaning information produce by a computer e.g.,


the microwave beeps and the user removes heated food
Co

3.1.2 – Efficiency of algorithms quiz

84
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
1. More than one algorithm can be used to solve the same
problem
2. You can create more efficient solutions to problems given
the resources available.

h
3.1.3 – Searching algorithms quiz

ks
1. Linear search algorithm: a simple search from the beginning

Ba
to the end of the list until the item you want is found
2. Advantages: Quick if searching just a few items, can be
performed on an unsorted list – the items do not have to be
r
in sequence.
M
3. Disadvantages: For very large number of items, it is
inefficient
h

4. Binary search algorithm: works by repeatedly dividing in half


it

the portion of the list that could contain the item, until
W

you’ve narrowed down the possible locations to just one.


5. Advantages: Each time an item is examined, if it is not the
right one, half the list is discarded
de

6. A binary search algorithm is more complex and takes up


more storage space
Co

3.1.4 – Sorting algorithms quiz


1. Merge sort algorithm: a two stage sort. In the first stage the list
is successively divided in half, forming two sublists, until each
sublist is of length on

85
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

2. A list that makes up part of a larger list.What is produced


when a pair of sublists are merged?
3. Advantages: efficient, takes less time to complete (execute)
4. Bubble sort algorithm: works by repeatedly going through the
list to be sorted comparing each pair of elements. If the
elements are in the wrong order they are swapped

h
5. Disadvantages: Slow and inefficient for large lists

ks
Chapter 3.2 – Programming Quiz Answers

Ba
3.2.1 – Data types quiz
1. Integer
2. Real/Float
3. Char/character
r
M
4. A string can be any letter, digit, punctuation mark or symbol
that can be typed Is male/female a valid boolean data
h

type?
it

5. Process: data is processed by a computer e.g., the


microwave switches to the right mode and heats up the
W

contents
6. Output: meaning information produce by a computer e.g.,
de

the microwave beeps and the user removes heated food


Co

3.2.2 – Programming concepts quiz


1. Variable declaration: variables are declared at the start of a
program so that when the program runs, the appropriate

86
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
amount of memory can be reserved to store the data, e.g., x
= 10
2. Constant declaration: there are certain values that remain
the same (constant) while the program runs
3. Iteration: repeating steps, or instructions, over and over
again, e.g., FOR loops (count controlled), WHILE loops
(condition controlled)

h
4. FOR and WHILE loops

ks
5. Selection: a decision or question e.g., IF statement
6. Subroutine: a section of code that performs a specific task

Ba
i.e., procedure or function
7. Procedures reducing coding and debugging time
r
8. Function: similar to procedures, they are named,
M
self-contained sections of code. The key difference is that
they always return a value, using a RETURN statement
whereas a procedure does not
h
it

3.2.3 – Arithmetic operations in a programming language quiz


1. Addition
W

2. Subtraction
3. Multiplication
de

4. Real division
5. Integer division
6. Modulus to return remainder
Co

3.2.4 – Relational operations in a programming language quiz


1. Equal to
2. Not equal to
3. Less than

87
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

4. Greater than
5. Less than or equal to
6. Greater than or equal to

3.2.5 – Boolean operations in a programming language quiz


1. NOT: True only if false
2. AND: True if both are true

h
3. OR: True if at least one is true

ks
3.2.6 – Data structures quiz

Ba
1. Data structures: a method of organising and storing data
2. List/array
3. 1D array is a list of variables with the same datatype,
r
whereas 2D arrays have similar data types
M
4. Array (list): a series of data in order with a corresponding
value
h

5. Multi-dimensional lists: a list within a list


it

3.2.7 – Input/output and file handling quiz


1. Write: adding text to a file, e.g., the user inputting a list of
W

names
2. Read: and then we can read them back and print them out
de

or store them in an array

3.2.8 – String handling operations in a programming language quiz


Co

1. Length: number of characters in the string


2. Position: where the character is in a string (remember a string
starts with position 0 (not 1)
3. Substring: part of a string e.g., Kings

88
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
4. “Ark” is a substring of “Ark Kings Academy”
5. Concatenation: “joining together”

