EOT1 Computing Revision Stage 8 PDF

Summary

This document is a revision guide on computing, covering topics such as data management in spreadsheets and databases, operating systems, and basic programming concepts. It's categorized by computer science topics.

Full Transcript

COMPUTING REVISION - Nhat Vi I. Unit 3 - Managing Data 8MD.01: Key Features of Models (including simulators) 1. What is a model in computing? Model: a digital data representation of a real-life scenario; the scenario is broken down into individual attributes, which are represented as data items i...

COMPUTING REVISION - Nhat Vi I. Unit 3 - Managing Data 8MD.01: Key Features of Models (including simulators) 1. What is a model in computing? Model: a digital data representation of a real-life scenario; the scenario is broken down into individual attributes, which are represented as data items in the model. 2. What is a simulator, and how is it different from a model? Simulators are interactive. 3. What are the four key features of models? 4. What does scalability mean? Scalability = how easy it is for something to be made bigger. 8MD.03: Using Spreadsheets for Modeling and What-If Analysis 1. What is a spreadsheet; can you remember (from Grade 6) what a cell reference is for a cell and a range? Spreadsheet: an application that uses rows and columns to organise data and carry out calculations using that data. 2. What is "what-if analysis"? What-if analysis: a way of investigating a scenario using a data model, where one or more pieces of data are adjusted to see how it affects other parts of the model. 3. What does "what-if analysis" help you understand? What-if analysis helps you understand how different changes can impact the results. 8MD.07, 8MD.04, 8MD.06: Identifying what Data is Required and Evaluating the Suitability of Data and Databases 1. What is data? Data: raw facts and figures. 2. What is a database? Database: an application that is used to organise data that can then be stored, processed and accessed electronically. 3. What is a primary key? Primary keys must be unique; what does 'unique' mean? Primary key: a unique identifier for each record in a database table 4. What 3 things make data suitable for a given purpose? Accurate: has enough details that are correct. Relevant: helpful and not off-topic. Sufficient: has enough information for what's needed (the 'purpose'). 5. What 2 things are important for the structure of a database? 8MD.02, 8MD.05: Data Capture Forms and Data Validation 1. What is a data capture form? Data capture form: a predefined document (electronic or paper based) that contains headings and instructions to collect appropriate data for a specific purpose. 2. What is data validation? Data validation: an automatic check to reduce the chance of errors being made when data is entered into a computer system. 3. One type of data validation controls what information users can give you. What is it called? Can you give examples of it? Input mask: a special input or layout that controls how data is entered into a database or data-capture form. Examples: toggle button, dropdown menu, radio buttons, checkbox… 4. What are 5 types of checks you can do, to make sure the user gave you good data? Type check: Ensures that data is a certain data type. Length check: Ensures that a data item has the correct number of characters. Presence check: Ensures that a data item is not left out/left empty. Format check: Ensures that data matches a pattern. Range check: Ensures that a date or number is within an upper and lower limit. 5. What is the difference between a format check and a length check? Format check ensures that that data matches a pattern, length check ensures that a data item has the correct number of characters. II. Unit 2 - Computer Systems 8CS.01: Operating Systems 1. What is software? Software: the instructions that tell a computer system how to complete a task. 2. What is hardware? Hardware: the physical parts of a computer that you can touch and see 3. What is an operating system (OS) in simple terms? Operating system: the systems software that manages hardware and software, giving the user an interface to operate the computer. 4. What are the basic functions of an OS? - File Management: Saves, moves, and deletes files. - Program Management: Starts and runs apps. - Hardware Management: Controls devices like the keyboard, printer, and mouse. - Memory Management: Ensures programs have enough space to run. - User Management: Allows different user accounts for privacy. - Multitasking: Lets you use more than one program at a time. - Interface: Displays the desktop and menus to make the computer easy to use. 5. Can I name examples of popular operating systems? Apple macOS, Microsoft Windows, Google’s Android OS,... 8CS.02: Utility Programs 1. What are utility programs, and why are they important? Utility programs: a program used to help maintain a digital device. 2. What are some types of utility programs? Antivirus. File Management System. Disk Management tools. Compression tools. Disk cleanup tool. File Management System. Disk Defragmenter.Backup utility. 3. How do utility programs help maintain computer performance? - Virus Scanning: Finds and removes harmful software. - File Backup: Saves extra copies of important files. - File Compression: Makes files smaller to save space. - Defragmentation: Reorganizes files so they can be accessed faster. - Performance Monitoring: Checks how fast the computer is working. - Firewall: Blocks unauthorized access to your computer from the internet. - Software Updates: Keeps programs up to date for better security and performance. 8CS.03: ASCII 1. What is ASCII, and how does it work? ASCII: a 7-bit binary code that represents all the characters on a keyboard. When a user presses a key on the keyboard of a digital device, a group of 8 binary digits is generated. The computer does this by varying the electrical pulses it generates between high and low, to represent Is and Os. 2. How does ASCII assign codes to characters? ASCII character set 3. Examples of ASCII codes for common characters? 8CS.04: Compression 1. What is compression, and why is it needed? Compression: Reducing the size of a file by removing some data items. Examples of software that can reduce the file size: WinZip, WinRar, 7zip. 2. What are the two main types of compression? Lossy and Loseless. Lossy reduces file size by permanently removing some of the original data. Lossless reduces file size by removing unnecessary metadata. 3. What are two advantages of compression? -It is faster to download/send the file. --> "Compression helps web servers because they have limited bandwidth" -It takes up less space in the storage. 4. What are two disadvantages of compression? -Takes time to use/read the file because it must be decompressed first. -Lossy compression can reduce the quality / lose data 8CS.05: Binary to Denary Conversion 1. What is the denary number system? A number system that uses the digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 to represent every numerical value. 2. What numbers are used in the binary number system? 1s and 0s 3. What is a bit? Short for ‘binary digit’; a single bit of data, either a 0 or a 1. 4. What is the MSB? What is the LSB? - MSB: The digit at the left-hand side of the number; the bit with the largest place value. - LSB: The digit at the right-hand side of a number; the bit with the smallest place value. 8CS.06: Logic Gates 1. What do logic gates do in computers? (What do they do to electricity?) Computers use logic gates to transform the 1s and 0s from input wires. A logic gate accepts inputs and then outputs a result based on their state. 2. What are logic gates used for? Logic gates are used to make decisions so that electrical outputs only 'turn on' when the correct logic sequence close logic sequence 3. Describe in your own words how each of the AND, OR, and NOT gates function. - AND gate: output is 1 only when all inputs are 1. - OR gate: output is 1 when 1 or more input(S) are 1. - NOT gate: output is 0 when input is 1 and output is 1 when input is 0. 4. What are the truth tables for AND, OR, and NOT gates? A table used to calculate all the possible True or False values from inputs. Truth tables use 1s and 0s for True and False. 8CS.07: Primary Memory, RAM, and ROM 1. What is primary memory? Storage to hold programs and data currently in use (i.e. that the processor is actively using) on a digital device. 2. What does volatile mean? Memory is volatile if it loses the data in it when the computer is switched off. RAM is volatile. ROM is non-volatile. 3. What is a very important program stored in ROM? Boot-up program 4. What is RAM and ROM used for? 5. How do RAM and ROM differ from each other? RAM is volatile and ROM is non-volatile. 6. Give an example of secondary memory (also called secondary storage). Hard disk drive (HDD), solid state drive (SSD) 7. Secondary memory is so much larger - why don't we just store everything in secondary memory? Because secondary memory is slower to access, which takes more time. Primary memory is faster, allowing quick access to data and programs currently in use. 8CS.08: Machine Learning 1. Is machine learning a type of AI, or is AI a type of machine learning? Machine learning is a type of AI. 2. What is AI? AI: the study of machines and algorithms designed to carry out tasks in a way that is similar to humans. 3. What is machine learning? Machine learning: when AI systems are able to use data to make a decision without the help of a human. Machine learning is a system’s ability to learn by analysing data. 4. I have a chatbot that is human-like, but it uses simple rules and does not learn. Is the program an example of AI? Yes, my chatbot is an example of AI, as it simulates human-like interaction. 5. I have a chatbot that is human-like, but it uses simple rules and does not learn. Is the program an example of machine learning? No, my chatbot is not an example of machine learning, as it does not learn from data or improve over time. 6. Give examples of machine learning used in real life Recommendation Systems: Platforms like Netflix and Amazon use machine learning to analyze user behavior and suggest movies or products based on preferences. Image Recognition: Applications like Google Photos and facial recognition systems use machine learning to identify and categorize images. Spam Detection: Email services employ machine learning algorithms to filter out spam and categorize emails based on content and user behavior. Voice Assistants: Siri, Alexa, and Google Assistant use machine learning to understand and respond to user queries in natural language. 8CS.09: Augmented Reality 1. What is augmented reality (AR)? Augmented reality: a simulation that superimposes digital images on the user’s real-world environment and allows the user to interact with those images. 2. How can AR be used in education (for example, at school)? Interactive Learning: AR allows students to visualize complex concepts, like anatomy or physics, through 3D models they can interact with in real time. Virtual Field Trips: AR enables students to explore historical sites or ecosystems virtually, enhancing their understanding without leaving the classroom. 3. How can AR be used in entertainment/play? Gaming: AR games like "Pokémon GO" blend virtual characters with the real world, encouraging players to explore their surroundings while capturing creatures. Virtual Try-Ons: Retail apps allow users to try on clothes or accessories virtually using AR, making shopping more interactive and fun. 8CS.10: Autonomous Programming & AI in Robotics 1. What does it mean if something is "autonomous"? If something is autonomous, it can operate independently without human help. 2. Is an autonomous program hardware or software? Both hardware and software. Autonomous programming: computer hardware and complex AI software working together to solve a problem without any human interaction. 3. What do you call hardware that gathers data from its surroundings? Examples of these are: camera, microphone, pressure sensor, light sensor. Sensors 4. Provide examples of hardware (e.g. robots) that make decisions using AI, which let the robot behave in an autonomous way? Your example should explain what data is gathered by sensors, what the AI decides, then how the robot behaves without human help. Self-Driving Cars: Sensors: Cameras, Lidar, and radar gather data about the vehicle's surroundings, including other vehicles, pedestrians, and road conditions. AI Decisions: The AI processes this data to make real-time decisions about speed, direction, and navigation. Autonomous Behavior: The car can drive itself, navigate roads, and follow traffic rules without human intervention. Delivery Drones: Sensors: GPS, cameras, and altitude sensors collect data about the drone’s location and surroundings. AI Decisions: The AI analyzes this data to plan optimal flight paths and avoid obstacles. Autonomous Behavior: The drone can autonomously take off, deliver packages, and return to its base without human control. III. Unit 1 - Programming and Computational Thinking 8CT.08: Decomposing Problems into Sub-Problems 1. What does it mean to decompose a problem? Break down a problem into smaller parts. Decompose a problem into variables you will need, the calculation that needs to take place, the individual steps of the program. 2. Give 2 reasons it is helpful to break a complex problem into smaller sub-problems? - Easier to solve: When you split a big problem into smaller parts, each part is easier to understand and solve, which helps you avoid mistakes. - Saves time: Some of the small parts you solve can be used again in other projects, so you don’t have to do the same work twice. 3. Give an example of a large problem and its possible sub-problems Large problem: Make a program to manage a library’s books. Possible sub-problems: - Add Books: Write code to let users enter new books into the library system. - Search Books: Create a way for users to search for a book by title or author. - Check Out Books: Program a feature that allows users to check out books. - Return Books: Add a function for users to return books and update availability. - Track Due Dates: Write code to set and check due dates for borrowed books. 8CT.03: Characteristics of Pseudocode 1. Why do we use pseudocode instead of writing algorithms in programming language? Pseudocode uses simple, plain language, making it easier for people to read, understand, and discuss ideas without worrying about exact programming syntax. 2. Can pseudocode be read in any order? No, pseudocode cannot be read in any order. It needs to be read from top to bottom, following a specific sequence, just like a real program. Each step depends on the previous ones to ensure the correct flow and logic of the algorithm. 3. Give 3 rules that pseudocode should follow. 8CT.01, 8CT.02, 8P.04: Following, Understanding and Developing Algorithms (including Conditional Statements) in Flowcharts, Pseudocode and Python 1. What is an algorithm? Algorithm: step-by-step instructions to solve a particular problem. 2. What is a conditional statement? Conditional statement: code that includes a condition and will run different code depending on whether the condition evaluated (calculated) to equal TRUE or FALSE. Condition in Pseudocode: Condition in Python: 8CT.04, 8CT.05: Searching Algorithms and Linear Search 1. What is a searching algorithm? Searching algorithm: method used to find a specific item or value within a collection of data, like a list or database. Searching algorithms help locate information quickly and efficiently. 2. Describe two real life examples where a searching algorithm is used. Phone Contacts: When you search for a contact's name in your phone, a searching algorithm scans through your list of contacts to find the match quickly. Library Catalog: When you look up a book in a library catalog, a searching algorithm helps locate the book's information (like title or author) in the library's database, so you can find out where it is. 3. What is a linear search? Linear search: searching for an item in a list by comparing each item in turn with the searched-for item. 4. How does a linear search algorithm work? It searches in line (from left to right or top to bottom). It stops when the target is found and all items have been searched. 8CT.07, 8P.08, 8P.09, 8P.10: Predicting Algorithm Outcomes and Testing Test ID Input Expected Actual Result Pass/fail Result 8P.11: Interacting between two (or more) devices 1. What is the name of the wireless device you used to send and receive messages on the micro:bit? Radio 2. The questions below refer to this code. a. What does the code do on line 2? Imports the radio module which enables the microbit to send and receive messages. b. What radio group is being used in the code? Group 12 c. What line of the code uses the radio to send a message? Line 12 (send ‘boopboop’) d. What line of the code uses the radio to receive a message? Line 7 uses to receive the message stored in the message variable. 8P.07: Using an Iterative Process to Develop Programs, then wrote more code and tested it again. 1. What does iteration mean? Iteration: repetition (repeating over and over) 2. When developing (creating) a program, what is meant by "using an iterative process"? Iterative process: how a project develops throughout stages. 3. Why is it important to use an iterative approach? It helps catch mistakes early, allows for gradual improvement, and makes it easier to adjust or add new features.

Use Quizgecko on...
Browser
Browser