GCSE - Mixed question computer science revision

GCSE - Mixed question computer science revision

10th - 11th Grade

24 Qs

quiz-placeholder

Similar activities

AQA GCSE Computer Science - 3.3.3 Units of Information

AQA GCSE Computer Science - 3.3.3 Units of Information

8th - 10th Grade

20 Qs

Binary, Denary and Hexadecimal

Binary, Denary and Hexadecimal

8th - 11th Grade

20 Qs

Binary Bit Byte

Binary Bit Byte

9th - 12th Grade

20 Qs

Units and Binary Conversions

Units and Binary Conversions

10th Grade

19 Qs

Binary Bit Byte

Binary Bit Byte

9th - 12th Grade

20 Qs

Ingots - File sizes

Ingots - File sizes

10th Grade

20 Qs

Binary, Denary and Hexadecimal

Binary, Denary and Hexadecimal

8th - 11th Grade

20 Qs

Bits, Bytes, and Binary

Bits, Bytes, and Binary

9th - 12th Grade

25 Qs

GCSE - Mixed question computer science revision

GCSE - Mixed question computer science revision

Assessment

Quiz

Computers

10th - 11th Grade

Medium

Created by

Louise Lockwood

Used 181+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Covers a small geographical area on a single site

LAN

PAN

WAN

SAN

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of removing unnecessary details so that only the main, important points remain.

Abstraction

Algorithm

Application Software

Array

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A step-by-step procedure for solving problems that can be followed by humans and computers.

Abstraction

Alpha testing

Argument

Algorithm

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A digital circuit in the CPU used to perform arithmetic and logic operations.

Abstraction

ALU

Accumulator

Argument

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software designed to prevent, detect and remove malware.

Assigning

Argument

Assembler

Antivirus Software

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A program that translates assembly language into machine code.

Authentication

ALU

Assembler

Abstraction

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A trojan would typically...

hide on USB memory sticks.

be disguised as an email attachments.

be disguised as legitimate software.

spread through dodgy web links

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?