Theory-Review Pack (Answer Key)
Theory-Review Pack (Answer Key)
Theory-Review Pack (Answer Key)
Final Term
(2023-2024)
Y8
COMPUTING
Department of ICT/CS
b. Security software
Any software that can secure and protect a digital device, e.g. password
c. Defragmentation
The process of reorganizing files stored on a computing device to ensure
that all parts of the same file are located beside one another on the
d. MAC address:
number programmed into a network interface card that identifies each
device on a network.
e. cyber-attack?
a computer system
Q5. Use the rhyme or poem you created in class to learn the names and values of each of the
following storage units.
• petabyte
• terabyte
• megabyte
• kilobyte
• byte
• nibble
• bit
Low-level language
Q7. What do the letters HLL stand for?
High-level language
Q8. Provide two examples of an HLL.
It refers to the set of all instructions in machine code that a CPU can execute
Q10. What does the term machine code mean?
Something used to convert a computer program into an LLL so that the CPU can
carry out the instructions.
Q12. Use the terms listed below to complete the sentences about the fetch– decode–execute
cycle.
components inside the computer, telling them what to do. Instructions are fetched from main
memory and executed one at a time. The PC always stores the address of the next instruction
waiting to be executed. The instruction being carried out is held in the CIR. When instructions and data
are being passed in and out of main memory, they must go through the MDR. Before a location in
3. X = (A AND B) OR (NOT C)
Q14. Describe two examples of devices used in homes that make use of machine learning.
Mobile phones use machine learning to allow access to devices using image
recognition. Home-heating systems connected to the internet in smart homes
can use details about the times family members enter and leave the house, the
outside temperature and the time of day (among many other data items) to
determine whether to switch heating/air conditioning on or off.
Q15. How is machine learning used to support electronic security online?
• There is less chance of injury at work as fewer humans are involved in the
workplace.
Disadvantages:
• There are unknown costs – computers need to be repaired if they break down.
ACC: Accumulator
a. 3TB in to bytes
3tb *1000=3000 GB
3000 GB*1000=3,000,000MB
3,000,000MB*1000= 3,000,000,000KB
b. 5MB in to bytes
5MB*1000= 5000 KB
5,000KB*1000=5,000,000 BYTES
3,000,000/1000 =3000 KB
3,000 KB /1000=3 MB
3/1000 =0.003 GB
1. __File server
2. __print server
3. ___mail server
4. ____web server
Q23. How can the organizations keep their data safe? List down five methods to secure the
data.