You are on page 1of 9

Delhi Public School

Nacharam
Cambridge Assessment International Education –IN174
Academic Year 2023-2024

Mid Term Revision Toolkit


July 2023

Points to
Key words
remember

Revision
Key Concepts
Worksheets

1
Chapters Wise Key Concepts

Sl. No. Chapter Key Concepts

1 CH-1 Building  Identify the different types of network, such as PAN,


Networks: Network LAN and WAN
Structure and  Advantages and disadvantages of wired and wireless
Security networks.
 Data transmission and echo checks
 Roles of firewalls, anti-virus and anti-spyware in
network security.
 Operating System-its purpose and utilities
2 CH-2 Pseudocode  Identify the important characteristics of pseudocode,
and Algorithms including that it should be short, clear and precise
and should have the start and end clearly shown.

 Follow pseudocode algorithms that use conditional


statements.
 Predict the outcome of algorithms and test that they
meet those outcomes.
 Know how to decompose problems into their sub-
problems.
 Explain the need for searching algorithms.
 Describe and use linear searches.
3 CH-3 Let’s talk  Purpose of operating systems and utility programs.
technology: What’s  ASCII Encoding.
going on inside  Converting denary to binary and vice versa.
 Understand the importance of compression.
 Complete truth tables for AND, OR, NOT gates.
 Understand the roles of primary memory, RAM and
ROM.
 Machine Learning
 Identify the use of augmented reality in familiar
contexts, including education and entertainment.

2
Chapters Wise Key Terminology

Sl. No. Chapter Terminology


1 CH-1 Building  binary (number)
Networks: Network  personal area network (PAN)
Structure and
 local area network (LAN)
Security
 wide area network (WAN)
 copper cable v/s fibre optic cable
 bandwidth
 switch / router / wireless access point
 echo check
 firewall
 virus / antivirus
 spyware / antispyware
2 CH-2 Pseudocode  algorithm
and Algorithms  flowchart
 pseudocode
 construct
 conditional statement
 searching algorithm
 linear search
 decomposition / decompose
 constant
3 CH-3 Let’s talk  operating system
technology: What’s  processor
going on inside  utility programs
 software
 ASCII
 decipher
 encode / encoded
 character set
 compression
 truth table

3
IMPORTANT NOTES

Sl. No. Chapter Notes

1 CH-1 What is a network?


Building Answer: a connection that allows two or more devices to communicate
Networks:
Network What is a network used for?
Structure Answer: to send data, including emails, files and websites
and
Security Compare PAN, LAN and WAN
PAN LAN WAN
PAN is a personal LAN is a local area WAN is a wide area
area network. This is network. This is network. This is
usually two devices multiple devices multiple devices
(or a small number) in connected over a connected over a
close proximity small geographical large geographical
connected for a area (usually defined area (usually defined
specific purpose, for as a single building or as multiple buildings).
example connecting a under a mile). The Some of the hardware
mobile phone to a hardware is not owned by the
television to view (infrastructure) is specific individual or
images, or owned by the network company, but may
connecting a laptop owner so it does not instead be provided
to a printer. use external cabling by a utility company.
or internet. Examples include a
multi-campus
university, local
government, or a
nationwide store.

Why could a wireless connection be better than a wired connection?


Answer: more portable; users can add more devices easily

Why could a wired connection be better than a wireless connection?


Answer: faster transmission; more secure; more reliable

Why is an echo check needed?


Answer: To check whether data has been transmitted correctly.

4
How does an echo check work?
Answer: The sender transmits the data. The receiver transmits the received
data back. The sender then compares both sets of data to determine if they
are the same.

What are the possible problems with an echo check?


Answer: The error may occur in the second transmission. This will cause the
data to be resent when it is not necessary to do so, given that the initial
transmission was correct. Resending the data will slow down is receipt and
could create bandwidth issues.

What can happen if someone gets access to your computer? What can they
do?
Answer: delete data, change data or install malware

What future problems may this cause?


Answer: loss of personal or important data

What can happen if a virus is installed on your computer? What damage can
it cause?
Answer: it can: delete data; fill the hard drive so there is no memory space
left; replicate itself and transmit itself to other people’s computers

What can happen if spyware is installed on your computer? What damage can
it cause?
Answer: it can record your username and password and use them to access
your system in a different way; criminals can use spyware to record bank
details and steal money.

What is the purpose of a firewall?


Answer: to stop unauthorised access to a computer system

How does a firewall stop unauthorised access?


Answer: it scans incoming and outgoing signals and stops those that are not
authorised

What is the purpose of antivirus software?


