Uploaded by aassadoo

IGCSE computer science worksheet with answers

advertisement
Computer Science Worksheet
Chapters 3, 4, 5
Q1: Give the suitable word for the following definitions.
________CPU_________: A component in a computer system that processes
data and instructions.
_____microprocessor_______: An integrated circuit that is able to perform many
of the functions of a CPU.
__internet of things__: The connection of computer systems and everyday
devices, using the internet to allow data to be exchanged.
________RAM_________: A component in the CPU that holds data and
programs that is currently in use.
_____input device________: A device that allows data to be entered into a
computer system.
____hard drive______: A storage device that stores data permanently until it is
deleted by the user.
____address bus________: Wires used for the transmission of addresses
between components in a computer.
_________MAR___________: A component in the CPU that holds the address
of the data or instruction to be located in RAM.
_______CU_______: A component in the CPU that controls all the operations in
the CPU.
______instruction set______: A set of commands that can be processed by a
certain CPU.
_______virtual memory_______: A type of memory that can be used as an
extension to the RAM.
Q2: In which way the data and instructions are given to the computer?
By an input device
Q3: Explain the role of the arithmetic logic unit (ALU).
Component in the CPU that performs all the mathematical and logical
operations when processing data and instructions
Q4: What are the wires used for the transmission of control signals between
components in a computer?
Control bus
Q5: Give 3 examples of:
Input devices:
Scanner, microphone and keyboard
Output devices:
Printer, screen projector and speakers
Q6: Choose (True or False) for the following statements.
1- Output device is a device that can be used to obtain the results of data that
has been processed. (True - False)
2- Input device is a device that allows data to be entered into a computer
system. (True - False)
3- Automated system is a system that is designed to operate with the need
for human intervention. (True - False)
4- Sensor is a type of input device that is used in an automated system. (True
- False)
5- Primary storage is a type of storage that is designed to store data
permanently until it is deleted by the user. (True - False)
6- Primary storage is a type of storage that is directly accessed by the CPU.
(True - False)
7- ROM stands for read only memory. (True - False)
8- RAM stands for random access machine. (True - False)
9- RAM is a volatile storage. (True - False)
10- ROM is non-volatile storage. (True - False)
11- ROM is a type of primary storage that stores the start up instructions for
the computer. (True - False)
12- If the power is turned off, the contents of RAM are retained. (True - False)
13- Magnetic storage is a type of storage that uses the properties of magnetism
to store data. (True - False)
Q7: What are the three main types of secondary storage?
Magnetic, optical, and solid state storage
Q8: Fill the spaces with one of these words:
Cloud storage- Server- Network- Transmission Media- Static IP-
Data packet-
Hardware
_______server______: A component that acts as a central resource for the storage of
data and applications or for providing a service.
______network_______: Computers and devices that are joined together using
cables or wireless technology.
_______cloud storage_______: Data storage that is owned by a third party and
accessed by the user, using the internet.
______transmission media________: The cables that are used to transfer data in a
network.
______data packet_______: A unit of data that is used to transmit data across a
network.
______static IP_______: An IP address that does not change each time the device
connects to a network.
______hardware_______: All the physical components that you can see in a
computer system.
Q9: What are the benefits of storing data in the cloud?
- Its storage can be increased or decreased as needed by the user
- Can be accessed from any device
- No need to pay for any hardware to store it
Q10: Explain the role of programming languages.
Allow developers to create software, applications and programs
Q11: Write the types of programming languages:
High and low level
Q12: What is the meaning of translator?
Software that converts a written code in a programming language to another
Q13: Who is responsible of organizing interrupts into an order based upon
priorities?
Interrupt handler
Q14: Who is responsible of converting code written in one programming
language into another?
complier
Q15: Circle the correct answer.
-
An interrupt has a:
-Multitasking unit
-Priority Level
-special processor
-
Unit number
- When you write computer programs you will make specific software that
allows you to:
-Write and edit the programs you write
-
Test the programs you write
-
Run the programs you write
-
All of the above
-The creation of files by the user needs to use:
-Multitasking
-Interrupts
-Bootstrap
-
Application software
-The interrupt sent to the processor to tell it that something needs its
attention is considered as:
-Signal
-Interface
-Command line
-Natural Language
Q16: Write the roles of Operating System:
-
Provides an interface and platform to run applications
-
Manages files, drivers, peripherals, memory, multitasking,
interrupts, and user accounts
Q17: What is the difference between high-level language and low-level
language?
High level language uses English-like commands (friendlier with user), while lowlevel language uses the computer’s language (binary code of 0s and 1s – more
difficult for the user to understand).
Q18: What is the meaning of interrupt handler (IH)?
