IGCSE Paper 1 (Part 2) - Computer Science

IGCSE Paper 1 (Part 2) - Computer Science

9th Grade

32 Qs

quiz-placeholder

Similar activities

2.1 PLTW Data Diligence

2.1 PLTW Data Diligence

9th Grade

37 Qs

AP CSP Blown to Bits (Ch-1)

AP CSP Blown to Bits (Ch-1)

9th - 12th Grade

27 Qs

iGCSE-Recap_Quiz (unit 1-5)

iGCSE-Recap_Quiz (unit 1-5)

9th - 12th Grade

30 Qs

Networking Essentials V2 Chapter 5 Review

Networking Essentials V2 Chapter 5 Review

9th Grade - University

30 Qs

CompTIA ITF Unit 2

CompTIA ITF Unit 2

9th - 12th Grade

29 Qs

SAINS KOMPUTER

SAINS KOMPUTER

4th - 12th Grade

30 Qs

AP CSP Cybersecurity

AP CSP Cybersecurity

9th - 12th Grade

33 Qs

1.5 OS and Utility Software

1.5 OS and Utility Software

9th - 11th Grade

31 Qs

IGCSE Paper 1 (Part 2) - Computer Science

IGCSE Paper 1 (Part 2) - Computer Science

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Archie Miranda

Used 6+ times

FREE Resource

32 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Add 1011101110 and 1100011011.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a character set mean?

It is a way of encrypting text document.

It is the set of activities of connecting computer devices.

It is the set of mental and moral qualities distinctive to an individual.

It is an encoding system to let computers know how to recognize character, including letters, numbers, punctuation marks, and whitespace.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Convert 179 to binary.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Convert denary -35 in binary using two's complement.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

This method of error checking is similar to a traditional parity check except the data is arranged in a virtual table with parity bits added to each row and column.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a type of encryption where the 

 used for encrypting a message is the same one used for decrypting the message.

Symmetric encryption

Asymmetric encryption

Dynamic encryption

Static encryption

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Two separate keys are used. One key is used for encryption and the other key is used for decryption, this is called ___________ encryption.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?