Computer Science Quiz

Computer Science Quiz

10th Grade

33 Qs

quiz-placeholder

Similar activities

Chapter 2: Input and output devices (Part 2)

Chapter 2: Input and output devices (Part 2)

10th Grade

36 Qs

File Management

File Management

1st Grade - University

30 Qs

Excel Exam 1: Multiple Choice

Excel Exam 1: Multiple Choice

9th - 12th Grade

30 Qs

Computational Thinking, Algorithms & Flowcharts

Computational Thinking, Algorithms & Flowcharts

8th - 12th Grade

28 Qs

CIW-Lesson 4

CIW-Lesson 4

9th - 12th Grade

35 Qs

Cyber Security (Cyber security KS4 1-3)

Cyber Security (Cyber security KS4 1-3)

9th Grade - Professional Development

28 Qs

Unit 3 System Software

Unit 3 System Software

KG - 12th Grade

32 Qs

Compute

Compute

1st - 12th Grade

32 Qs

Computer Science Quiz

Computer Science Quiz

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Zenobia Omarali

FREE Resource

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The only way to make sure data is completely deleted is to:

Empty the recycling/trash on the computer.

Use a file shredder program.

Simply delete the files.

Move files to a different folder.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Optical mice often suffer from clogs due to:

Electrical interference.

Moving parts getting dirt trapped.

Using a ball for movement.

Software issues.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The data on a ROM is viewed as being:

Volatile.

Easily corrupted.

Non-volatile.

Frequently updated.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An expansion card is used to:

Absorb heat from the CPU.

Cool down the CPU.

Increase storage capacity.

Improve graphics performance.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Steve Jobs is credited with playing a large role in:

Developing the first computer.

Breaking the Enigma Machine.

Inventing the internet.

Creating the first smartphone.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the four basic functions performed by the CPU?

Fetch, Decode, Execute, Write Back

Input, Output, Process, Store

Load, Save, Transfer, Delete

Start, Stop, Pause, Resume

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it dangerous for companies to create backdoors into their encryption protocols?

It increases the cost of encryption.

It can be exploited by cyber-criminals.

It makes the system faster.

It improves user experience.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?