
Peter review Quiz-0478
Authored by Syed M
Computers
9th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
26 questions
Show all answers
1.
CATEGORIZE QUESTION
3 mins • 1 pt
Groups:
(a) Denary
,
(b) Binary
,
(c) Hexadecimal
Example: 1001101
Example: 788663
it is base 16 number system
it uses 16 symbols
4 binary bits can be represented using 1 symbol
It uses 10 digits (0,9) to represent all numbers
It is a base 2 number system
easy for humans to read, write and remember
It uses only 2 digits (0,1)
It is a base 10 number system.
2.
CATEGORIZE QUESTION
3 mins • 1 pt
Groups:
(a) Serial
,
(b) Parallel
Commonly used in computer processors
suitable for long-distance communication
Higher data transfer rate compared to serial communication
Suitable for short distance (5meters)
More suitable for short-distance communication
Used in USB connections
It is a base 10 number system.
Less susceptible to interference
typically requires more wires, and more expensive.
Each bit is transmitted on a separate wire
Used in printer connections
less expensive to implement
transmits multiple bits simultaneously on multiple channels.
3.
CATEGORIZE QUESTION
3 mins • 1 pt
Groups:
(a) High-Level Language
,
(b) Low-Level Language
Examples include Python, Java, and Ruby
Emphasizes efficiency and control over resources
Requires a deep understanding of computer architecture
Generally platform-independent
Less portable and more hardware-dependent
Emphasizes abstraction and automation
Examples include Assembly language and machine code
Used for system programming and device drivers
Requires an interpreter or compiler to convert code into machine language
Difficult to read and write due to complex syntax
Allows for faster development due to built-in libraries and frameworks
Facilitates code reusability through functions and classes
Directly interacts with hardware and memory addresses
Easier to read/write/understand code as uses English-like statements
Commonly used for web development and data analysis
Specific to a particular hardware platform
4.
CATEGORIZE QUESTION
3 mins • 1 pt
Groups:
(a) ASCII Code
,
(b) Unicode
commonly used in English text
extended ASCII uses 8 bits
uses 32 bits to store a character
limited to 128 characters
supports over 143,000 characters
includes control characters
Stands for American Standard Code for Information Interchange
includes characters from multiple languages
uses 7 bits to store a character
5.
CATEGORIZE QUESTION
3 mins • 1 pt
Groups:
(a) IPv4
,
(b) IPv6
,
(c) Static IP Address
,
(d) Dynamic IP Address
Each group of digits is a number between 0 and 65535
it uses DHCP for address assignment
it has a total of 340 undecillion addresses
Consists of four groups of digits
it uses a hexadecimal notation
it remains constant and does not change
Uses double colons (::)
it allows for easy network management
it assigns IP addresses dynamically
it is not assigned by a DHCP server
it is 128-bit
it is typically used for servers
it uses a dotted decimal notation
it is 32-bit,
6.
CATEGORIZE QUESTION
3 mins • 1 pt
Groups:
(a) Compiler
,
(b) Interpreter
,
(c) IDE
stops when it reaches an error.
executes code line by line
Integrated debugger
translates high-level code to machine code
creates an executable
Pretty-Prints
does not produce executable files
typically slower
produces faster executable files
Auto complete
Autocorrect
Reports all errors at the end of compilation
7.
CATEGORIZE QUESTION
3 mins • 1 pt
Groups:
(a) Symmetric Encryption
,
(b) Asymmetric Encryption
requires the sender and receiver to share the same secret key.
less secure than asymmetric encryption due to the shared key.
provides faster encryption and decryption compared to asymmetric encryption.
often used in secure email communication and SSL certificate issuance.
slower encryption and decryption process compared to symmetric encryption.
does not require the sender and receiver to share a secret key.
uses a pair of public and private keys for encryption and decryption of data.
uses a single key for both encryption and decryption of data.
provides better security compared to symmetric encryption.
examples include AES, DES, and 3DES.
examples include RSA, ECC, and DSA.
commonly used for securing data in transit.
commonly used for key exchange and digital signatures.
known for its strong security guarantees in encrypting data.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?