ONE 6th FORM Computer Science Quiz 3

ONE 6th FORM Computer Science Quiz 3

12th Grade

15 Qs

quiz-placeholder

Similar activities

APCSP Data vs Metadata

APCSP Data vs Metadata

9th - 12th Grade

11 Qs

Comp Sci Unit 5- Data

Comp Sci Unit 5- Data

12th Grade

11 Qs

Data Security Worksheet

Data Security Worksheet

10th Grade - University

15 Qs

Data Science Final Quiz Quizizz

Data Science Final Quiz Quizizz

12th Grade

10 Qs

Excel Chart Vocabulary

Excel Chart Vocabulary

9th - 12th Grade

10 Qs

1.4.2 Queues

1.4.2 Queues

12th Grade

20 Qs

data validation

data validation

12th Grade

17 Qs

Database Basic Concepts

Database Basic Concepts

11th - 12th Grade

15 Qs

ONE 6th FORM Computer Science Quiz 3

ONE 6th FORM Computer Science Quiz 3

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Lorna Jarrett

Used 4+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In programming, what is 'recursion'?

A function calling another function

A function calling itself

Iterating through a collection

Error handling method

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of databases, what does 'normalisation' primarily aim to achieve?

Increase the speed of queries

Reduce data redundancy

Encrypt sensitive information

Visualize data relationships

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of a digital certificate in network security?

To ensure data encryption

To authenticate the identity of a website

To store user credentials

To increase the speed of data transmission

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Turing machine?

A physical machine used for code-breaking in World War II

A theoretical model that defines the limits of algorithmic computation

A type of early mechanical calculator

A machine used for automating mathematical proofs

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'lossless compression' refer to in data handling?

Reducing file size without losing any original data

Removing unnecessary metadata from files

Compressing data for faster transmission

Temporarily storing data to free up space

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What principle does public key cryptography use?

Two identical keys for both encryption and decryption

A single key for both encryption and decryption

Two different keys, one public and one private

An algorithm without the need for keys

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In computer networks, which OSI model layer is responsible for routing and forwarding?

Data Link

Network

Transport

Presentation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?