3.2.9 – Random number generation in a programming language quiz


1. Random.randint(1,10): generates a random number
between 1 and 10
2. Random.randint(1,100): generates a random number

h
between 1 and 100

ks
3. Random.randint(50,100): generates a random number
between 50 and 100

Ba
3.2.10 – Subroutines language quiz
1. Advantage of subroutines include:
o Makes the problem easier to solve because it has
r
been decomposed into smaller parts
M
o Each subroutine can be tested separately
o Subroutines can be used several times within a
h

program
it

o Subroutines can be stored in a subroutine library and


W

used in different programs


o Several programmers can work on the same large
program, writing different subroutines, so a large job
de

will get done more quickly


o Maintenance is easier. If the problem changes, it is
Co

much easier to change a subroutine than search


through a large program for a specific line
2. A section of code that when programming can be called by
another part of the program with the purpose of returning
one single value

89
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

3. Function must return a value but in procedures it is optional(


Procedure can return zero or n values).
4. Local variable: only exist while the subroutine is executing
and are only accessible within the subroutine

3.2.11 – Structured programming quiz


1. Modular design, or "modularity in design", is a design

h
approach that subdivides a system into smaller parts called

ks
modules A value passed to a function (or method) when
calling the function

Ba
2. A return statement ends the execution of the function call
and "returns" the result, i.e. the value of the expression
following the return keyword, to the caller
r
3. This means it uses subroutines to break down the program in
M
to manageable chunks of code.
4. The structured approach has the advantages listed above.
h

In addition, the use of programming structures makes a


it

program relatively easy to understand, debug and maintain


W

3.2.12 – Robust and secure programming quiz


1. Data validation: making sure data is correct and useful
2. Authentication routines: i.e., program which uses a username
de

and password
3. Normal data: typical
Co

4. Boundary data: extreme


5. Erroneous data: incorrect

90
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.2.13 – Robust and secure programming quiz
1. High level is nearer to human understanding whereas low
level is near to machine code
2. High-level language: such as Python visual Basic, Delphi,
Java and many others
3. Low-level language: processor-specific assembly langauges
and machine code

h
4. Machine code: a computer programming language

ks
consisting of binary or hexadecimal instructions which a
computer can respond to directly

Ba
5. Assembly language: translated using an assembler. One
statement translates into one machine code instruction
6. Interpreter: used to translate high-level language code into
r
M
machine code
7. Compiler: translates a program written in a high-level
programming language into machine code
h

8. Assembler: converts assembly language into machine code


it

3.3 Fundamentals of data representation


W

Quiz 1
1. 1 or 0, on or off
de

2. A single 1 or 0, a binary digit


3. A byte
4. A kilobyte
Co

5. A megabyte
6. A gigabyte
7. A terabyte
8. A petabyte
9. Ten digits (0 – 9)
10. 128,64,32,16,8,4,2,1

91
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

Quiz 2
1. 255
2. Overflow
3. Multiplying
4. Dividing
5. 2
6. 3

h
7. A nibble

ks
8. Hexadecimal (or Hex)
9. C

Ba
10. D
11. Numbers are expressed more compactly and they are easier to understand
and remember

Quiz 3 r
M
1. 7-bits (8-bits for extended ASCII)
2. Unicode
3. 8-32
h

4. Can represent more characters


it

5. A digital drawing made up of lines and shapes with specific properties such
as line style, line colour, fill colour, start point and end point
W

6. Short for picture element, a single point in an image, which can have its
colour set independently
7. For bitmap images, as the size of the picture increases, more pixels will be
de

needed
8. 4
Co

9. 8
10. The number of colours to the power of 2
11. Used to describe the number of bits used to represent each pixel
12. Image width x image height x colour depth
13. (image width x image height x colour depth)/8

92
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
Quiz 4
1. Analogue
2. Binary numbers
3. Analogue-to-digital converter
4. A measure of amplitude at a point in time
5. Sample resolution and sample rate
6. The number of bits used to store each sample

h
7. The frequency with which you record the amplitude of the sound
8. Sample rate x sample resolution x number of seconds

ks
9. Compress them to make them smaller
10. Reduce the amount of storage space needed, allow large files to be

Ba
transmitted as an attachment, allow a file to be transmitted in less time
11. Data encoding where files are compressed by removing some of the detail
12. Data encoding method where files are compressed but no data is lost
13. r
Data having the same value is stored using frequency
M
14. A compression technique used to reduce the number of bits used to
represent each letter. The more frequently a letter appears in the text, the
fewer bits are used to represent in a text file
h

