0% found this document useful (0 votes)
6 views

Computer Science New Worksheet

The document is a Year 10 revision worksheet covering various topics in computer science, including binary and hexadecimal conversions, logic gates, biometric passwords, firewalls, algorithms, program development life cycles, cyber security, databases, and validation checks. It includes exercises for students to complete, such as converting binary numbers, drawing logic circuits, and answering questions about security measures. The worksheet is designed to help students prepare for assessments in computer science concepts and practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Computer Science New Worksheet

The document is a Year 10 revision worksheet covering various topics in computer science, including binary and hexadecimal conversions, logic gates, biometric passwords, firewalls, algorithms, program development life cycles, cyber security, databases, and validation checks. It includes exercises for students to complete, such as converting binary numbers, drawing logic circuits, and answering questions about security measures. The worksheet is designed to help students prepare for assessments in computer science concepts and practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Year 10 Revision Worksheet

1 A computer stores data in binary form. Binary numbers can be represented as hexadecimal and denary numbers.
(a) Convert the 8-bit binary number 01010101 to denary

(b) Convert the binary number 11000000 to hexadecimal

(c) Convert the hexadecimal number 1A to denary

2 (a) Tick to show which logic gates will give an output of 1 for the given inputs A and B.

(b) Draw the logic circuit for the given logic statement:

X = (A XOR B) AND (B OR NOT C) Do not attempt to simplify the logic statement. All logic gates must have a
maximum of two inputs.
3 Adele chooses to set a biometric password for her mobile device, instead of a personal identification number
(PIN).

(a) State what is meant by a biometric password

(b) Give two reasons why a biometric password is more secure than a PIN.

(c) Adele has a software-based firewall installed on her mobile device. The firewall gathers data about the traffic
coming into and going out of her mobile device. Explain how the firewall uses the gathered data to keep the
mobile device more secure.
4

5 This algorithm checks the temperature of hot food being served to customers.
Complete the trace table for the algorithm using this input data: 75, 78, 84, 87, 91, 80, 75, 70, 65, 62, –1, 20

6
7 Stages of program development life cycle

8 A register stores the binary number:

(a) Give the denary number for the binary number stored in the register

(b) Give the hexadecimal number for the binary number stored in the register
(c) A logical left shift of two places is performed on the binary number stored in the register. Complete the
binary register to show its contents after this logical left shift.

(d) The negative denary number −99 needs to be stored in the register. Complete the register to show the
binary number that would be stored, using two’s complement. Show all your working

(e) The number 01001100 is added to 11100011 Add the two 8-bit binary numbers, using binary addition.
Give your answer in binary. Show all your working.

9 (a) Draw and annotate a diagram that demonstrates the cyber security threat of data interception

(b) Identify one security solution that will help keep data safe from data interception and state why it will help
keep the data safe.
10 The table contains terms and descriptions about the internet. Complete the table with the missing terms and
descriptions

11 A database table called Horses stores details about the horses kept at a horse sanctuary
(a) State the number of records in this database table.

(b) Give the name of the field that is most suitable to be the primary key. State the reason for this choice.

Field ..

Reason ..

(d) The database only allows the data types:


• Boolean
• character
• date/time
• integer
• real
• text.
Complete the table to show the most appropriate data type for each field. Each data type must be different.
(e) Complete the structured query language (SQL) to return the code and breed of all the horses whose breed
originated in Scotland.
......................................... Code, Breed,

FROM .........................................

WHERE ......................................... = "Scotland"

12 A type of validation check is a length check. Another type of validation check is used to make sure that any
date entered is in the dd/mm/yyyy style: dd means day, mm means month and yyyy means year.
(a) State the type of validation check used.

(b) Give one example of normal test data and one example of abnormal test data you should use to make sure
the check in part (a) is working properly. State a reason for each of your choices of test data.

Normal

Reason

Abnormal

Reason

You might also like