OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing
Quiz
•
Computers
•
11th Grade - University
•
Hard
A Brereton
Used 244+ times
FREE Resource
Enhance your content in a minute
9 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
What are the key reasons for compressing data?
Less space needed for storage
Less time to transmit
Higher quality files
Reduced amount of processing power
Limited RAM
2.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Lossless compression...
Is used when not all the information is needed
Is not as effective as lossy compression
Can fully regenerate the original file
Includes files such as .ZIP
Would be a sensible choice for a music download site
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Lossy compression...
Permanently removes data from a file
Always leads to a noticeable loss of quality
Aims to remove redundant data
Can return the original file to its original quality
Would be a sensible choice for a music download site.`
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Dictionary based compression...
Is a lossless compression format
Creates a dictionary of common letter combinations to encode words with fewer characters
Creates a dictionary of smaller letters so less space is used
Sends the dictionary with the data
Doesn't need to send the dictionary with the data
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Run-length encoding...
is Lossless
is Lossy
Can only be used for text
Records the number of repeats of an individual element
Can be used for a wide variety of file types
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Encryption...
Uses at least one key to cipher data
Is only used on text
Can be symmetric or asymmetric
Is impossible to break
Has developed a lot as processing power has increased
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Symmetrical encryption techniques...
Are the most secure types of encryption
Use a single key to encode/decode
Use multiple keys to encode/decode
Include XOR, Caesar and Route
Include RSA, Diffie-Hellman and DSS
8.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Asymmetrical encryption techniques...
Are the most secure types of encryption
Use a single key to encode/decode
Use multiple keys to encode/decode
Include XOR, Caesar and Route
Include RSA, Diffie-Hellman and DSS
9.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Asymmetrical encryption...
Often requires considerable processing power
Is impossible to break
Is being threatened by the possibility of quantum computing
Can be brute-force attacked
Is very widely used, even in small businesses
Similar Resources on Wayground
11 questions
CONCEPTOS BÁSICOS INFORMÁTICA
Quiz
•
University
10 questions
Network Security Measures Quiz
Quiz
•
11th Grade
11 questions
Quiz 1 - Hardware and Software
Quiz
•
9th - 12th Grade
10 questions
CPU & Storage
Quiz
•
12th Grade
12 questions
RO81 File Formats [Revision #1]
Quiz
•
9th - 11th Grade
10 questions
OCR 1.5 Networks 1
Quiz
•
11th Grade
14 questions
Internet terminology
Quiz
•
10th - 12th Grade
10 questions
UTILITY PROGRAM
Quiz
•
University
Popular Resources on Wayground
20 questions
Halloween Trivia
Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Order of Operations
Quiz
•
5th Grade
20 questions
Halloween
Quiz
•
5th Grade
16 questions
Halloween
Quiz
•
3rd Grade
12 questions
It's The Great Pumpkin Charlie Brown
Quiz
•
1st - 5th Grade
20 questions
Possessive Nouns
Quiz
•
5th Grade
10 questions
Halloween Traditions and Origins
Interactive video
•
5th - 10th Grade