15.
it
W
de
Co

93
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

3.4 Computer Systems


Quiz 1
1. AND, OR and NOT
2. TRUE or FALSE (TRUE = 1, FALSE = 0)
3. Inverts the input (opposite of the input)
4. The output is only TRUE (or 1) if the inputs are both TRUE (or 1)

h
5. Used to assess possible results of a Boolean algebra statement.

ks
Quiz 2
1. Any physical component that makes up the computer

Ba
2. Any program that runs on the computer
3. Programs that are needed to enable the computer to function
4. Programs that enable a user to perform a task
5. Word processing software, spreadsheets, databases, games, mobile phone
aps
r
M
6. A group of programs that manages the computer’s resources
7. Managing where in memory each program and the data it needs will go
h

8. The use of microprocessors/CPUs to control functions in devices e.g.,


Microwave, traffic light
it

9. The operating system, or software that controls and manages the computer
system
W

10. To keep sensitive data safe from cyber-criminals or unauthorised access by


converting the original information into ciphertext
11. Reduces the size of a file, e.g., WinZip
de

Quiz 3
Co

1. The program is stored in main memory and instructions are fetched and
executed sequentially, and there is a single memory (and bus system) for
accessing both data and programs
2. Arithmetic Logic Unit (ALU), Control Unit (CU), clock and bus
3. Logical operations, shift operations and arithmetic operations
4. Coordinates all the activities taking place inside the CPU
94
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
5. Controls processor timing
6. Passes data between the components of the CPU

Quiz 4
1. Processor fetches and instruction, decodes it and then executes it. The
processor executes one instruction at a time
2. The address of the next instruction to be executed is fetched from the
register (a special fast memory location in the processor) where it is held.

h
The register is incremented so it points to the next instruction to be fetched.

ks
The instruction at address A is fetched from memory and put into a special
register ready to be decode

Ba
3. The control unit decodes the instruction to see what has to be done next
4. The instruction is executed. Depending on what the instruction is, this could
involve fetching data from memory and loading or adding it into the register,
or jumping to another instruction in the program
r
5. Instructions will be executed more quickly
M
6. In Gigahertz (GHz), one billion cycles per second
7. Intermediary between the main physical RAM and the CPU, it makes data
h

frequently used by the CPU available more quickly


8. To hold programs currently being executed, and the data the programs are
it

using
W

9. You cannot write over the contents once it is created and is non-volatile
10. Long term storage such as HDDs, optical disks, SSDs
11. Rigid rotating platters coated with magnetic material. Ferrous (iron) particles
de

on the disk are polarised to become either a north or south state which
represent 0s and 1s.
12. Solid State Drives are built from special types of transistors that do not lose
Co

their state when the power is switched off


13. A low-powered laser to read the disk by bouncing light onto the surface,
which is covered in pits and lands which represent 1s and 0s.
14. Saving data in an off-site storage system maintained by a third party, e.g. ,
Google or Microsoft

95
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

3.5 Fundamentals of Computer Networks


Quiz 1
1. A famous wide area network, a collection of inter-connected networks
2. Websites stored on webservers connected to the internet, all the information
on the world wide web is in documents know as web pages
3. Wide area networks cover a wide geographical area, typically under

h
medium/large companies
4. A file is broken up into data packets and each packet is given a header

ks
containing key information
5. Routers, switches and Network Interface Cards

Ba
6. Designed to route data packets across a wide area network such as the
internet
7. A component of a LAN than knows the MAC address of each individual
device connected to it locally r
M
8. Required to connect any network-enabled evice
9. A wireless connection, a family of protocols or rules that make wireless
networking run smoothly
h

Quiz 2
it

1. Local area network which usually covers a relatively small geographical area
2. Sharing resources, centralised management
W

3. If the main server goes down files cannot be accessed, if there’re many users
bandwidth can be reduced, difficult to secure the system from hackers,
viruses may affect the network, larger networks are difficult to maintain
de

4. The physical layout of a network


5. All computers have their own cable connecting them to the switch, which
Co

routes messages to the correct computer. A powerful computer called the


server controls the network
6. Connected to a single backbone cable and all computers share this cable to
transmit to each other

96
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
7. A computer network used for data transmission among devices such as
computers, cell phones and laptops
8. A family of protocols of networking rules used in LANs
9. Wireless technology using short-range radio waves/up to 10m.
10. PANs are centred around an individual user. LANs are intended for multiple
users. PANs can only communicate with devices within a few metres of each
other. LANs can be connected via cable over several hundred metres.

h
Quiz 3

ks
1. Usernames and password combinations; biometric methods such as
fingerprint recognition, iris or retina scanners, voice or face recognition, palm

Ba
scanners.

