IGCSE Paper 1 (Part 2) - Computer Science

IGCSE Paper 1 (Part 2) - Computer Science

9th Grade

32 Qs

quiz-placeholder

Similar activities

Wireless Networking

Wireless Networking

9th - 12th Grade

27 Qs

Unit 4 -  Input and Output Interfaces Formative

Unit 4 - Input and Output Interfaces Formative

9th - 12th Grade

34 Qs

Cryptography & Linux

Cryptography & Linux

9th - 12th Grade

30 Qs

OCR GCSE 1.5 Systems Software MCQs

OCR GCSE 1.5 Systems Software MCQs

8th - 10th Grade

34 Qs

J277 1.5 System Software

J277 1.5 System Software

9th Grade

34 Qs

23_Inside the Machine end of topic test

23_Inside the Machine end of topic test

9th Grade

28 Qs

Cybersecurity Final Review Quizizz

Cybersecurity Final Review Quizizz

9th - 12th Grade

31 Qs

ICT 2019

ICT 2019

1st Grade - University

30 Qs

IGCSE Paper 1 (Part 2) - Computer Science

IGCSE Paper 1 (Part 2) - Computer Science

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Archie Miranda

Used 5+ times

FREE Resource

32 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Add 1011101110 and 1100011011.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a character set mean?

It is a way of encrypting text document.

It is the set of activities of connecting computer devices.

It is the set of mental and moral qualities distinctive to an individual.

It is an encoding system to let computers know how to recognize character, including letters, numbers, punctuation marks, and whitespace.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Convert 179 to binary.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Convert denary -35 in binary using two's complement.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

This method of error checking is similar to a traditional parity check except the data is arranged in a virtual table with parity bits added to each row and column.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a type of encryption where the 

 used for encrypting a message is the same one used for decrypting the message.

Symmetric encryption

Asymmetric encryption

Dynamic encryption

Static encryption

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Two separate keys are used. One key is used for encryption and the other key is used for decryption, this is called ___________ encryption.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?