Computer Science for IGCSE & O level - Algorithm Design And Problem Solving (Section 13)
1
Normal data is described as?
Answer
(B)
A set of data expected to provide expected output.
2
When testing a program that calculates the area of a rectangle, which data set would you use to ensure the program works correctly with the minimum and maximum possible lengths and widths?
Answer
(D)
Extreme data
3
In what situation would you use boundary data?
Answer
(B)
If you need to input the largest value the system will accept.
4
What is the primary goal of the analysis phase in the software development life cycle?
Answer
(C)
Understanding the requirements and defining the problem.
5
Which of the following can cause an incorrect output in a trace table?
Answer
A
B
C
6
What is data validation primarily concerned with?
Answer
(C)
Ensuring data meets certain criteria before use.
7
What should be tested using normal data?
Answer
(C)
Expected results
8
Which of the following statements is true regarding the use of flowcharts and pseudocode?
Answer
A
B
9
Which of the following is an example of input for an alarm app?
Answer
(B)
The time set for the alarm.
10
What type of data validation is utilized to prevent a missing input, such as the name field in a registration form?
Answer
(B)
Presence check
11
In the provided algorithm for checking password length, what action is taken if the password does not meet the criteria?
Answer
(C)
A specific message is displayed to the user.
12
In the context of the provided examples, what is the purpose of using an 'IF...THEN...ELSE' statement within an algorithm?
Answer
(C)
To select different actions based on a condition.
13
What is an advantage of using pseudocode?
Answer
(B)
It is simple to understand and allows algorithms to be easily expressed.
14
What validation techniques use human input?
Answer
C
D
15
What is the main function of the coding phase in the program development life cycle?
Answer
(C)
To translate the design into a programming language.
16
Which symbol is typically used in a flowchart to represent the start and end points?
Answer
(B)
Oval
17
What does the term 'pseudocode' represent in the context of algorithms?
Answer
(D)
An informal way of describing an algorithm's steps using plain language and simple programming constructs.
18
What type of check is exemplified by the algorithm: `IF PasswordLength != 8 THEN OUTPUT “Your password must be exactly eight characters”`?
Answer
(D)
Length check
19
What is the primary function of 'INPUT' and 'OUTPUT' statements in pseudocode?
Answer
(D)
To receive data and show results.
20
Which of the following methods can be used to design and construct a solution to a problem?
Answer
A
B
C
21
Normal data is used to test the algorithm in which of the following scenario?
Answer
(A)
To check if the algorithm provides the correct results for valid inputs.
22
Which validation technique aims to ensure that a required field, like a phone number, has been filled in by the user?
Answer
(C)
Presence check
23
What is the purpose of a check digit in data entry?
Answer
(C)
To identify errors made during data entry.
24
When is the 'REPEAT...UNTIL' loop most appropriate to use?
Answer
(B)
When the loop should run at least once.
25
What can be tested using abnormal data?
Answer
A
D
26
Which of the following best describes "normal data"?
Answer
(C)
Data that the algorithm is expected to handle without errors.
27
What is a common use of the IF-THEN-ELSE construct?
Answer
(C)
To handle different situations based on a condition.
28
Which loop type guarantees that the loop body will execute at least once?
Answer
(C)
REPEAT...UNTIL
29
What does 'iteration' refer to in the context of coding and testing?
Answer
(C)
Repeating a process until a condition is met.
30
Which types of data are used when testing a program's robustness?
Answer
B
C
D
31
What is the core functionality of a check digit?
Answer
(B)
To detect errors that may occur during data entry.
32
What is the primary goal of applying abnormal test data?
Answer
(C)
To determine if the algorithm responds correctly to invalid input.
33
What is a primary characteristic of the FOR...TO...NEXT loop?
Answer
(B)
It repeats a set of instructions a specified number of times.
34
In the alarm clock example, which construct is used to ensure the alarm will only go off at the pre-determined time?
Answer
(C)
WHILE...DO...ENDWHILE loop and IF statement
35
What does a format check ensure about the entered data?
Answer
(C)
That the data conforms to a specific pattern or structure.
36
In the context of designing an alarm app, what would be considered 'processes'?
Answer
(C)
Storing and removing alarm times.
37
Which methods can be used for the validation phase?
Answer
A
B
C
D
38
During data entry, which method allows a user to review the data and confirm its accuracy before submission?
Answer
(C)
A screen/visual check
39
Which symbol in a flowchart represents a decision?
Answer
(C)
Diamond
40
Which type of validation check is used to ensure data falls within a specific range?
Answer
(B)
Range check
41
What do `INPUT` and `OUTPUT` statements primarily facilitate in an algorithm?
Answer
A
C
42
Which checks are used during the data validation stage?
Answer
A
B
C
43
Which of the following is most often used to represent the starting point in a flowchart?
Answer
(C)
An oval
44
What are the characteristics of extreme data?
Answer
(B)
The highest and lowest allowable values.
45
Which type of test data would you use to determine whether a program correctly handles the edge cases or limitations of its input values?
Answer
(C)
Boundary data
46
What's the primary objective of employing a screen/visual check during data validation?
Answer
(A)
To allow the user to visually confirm the accuracy of the data prior to submission.
47
What does an algorithm in the context of an alarm clock generally aim to do?
Answer
(C)
Trigger an event at a predetermined time.
48
In the context of program development, what does the analysis stage primarily involve?
Answer
(C)
Understanding the problem and specifying requirements.
49
Which of the following is a common characteristic of pseudocode?
Answer
(C)
It uses an informal high-level description of algorithms.
50
Which techniques are designed to verify that the data entered is accurate?