Answer: to stop viruses

How does antivirus software stop viruses?


Answer: it scans files for viruses and deletes or quarantines any that are
found

What is the purpose of antispyware software?


Answer: to prevent spyware from gaining access to a device

How does antispyware stop spyware?


Answer: it scans files for spyware and deletes or quarantines it

5
2 CH-2 What is pseudocode?
Pseudocode Answer: A form of representing an algorithm without a set syntax.
and
Algorithms When is pseudocode used?
Answer: When planning or designing algorithms.

Why is pseudocode used?


Answer: It is language independent so anyone should be able to understand
it.

What features does pseudocode contain?


Answer: Command words, assignment symbols, mathematical symbols.

What is selection?
Answer: Selection is an instruction within an algorithm
where a decision is made about whether to run a piece
of code or not.

What are the key words used in conditional statements


in programming?
Answer: IF, THEN, ELSE

What are the different symbols that can be used for


comparisons?
Answer: >, <, >=, <=, <> =

What is the format of a pseudocode conditional statement?


Answer: IF THEN ELSE, or if condition: else:
What are the three component parts of a conditional statement?
Answer: the condition; the code to run if true; the code to run if not true

What is decomposition?
Answer: Splitting a problem into smaller problems.

What is a constant?
Answer: A space in memory that stores a value that cannot be changed while
the program is running.

Why do you use a constant instead of a variable?


Answer: To avoid accidental changes. To allow you to change the value once
so it updates it everywhere that it is used.

What is a searching algorithm?


Answer: a series of steps that looks for specific data in a set of data

Why are searching algorithms needed?


Answer: to find data within a set of data

Give an example of a searching algorithm.


Answer: a linear search

6
How does a linear search work?
Answer: each item is checked in turn, starting with the first

3 CH-3 Let’s What is an operating system?


talk Answer: software that allows the user to interact with the computer
technology:
What’s What is the purpose of an operating system?
going on Answer: to allow the user to interact with the computer without needing to
inside understand how it does it

Give some examples of what an operating system can do.


Answer: output an interface; manage the hardware and software

What is a utility program?


Answer: software that comes with the OS and performs housekeeping tasks

What is the purpose of a utility program?


Answer: to perform maintenance and housekeeping tasks

Give examples of what utility programs can do.


Answer: delete malicious files, prevent unauthorized access, data
compression, disk defragmentation etc.

What is ASCII?
Answer: A set of codes to represent characters in a computer

How is each character stored in the computer?


Answer: As a unique binary number

How many bits does standard ASCII have per character?


Answer: 7

How does the number of bits affect the number of characters? Answer: More
bits allows for more characters

What is compression?
Answer: Reducing the file size of a file.

What are the two reasons why compression may be needed?


Answer: to take up less storage space; to increase the speed of transferring
a file

What are logic gates?


Answer: the building blocks of digital circuits that have one or two inputs that
can be turned on or off

What are the 3 different logic gates?


Answer: AND, OR, NOT

7
What does a processor do in a computer?
Answer: it takes instructions and executes them

What is memory in a computer?


Answer: hardware where data is stored temporarily or permanently

What is the purpose of secondary memory?


Answer: to store data in the long term and to create additional storage
capacity

Where do you store data when you save it on a computer?


Answer: hard drive, solid state drive, memory stick

What is the purpose of RAM in a computer system?


Answer: Currently running programs and data

What will ROM typically store?


Answer: Start up instructions, part of the operating system, some programs if
a system that has limited function
.
What is machine learning?
Answer: when a program is able to automatically adapt its own processes or
data

Give an example of machine learning.


Answer: Recognising images or voices, or playing a game

What is a robot?
Answer: a machine that moves to mimic human actions

What is artificial intelligence?


Answer: a computer program that makes decisions to determine its actions
to simulate human behaviour

What is augmented reality?


Answer: A computer generated image superimposed on the real world

Give an example of an augmented reality system.


Answer: An application that allows you to view an object from all angles

How could augmented reality be used in education?


Answer: To view objects from different perspectives or objects that couldn’t
be ordinarily viewed within the local environment.

How could augmented reality be used in entertainment?


Answer: To add reality to computer games or to combine fantasy and reality
in films and advertising.

8
APPLICATION BASED WORKSHEETS LINKS

https://drive.google.com/drive/folders/1KB9ZzGHFHnqp7IXHugSf06WhPVQB-Cab?usp=sharing

Note: The above link contains three worksheets. Ensure that you reference the important notes
and the revision worksheets thoroughly.
Soft copy of the enclosed worksheets will be shared along with the revision toolkit.

You might also like