![]() A B C D ![]() A B C D ![]() D B C A ![]() C A B D ![]() D B C A ![]() B A C D ![]() A B C D ![]() B A D C ![]() FLOAT BOOLEAN INTEGER Hint: Please write your answer in capital ![]() A B C D ![]() A B C D What is denary 55 in 8 bit binary? 11001100 00001101 11100110 00110111 What is denary 55 in hexadecimal? 3A AA 58 37 what is the denary of 11001100? Convert 2BB from hexadecimal to unsigned binary. 001010101010 001010111011 110011001100 001100110101 1 2 4 8 16 finish up to 8 bits32 64 256 34 68 128 34 68 256 32 64 128 What is computational thinking? Using a set of techniques and approaches to help to solve problems Giving instructions to a computer Thinking like a computer - in binary None of the above Which computational thinking technique involves breaking a problem down into smaller parts? Algorithm Generalisation Abstraction Decomposition There are 3 pillars of computational thinking except Abstraction Decomposition Coding Generalisation "Deciding whether to use the DayTimeRate or EveningRate functions to calculate a customers fare" ,Is an example of which of the following. Sequence Sorting Iteration Selection Which sorting algorithm shifts elements instead of swapping elements if needed in each pass Merge Sort Selection Sort Insertion Sort Bubble Sort We are sorting the following list in ascending order: 1 4 2 9 3 8 5 What does the list look like after one pass of the bubble sort algorithm 1 2 4 3 8 5 9 1 4 2 5 3 8 9 4 2 9 3 8 5 1 ![]() A B C D ![]() A B C D ![]() A B C D ![]() B C D A Sort the following list using Bubble sort and write the position of numbers at the end of each pass.5 1 4 2 8 (Note: use single space to seperate numbers) pass-1 pass-2 Sort the following List using Merge Sort 38 27 43 3 9 82 10
A) Wide Area Network B) Wireless Area Network C) Its a Car D) None
A) Local Area Network B) Limited Area Network C) Lonly and No work D) London Area Network
A) All B) Wide London Area Network C) Wireless Local Area Network D) Wide Local Area Network
A) Eden's Network B) All C) WWW D) The internet
A) using wires to connect computers B) using wifi to connect computers C) group of interconnected digital devices D) Two or more computer connected together
A) WAN B) PAN C) WLAN D) LAN
A) Publically owned B) None C) All D) Privately Owned
A) Small geographical area, uses internal hardware B) Large geographical area, uses external hardware C) Large geographical area, uses internal hardware D) Small geographical area, uses external hardware
A) How much power is available at any moment in time B) Type of Ethernet cable, e.g. CAT5e, CAT6 C) Available bandwidth D) Distance from a WAP (if using WiFi) E) Electromagnetic interference
A) Wired B) Wireless
A) Fibre optic cable B) Coaxial cable C) Copper twisted pair cable
A) To control access to services B) To give users files C) To set up web pages
A) Client Server B) Peer to peer C) There is no such network
A) They centrally stores files or software B) They manages clients C) They have equal status with clients D) They processes requests
A) Router B) NIC C) Switch D) Ethernet Cables
A) Wifi B) Bluetooth C) Ethernet Cable
A) .edengirlswalthamforest.com B) WWW C) Https D) information/term-dates/
A) Donald trump's picture B) Google lock C) padlock and https://
A) A computer that is part of a bigger network B) A computer that is not connected to a network C) the queens computer
A) Partial Mesh B) BUS C) RING D) Star E) Full Mesh
A) A location main memory that holds a value, the value can be changed B) Something that changes C) A data value that can be changed, or changes
A) x = 3 B) x += 3 C) set x = 3 D) x == 3
A) A value that does change B) A value that does not change C) A location main memory that holds a value, the value once set, can be changed as a result of the execution of the program D) A location main memory that holds a value, the value once set, cannot be changed during the program's execution
A) / B) <= C) >= D) <> E) ==
A) =! B) =Not C) Not= D) !=
A) <= B) <> C) >= D) => E) <=
A) One rectangle after another B) One parallelogram after another C) One diamond after another ![]()
A) 4 B) 5 C) 10 D) 13 E) 6
A) One instruction is executed after another B) Different instruction(s) are executed, depending on the evaluation of a condition C) Instructions are repeated
A) Iteration B) Selection C) Sequence ![]()
A) Selection B) Sequence C) Iteration
A) Parallelogram B) Circle C) Rectangle D) Diamond |