Password protection – users have to enter username and password. User


may be locked out after 3 failed attempts. Passwords of 8 characters or more
r
with a combination of letters, digits and symbols may be required.
M
Biometric methods such as fingerprint scan, voice pattern sample or retinal
h

scan. The genuine scan is stored when the person registers and that is
compared with the scan taken when trying to gain entry to an area building,
it

show a passport etc.


W

2. Answers may include: Encryption; physical security; access rights.


Anti-virus software prevents harmful programs from being installed on the
computer. Prevents data from being corrupted or stolen.
de

Penetration testing may expose security weaknesses so that these can be


fixed.
Co

Automatic software updates will remove harmful code that has been planted
in the software by a hacker
3. A set of rules governing data transmission.
4. Answers:
a. HTTPS
97
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

b. FTP
c. SMTP
5. HTTP, FTP, SMTP, IMAP
6. TCP, UDP
7. IP

h
ks
Ba
r
M
h
it
W
de
Co

98
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.6 Fundamentals of Cyber Security
Quiz 1
1. They may be inserted into a computer that has a virus, which is transferred
to the network.
2. By not having a virus checker installed on their machine. By using a week
password or leaving the default password when installing new software
3. Blagging is getting a friend, colleague or total stranger to divulge their

h
personal details e.g. password or bank account number.

ks
4. Staff training
5. Phishing emails are designed to steal money, get login details, or steal an
identity.

Ba
6. Not personally addressed. Poor spelling and grammar. You may be asked to
enter data such as a bank account number or password as well as personal
details such as name, address, birth date and so on. You may be asked to
r
click on a link to download a free game or verify your bank account details.
M
7. Shouldering is looking over someone’s shoulder while they enter a password
or PIN, to get that information.
8. Pharming, where code is put on your hard drive or on the actual server itself.
h

When you type in a genuine website address, pharming redirects you to a


it

fake/bogus website and you will be asked to give personal details.


9. Penetration testing is used to find any security weaknesses in a system. It
W

attempts to gain access to resources without knowledge of usernames,


passwords and other normal means of access.
10. Black box penetration test, white box penetration test
de

11. Retinal scan or face scan, used in some airports


Co

Fingerprint scan, used by police forces

Voice can be used to control access to a financial database or confidential


information

99
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

Palm print/fingerprint to gain access to a secure area of a building (any other


reasonable suggestions)
12.

h
ks
Ba
r
M
h
it
W
de
Co

100
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com
3.7 Ethical, legal and environmental impacts of digital technology on
wider society, including issues of privacy
Quiz 1
1. Online shopping, texting, social media, able to get information on anything
via the Internet, etc.
2. Cheaper to run because you don’t have to pay a driver
No driver to get tired so can keep going without a break

h
Will drive in a way that optimises fuel consumption/more efficient

ks
Fewer accidents (often driver’s fault, inattention, tiredness etc)
Instead of driving the car you can do something else

Ba
3. It isn’t clear who is at fault in an accident
Expensive at the moment
People might not trust them
A car could be hacked and driven by remote control
r
4. Your information is being shared with third parties
M
Privacy settings revert to a less safe default mode after each redesign
Facebook ads may contain malware
h

Your real friends unknowingly make you vulnerable by sharing with others
Scammers are creating fake profiles so could be grooming young people
it

Bullying, trolling
5. Easy way to share information with friends and family
W

Can use it on your phone so portable, can use it anywhere in the world to
stay in touch
Entertaining
de

Easy to use
6. Cleanliness of car
Co

Politeness of driver
How safe the driving was
Whether the driver knew how to get to the destination
Did the driver help with luggage
7. bank clerk, test pilot, bomb disposal, checkout operator

101
Code with Mr Baksh <<<<<<<>>>>>>> www.codewithbaksh.com

8. Difficult to computerise: gardener, hairdresser, social worker, psychiatrist,


plumber, chat show host, nail technician, singer, footballer etc.

h
ks
Ba
r
M
h
it
W
de
Co

102
Allabaksh Shaik email: allabaksh.s.win@gmail.com Phone: +971527867017

You might also like