Search Header Logo

Peter review Quiz-0478

Authored by Syed M

Computers

9th Grade

Peter review Quiz-0478
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

26 questions

Show all answers

1.

CATEGORIZE QUESTION

3 mins • 1 pt

Organize these options into the right categories

Groups:

(a) Denary

,

(b) Binary

,

(c) Hexadecimal

it uses 16 symbols

It is a base 2 number system

it is base 16 number system

easy for humans to read, write and remember

4 binary bits can be represented using 1 symbol

Example: 1001101

Example: 788663

It is a base 10 number system.

It uses 10 digits (0,9) to represent all numbers

It uses only 2 digits (0,1)

2.

CATEGORIZE QUESTION

3 mins • 1 pt

Organize these options into the right categories

Groups:

(a) Serial

,

(b) Parallel

More suitable for short-distance communication

suitable for long-distance communication

It is a base 10 number system.

less expensive to implement

typically requires more wires, and more expensive.

Higher data transfer rate compared to serial communication

Suitable for short distance (5meters)

Less susceptible to interference

Used in printer connections

Used in USB connections

Each bit is transmitted on a separate wire

Commonly used in computer processors

transmits multiple bits simultaneously on multiple channels.

3.

CATEGORIZE QUESTION

3 mins • 1 pt

Organize these options into the right categories

Groups:

(a) High-Level Language

,

(b) Low-Level Language

Allows for faster development due to built-in libraries and frameworks

Facilitates code reusability through functions and classes

Requires an interpreter or compiler to convert code into machine language

Less portable and more hardware-dependent

Easier to read/write/understand code as uses English-like statements

Emphasizes efficiency and control over resources

Specific to a particular hardware platform

Requires a deep understanding of computer architecture

Used for system programming and device drivers

Generally platform-independent

Examples include Python, Java, and Ruby

Commonly used for web development and data analysis

Examples include Assembly language and machine code

Emphasizes abstraction and automation

Directly interacts with hardware and memory addresses

Difficult to read and write due to complex syntax

4.

CATEGORIZE QUESTION

3 mins • 1 pt

Organize these options into the right categories

Groups:

(a) ASCII Code

,

(b) Unicode

uses 7 bits to store a character

extended ASCII uses 8 bits

supports over 143,000 characters

Stands for American Standard Code for Information Interchange

commonly used in English text

limited to 128 characters

uses 32 bits to store a character

includes control characters

includes characters from multiple languages

5.

CATEGORIZE QUESTION

3 mins • 1 pt

Organize these options into the right categories

Groups:

(a) IPv4

,

(b) IPv6

,

(c) Static IP Address

,

(d) Dynamic IP Address

it has a total of 340 undecillion addresses

it uses DHCP for address assignment

it is not assigned by a DHCP server

it uses a hexadecimal notation

it is 128-bit

it uses a dotted decimal notation

it assigns IP addresses dynamically

it is 32-bit,

Each group of digits is a number between 0 and 65535

it allows for easy network management

Consists of four groups of digits

Uses double colons (::)

it is typically used for servers

it remains constant and does not change

6.

CATEGORIZE QUESTION

3 mins • 1 pt

Organize these options into the right categories

Groups:

(a) Compiler

,

(b) Interpreter

,

(c) IDE

Autocorrect

stops when it reaches an error.

Pretty-Prints

produces faster executable files

translates high-level code to machine code

creates an executable

executes code line by line

Auto complete

does not produce executable files

Reports all errors at the end of compilation

Integrated debugger

typically slower

7.

CATEGORIZE QUESTION

3 mins • 1 pt

Organize these options into the right categories

Groups:

(a) Symmetric Encryption

,

(b) Asymmetric Encryption

requires the sender and receiver to share the same secret key.

commonly used for securing data in transit.

uses a pair of public and private keys for encryption and decryption of data.

known for its strong security guarantees in encrypting data.

does not require the sender and receiver to share a secret key.

provides better security compared to symmetric encryption.

commonly used for key exchange and digital signatures.

examples include RSA, ECC, and DSA.

uses a single key for both encryption and decryption of data.

less secure than asymmetric encryption due to the shared key.

provides faster encryption and decryption compared to asymmetric encryption.

examples include AES, DES, and 3DES.

slower encryption and decryption process compared to symmetric encryption.

often used in secure email communication and SSL certificate issuance.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?