Yr 11 Revision

Yr 11 Revision

12th Grade

75 Qs

quiz-placeholder

Similar activities

Computer architectuur

Computer architectuur

5th - 12th Grade

72 Qs

H446 Section 1: Components of a computer

H446 Section 1: Components of a computer

11th Grade - University

71 Qs

Python 1 Review Game

Python 1 Review Game

9th - 12th Grade

73 Qs

Algorithms Study Set

Algorithms Study Set

12th Grade

70 Qs

Unit 1 Troubleshooting Methodology and Hardware Basics

Unit 1 Troubleshooting Methodology and Hardware Basics

9th - 12th Grade

80 Qs

Mikrotik Lesson

Mikrotik Lesson

12th Grade

72 Qs

5.0 - Standard Camp Final

5.0 - Standard Camp Final

6th - 12th Grade

75 Qs

Programare și Dezvoltare Web

Programare și Dezvoltare Web

10th - 12th Grade

70 Qs

Yr 11 Revision

Yr 11 Revision

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Gary Vear

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

75 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The appropriate data types to represent a house number, street name, suburb and postcode are

  1. string, string, string, string

  1. integer, string, string, string

  1. string, string, string, integer

  1. integer, string, string, integer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which one of the following sets of test data would provide the best test for the algorithm?

  1. 0, 75, 80, 84, 100

  1. 70, 75, 76, 80

  1. 75, 76, 84, 85

  1. 0, 74, 84, 85

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software developer is considering using a wired network to share large files with a client. The advantages of a wired network compared to a wireless network are that it is

faster and more secure

faster and more portable

more secure and portable

easier to set up and cheaper

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of security vulnerability manipulates users into providing confidential information through social engineering?

phishing

SQL injection

cross-site scripting

man-in-the-middle attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In accordance with which Act is the privacy of a Victorian’s health information protected?

Privacy and Data Protection Act 2014

Health Records Act 2001

Copyright Act 1968

Privacy Act 1988

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following correctly identifies features of type checking?

  1. checks if only letters are entered into a field and if the text is spelt correctly

  1. checks if data entered already exists in the database and if the data is reasonable

  1. checks if a number is entered into a numeric field and if the number is within a set range of values

  1. checks if numbers are entered into a numeric field and if letters are entered into a text-only field

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Some of the variables in a program are to be given new names. Which documentation must also be modified?

functional requirements

data dictionary definitions

software requirements definitions

milestones and dependencies

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers