Scenario:
You’ve been asked to design an automated system that helps a librarian sort returned books back onto the right shelves.
When a book is returned, the librarian checks its cover for the genre sticker, looks up its detailed shelf location in the catalogue (aisle, shelf number, height position), walks to the shelf, places the book in exactly the right spot between two other books, and then returns to the desk to process the next return. Sometimes the librarian also makes notes on the book’s condition, updates late-fee records, and reminds patrons about upcoming events.
Question:
Which details would you abstract away to model just the core “sort book onto shelf” algorithm?
List three pieces of information from the description that are essential to your algorithm.
List two details you can ignore because they’re not needed for the sorting process.
1 point
1
Question 3
3.
Identify this flow chart shape:
1 point
1
Question 4
4.
....is the process of filtering out—or ignoring—unnecessary details in order to focus on the most important aspects of a problem.
...means breaking a large, complex problem down into smaller, more manageable parts or steps.
Abstraction
Decomposition
2 points
2
Question 5
5.
Explain what is meant by pattern recognition, using a real life example in your answer.
1 point
1
Question 6
6.
Put these in order of size, largest to smallest
Bit
Byte
Kilobyte
Megabyte
1 point
1
Question 7
7.
How many bits make up a byte?
1 point
1
Question 8
8.
Convert the binary number 110011 into denary.
1 point
1
Question 9
9.
Convert the denary number 75 into binary.
2 points
2
Question 10
10.
Convert the hexadecimal number 3E into binary.
1 point
1
Question 11
11.
State what a micro:bit is.
1 point
1
Question 12
12.
Draw a XOR gate
1 point
1
Question 13
13.
Fill in the truth table below based on the circuit above
A B C X
0 0 0 _______
0 1 1 _______
1 0 0 _______
1 1 1 _______
2 points
2
Question 14
14.
What are the differences between a worm and a virus?
1 point
1
Question 15
15.
Give one method to prevent a virus from doing serious damage on your computer
3 points
3
Question 16
16.
_______ is where a person receives an email that looks legitimate, but it is not. It encourages a user to click a link to a fake _______ . The idea is to trick people into entering their _______ data.