IGCSE Paper 1 (Part 2) - Computer Science

IGCSE Paper 1 (Part 2) - Computer Science

9th Grade

32 Qs

quiz-placeholder

Similar activities

OCR Computer Science 1.4.1

OCR Computer Science 1.4.1

9th - 11th Grade

30 Qs

Unit 4 Review

Unit 4 Review

9th - 12th Grade

35 Qs

Unit 1.2 Key Terms - Cybersecurity

Unit 1.2 Key Terms - Cybersecurity

9th - 12th Grade

29 Qs

Network Protocols

Network Protocols

9th - 12th Grade

30 Qs

AP CSP Unit 1

AP CSP Unit 1

8th - 9th Grade

37 Qs

2.2.1 Cyber More on Malware

2.2.1 Cyber More on Malware

9th - 12th Grade

27 Qs

Windows 10 Configuration

Windows 10 Configuration

1st - 10th Grade

35 Qs

Year 9 End of Term Quiz

Year 9 End of Term Quiz

8th Grade - University

28 Qs

IGCSE Paper 1 (Part 2) - Computer Science

IGCSE Paper 1 (Part 2) - Computer Science

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Archie Miranda

Used 6+ times

FREE Resource

32 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Add 1011101110 and 1100011011.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a character set mean?

It is a way of encrypting text document.

It is the set of activities of connecting computer devices.

It is the set of mental and moral qualities distinctive to an individual.

It is an encoding system to let computers know how to recognize character, including letters, numbers, punctuation marks, and whitespace.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Convert 179 to binary.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Convert denary -35 in binary using two's complement.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

This method of error checking is similar to a traditional parity check except the data is arranged in a virtual table with parity bits added to each row and column.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a type of encryption where the 

 used for encrypting a message is the same one used for decrypting the message.

Symmetric encryption

Asymmetric encryption

Dynamic encryption

Static encryption

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Two separate keys are used. One key is used for encryption and the other key is used for decryption, this is called ___________ encryption.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?