OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

Quiz
•
Computers
•
11th Grade - University
•
Hard
A Brereton
Used 242+ times
FREE Resource
9 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
What are the key reasons for compressing data?
Less space needed for storage
Less time to transmit
Higher quality files
Reduced amount of processing power
Limited RAM
2.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Lossless compression...
Is used when not all the information is needed
Is not as effective as lossy compression
Can fully regenerate the original file
Includes files such as .ZIP
Would be a sensible choice for a music download site
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Lossy compression...
Permanently removes data from a file
Always leads to a noticeable loss of quality
Aims to remove redundant data
Can return the original file to its original quality
Would be a sensible choice for a music download site.`
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Dictionary based compression...
Is a lossless compression format
Creates a dictionary of common letter combinations to encode words with fewer characters
Creates a dictionary of smaller letters so less space is used
Sends the dictionary with the data
Doesn't need to send the dictionary with the data
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Run-length encoding...
is Lossless
is Lossy
Can only be used for text
Records the number of repeats of an individual element
Can be used for a wide variety of file types
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Encryption...
Uses at least one key to cipher data
Is only used on text
Can be symmetric or asymmetric
Is impossible to break
Has developed a lot as processing power has increased
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Symmetrical encryption techniques...
Are the most secure types of encryption
Use a single key to encode/decode
Use multiple keys to encode/decode
Include XOR, Caesar and Route
Include RSA, Diffie-Hellman and DSS
8.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Asymmetrical encryption techniques...
Are the most secure types of encryption
Use a single key to encode/decode
Use multiple keys to encode/decode
Include XOR, Caesar and Route
Include RSA, Diffie-Hellman and DSS
9.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Asymmetrical encryption...
Often requires considerable processing power
Is impossible to break
Is being threatened by the possibility of quantum computing
Can be brute-force attacked
Is very widely used, even in small businesses
Similar Resources on Wayground
12 questions
CIS1103 Week 9_10 CLO3 Part 1

Quiz
•
University
10 questions
Unit 1 AP CSP Advanced

Quiz
•
9th - 12th Grade
10 questions
TestOut Desktop Pro Plus 1.1.18 Concept Questions

Quiz
•
7th Grade - University
12 questions
Blown to Bits Chapter 2

Quiz
•
9th - 12th Grade
13 questions
1.3.1 - Encryption & Hashing

Quiz
•
8th - 12th Grade
12 questions
HTTP Response Codes and RESTful Architecture

Quiz
•
University
11 questions
Compression

Quiz
•
12th Grade
10 questions
WJEC Computer Science KO - Security and Data Management

Quiz
•
11th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade
19 questions
AP CSP Unit 1 Review (code.org)

Quiz
•
10th - 12th Grade