End of Year 7 Assessment

Last updated 7 months ago
16 questions
2

Define the term algorithm.

2

Scenario: You’ve been asked to design an automated system that helps a librarian sort returned books back onto the right shelves.

When a book is returned, the librarian checks its cover for the genre sticker, looks up its detailed shelf location in the catalogue (aisle, shelf number, height position), walks to the shelf, places the book in exactly the right spot between two other books, and then returns to the desk to process the next return. Sometimes the librarian also makes notes on the book’s condition, updates late-fee records, and reminds patrons about upcoming events.

Question: Which details would you abstract away to model just the core “sort book onto shelf” algorithm?
  1. List three pieces of information from the description that are essential to your algorithm.
  2. List two details you can ignore because they’re not needed for the sorting process.

1

Identify this flow chart shape:

1
  • ....is the process of filtering out—or ignoring—unnecessary details in order to focus on the most important aspects of a problem.
  • ...means breaking a large, complex problem down into smaller, more manageable parts or steps.
  • Abstraction
  • Decomposition
2

Explain what is meant by pattern recognition, using a real life example in your answer.

1

Put these in order of size, largest to smallest

  1. Bit
  2. Byte
  3. Kilobyte
  4. Megabyte
1

How many bits make up a byte?

1

Convert the binary number 110011 into denary.

1

Convert the denary number 75 into binary.

2

Convert the hexadecimal number 3E into binary.

1

State what a micro:bit is.

1

Draw a XOR gate

1
Fill in the truth table below based on the circuit above
A B C X
0 0 0 _______
0 1 1 _______
1 0 0 _______
1 1 1 _______
2

What are the differences between a worm and a virus?

1

Give one method to prevent a virus from doing serious damage on your computer

3
_______ is where a person receives an email that looks legitimate, but it is not. It encourages a user to click a link to a fake _______ . The idea is to trick people into entering their _______ data.