OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

Quiz
•
Computers
•
11th Grade - University
•
Hard
A Brereton
Used 242+ times
FREE Resource
9 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
What are the key reasons for compressing data?
Less space needed for storage
Less time to transmit
Higher quality files
Reduced amount of processing power
Limited RAM
2.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Lossless compression...
Is used when not all the information is needed
Is not as effective as lossy compression
Can fully regenerate the original file
Includes files such as .ZIP
Would be a sensible choice for a music download site
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Lossy compression...
Permanently removes data from a file
Always leads to a noticeable loss of quality
Aims to remove redundant data
Can return the original file to its original quality
Would be a sensible choice for a music download site.`
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Dictionary based compression...
Is a lossless compression format
Creates a dictionary of common letter combinations to encode words with fewer characters
Creates a dictionary of smaller letters so less space is used
Sends the dictionary with the data
Doesn't need to send the dictionary with the data
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Run-length encoding...
is Lossless
is Lossy
Can only be used for text
Records the number of repeats of an individual element
Can be used for a wide variety of file types
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Encryption...
Uses at least one key to cipher data
Is only used on text
Can be symmetric or asymmetric
Is impossible to break
Has developed a lot as processing power has increased
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Symmetrical encryption techniques...
Are the most secure types of encryption
Use a single key to encode/decode
Use multiple keys to encode/decode
Include XOR, Caesar and Route
Include RSA, Diffie-Hellman and DSS
8.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Asymmetrical encryption techniques...
Are the most secure types of encryption
Use a single key to encode/decode
Use multiple keys to encode/decode
Include XOR, Caesar and Route
Include RSA, Diffie-Hellman and DSS
9.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Asymmetrical encryption...
Often requires considerable processing power
Is impossible to break
Is being threatened by the possibility of quantum computing
Can be brute-force attacked
Is very widely used, even in small businesses
Similar Resources on Wayground
12 questions
Pearson 1CP2 - 2.3 - Units of storage and Compression

Quiz
•
9th - 12th Grade
12 questions
AP CSP Unit 1 Vocab (Code.org)

Quiz
•
9th - 12th Grade
14 questions
Compression Quiz

Quiz
•
10th - 11th Grade
12 questions
Processor

Quiz
•
12th Grade
12 questions
AP CSP Vocabulary

Quiz
•
9th - 12th Grade
10 questions
Khan Academy Cryptography

Quiz
•
9th - 12th Grade
14 questions
Code.org Unit 2

Quiz
•
9th - 12th Grade
12 questions
Warm Up Data Representation

Quiz
•
9th - 12th Grade
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade