Search Header Logo

Peter review Quiz-0478

Authored by Syed M

Computers

9th Grade

Peter review Quiz-0478
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

26 questions

Show all answers

1.

CATEGORIZE QUESTION

3 mins • 1 pt

Organize these options into the right categories

Groups:

(a) Denary

,

(b) Binary

,

(c) Hexadecimal

Example: 1001101

Example: 788663

it is base 16 number system

it uses 16 symbols

4 binary bits can be represented using 1 symbol

It uses 10 digits (0,9) to represent all numbers

It is a base 2 number system

easy for humans to read, write and remember

It uses only 2 digits (0,1)

It is a base 10 number system.

2.

CATEGORIZE QUESTION

3 mins • 1 pt

Organize these options into the right categories

Groups:

(a) Serial

,

(b) Parallel

Commonly used in computer processors

suitable for long-distance communication

Higher data transfer rate compared to serial communication

Suitable for short distance (5meters)

More suitable for short-distance communication

Used in USB connections

It is a base 10 number system.

Less susceptible to interference

typically requires more wires, and more expensive.

Each bit is transmitted on a separate wire

Used in printer connections

less expensive to implement

transmits multiple bits simultaneously on multiple channels.

3.

CATEGORIZE QUESTION

3 mins • 1 pt

Organize these options into the right categories

Groups:

(a) High-Level Language

,

(b) Low-Level Language

Examples include Python, Java, and Ruby

Emphasizes efficiency and control over resources

Requires a deep understanding of computer architecture

Generally platform-independent

Less portable and more hardware-dependent

Emphasizes abstraction and automation

Examples include Assembly language and machine code

Used for system programming and device drivers

Requires an interpreter or compiler to convert code into machine language

Difficult to read and write due to complex syntax

Allows for faster development due to built-in libraries and frameworks

Facilitates code reusability through functions and classes

Directly interacts with hardware and memory addresses

Easier to read/write/understand code as uses English-like statements

Commonly used for web development and data analysis

Specific to a particular hardware platform

4.

CATEGORIZE QUESTION

3 mins • 1 pt

Organize these options into the right categories

Groups:

(a) ASCII Code

,

(b) Unicode

commonly used in English text

extended ASCII uses 8 bits

uses 32 bits to store a character

limited to 128 characters

supports over 143,000 characters

includes control characters

Stands for American Standard Code for Information Interchange

includes characters from multiple languages

uses 7 bits to store a character

5.

CATEGORIZE QUESTION

3 mins • 1 pt

Organize these options into the right categories

Groups:

(a) IPv4

,

(b) IPv6

,

(c) Static IP Address

,

(d) Dynamic IP Address

Each group of digits is a number between 0 and 65535

it uses DHCP for address assignment

it has a total of 340 undecillion addresses

Consists of four groups of digits

it uses a hexadecimal notation

it remains constant and does not change

Uses double colons (::)

it allows for easy network management

it assigns IP addresses dynamically

it is not assigned by a DHCP server

it is 128-bit

it is typically used for servers

it uses a dotted decimal notation

it is 32-bit,

6.

CATEGORIZE QUESTION

3 mins • 1 pt

Organize these options into the right categories

Groups:

(a) Compiler

,

(b) Interpreter

,

(c) IDE

stops when it reaches an error.

executes code line by line

Integrated debugger

translates high-level code to machine code

creates an executable

Pretty-Prints

does not produce executable files

typically slower

produces faster executable files

Auto complete

Autocorrect

Reports all errors at the end of compilation

7.

CATEGORIZE QUESTION

3 mins • 1 pt

Organize these options into the right categories

Groups:

(a) Symmetric Encryption

,

(b) Asymmetric Encryption

requires the sender and receiver to share the same secret key.

less secure than asymmetric encryption due to the shared key.

provides faster encryption and decryption compared to asymmetric encryption.

often used in secure email communication and SSL certificate issuance.

slower encryption and decryption process compared to symmetric encryption.

does not require the sender and receiver to share a secret key.

uses a pair of public and private keys for encryption and decryption of data.

uses a single key for both encryption and decryption of data.

provides better security compared to symmetric encryption.

examples include AES, DES, and 3DES.

examples include RSA, ECC, and DSA.

commonly used for securing data in transit.

commonly used for key exchange and digital signatures.

known for its strong security guarantees in encrypting data.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?