A program that organizes interrupts into an order bases upon priorities.
Q19: Choose (True or False) for the following statements.
-The operating system can't allow the user to move files. (True - False)
- The operating system allows the creation of directories that the files can be stored
within. (True - False)
High-level language is easier for users to understand, read, and write. (True False)
-Low-level language is easier for users to debug code. (True - False)
Most computers need a user to set up an account.
(True - False)
-The software could be written by anyone in any language. (True - False)
Q20: Write the different types of interface:
GUI, natural, and command line
Q21: Compare between the types of interfaces according to the functionality.
GUI: uses windows, icons, pointers, and menus.
Natural: user types or speaks commands
Command line: user types commands
Q22: What does System software manage?
A computer’s software and hardware
Q23: How is application software different from system software?
Application software is a software the allows the user to perform a certain
useful task, while system software manages it alongside hardware.
Q24: What is the meaning of interrupt service routine (ISR)?
Program the receives an interrupt and performs the required action(s).
Q25: Choose (True or False) for the following statements?
1-Digital currency is a currency that exists electronically rather than physically.
(True - False)
2-The internet is the infrastructure that is used to access the World
Wide Web. (True - False)
3-Packet interception is a unit of data that is used to transmit data across a
network. (True - False)
4-Blockchaine is a method that is used to track all the transactions made with a
cryptocurrency. (True - False)
5- Domain name server is a network component where the web pages for a
website are stored. (True - False)
6- HTTP is a secure version of HTTPS protocol. (True - False)
Q26: Give the suitable word for the following definitions
--------website---------: A collection of web pages, normally about a related topic or
purpose.
-------network--------: Computers and devices that are joined together using cables
or wireless technology.
---------web browser---------: A piece of software that retrieves and displays web
pages.
------------URL--------------: Another name for the text-based address for a website.
-------------DNS--------------: A special server that contains a database of domain
names and their corresponding IP address.
---------bookmark------------: A link that can be created to allow you to quickly find a
web page again.
--------cookie-------- Small text file that is used to store personal data, by a web
browser.
----------------two-step verification-----------------: A process that involves inputting
two different kinds of data to enter an account or device.
----------------biometric password----------------: A type of password that uses a
person’s biological data, such as their fingerprint.
Q27: What are the main types of viruses?
Worm, trojan horse, spyware, adware, and ransomware
Q28: What is the difference between of biometric password and biometric
device?
A biometric password that uses a person’s biological data like his fingerprint or face
ID, while a biometric device allows the user to record and input it.
Q29: What are the security solutions that can be used against hackers?
Anti-virus, anti-malware, 2-step verification, firewall, and a strong password.
Q29: Give three reasons that make hackers try to hack.
Get unauthorized data to steal or corrupt them.
Q30: Give an example for web browser.
Google chrome. Safari, Microsoft edge…
Q31: Give an example for search engine.
Google, Bing, Yahoo…
Q32: How is a web browser different from a search engine?
A web browser receives and displays webpages, while a search engine helps
find the websites.
Q33: What are the types of cookies?
Session and persistent
Q34: What do we mean by digital currency?
A currency that’s electronic instead of physical.
Q35: What is the purpose of a web browser?
Receives the user’s input information to fetch websites and display them.
Q36: What are the main functions of a web browser?
Receives and displays web pages.
Q37: What is the difference between Pharming and Phishing?
Pharming is downloading a dangerous (malicious) software in a user’s hard
drive to direct him to a fake website that looks genuine to encourage him to
enter their personal data, leading it to get stolen, while phishing is sending a
user a fake email that looks genuine to encourage him to also enter his
personal data by clicking on a fake link or website or responding to the email.
Q38: What do we mean by access level?
Access level is a set of rules or permissions that defines what a user can
perform in a system.
Q39: What is the meaning of software?
Series of instructions written in a specific programming language that performs
a certain task.
Q40: Why do we use databases?
To helps us store and control data
Q41: Do we consider peripheral as a hardware device or software device?
Explain your result.
Hardware; used to input, store, or output data from a computer that isn’t
directly a part of it.
Q42: The machine code is considered as an example of low-level language.
Explain why?
Uses binary code (0s and 1s) which is difficult for the user to understand.
Q43: Choose three roles of operating system and explain their importance.
Manage multitasking: allows the user to perform multiple tasks at
once by deciding which process should be executed next and how long it
needs to get processed before switching to another process.
Manage memory: manages how data moves into and out of hardware
like RAM, as well as checks the process carried out and ensures there’s
enough RAM to perform it only.
Provide a platform to run an application: allows the application
software to run on the computer by fetching instructions from it then
execute them.
Download