
Peter review Quiz-0478
Authored by Syed M
Computers
9th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
26 questions
Show all answers
1.
CATEGORIZE QUESTION
3 mins • 1 pt
Groups:
(a) Denary
,
(b) Binary
,
(c) Hexadecimal
it uses 16 symbols
It is a base 2 number system
it is base 16 number system
easy for humans to read, write and remember
4 binary bits can be represented using 1 symbol
Example: 1001101
Example: 788663
It is a base 10 number system.
It uses 10 digits (0,9) to represent all numbers
It uses only 2 digits (0,1)
2.
CATEGORIZE QUESTION
3 mins • 1 pt
Groups:
(a) Serial
,
(b) Parallel
More suitable for short-distance communication
suitable for long-distance communication
It is a base 10 number system.
less expensive to implement
typically requires more wires, and more expensive.
Higher data transfer rate compared to serial communication
Suitable for short distance (5meters)
Less susceptible to interference
Used in printer connections
Used in USB connections
Each bit is transmitted on a separate wire
Commonly used in computer processors
transmits multiple bits simultaneously on multiple channels.
3.
CATEGORIZE QUESTION
3 mins • 1 pt
Groups:
(a) High-Level Language
,
(b) Low-Level Language
Allows for faster development due to built-in libraries and frameworks
Facilitates code reusability through functions and classes
Requires an interpreter or compiler to convert code into machine language
Less portable and more hardware-dependent
Easier to read/write/understand code as uses English-like statements
Emphasizes efficiency and control over resources
Specific to a particular hardware platform
Requires a deep understanding of computer architecture
Used for system programming and device drivers
Generally platform-independent
Examples include Python, Java, and Ruby
Commonly used for web development and data analysis
Examples include Assembly language and machine code
Emphasizes abstraction and automation
Directly interacts with hardware and memory addresses
Difficult to read and write due to complex syntax
4.
CATEGORIZE QUESTION
3 mins • 1 pt
Groups:
(a) ASCII Code
,
(b) Unicode
uses 7 bits to store a character
extended ASCII uses 8 bits
supports over 143,000 characters
Stands for American Standard Code for Information Interchange
commonly used in English text
limited to 128 characters
uses 32 bits to store a character
includes control characters
includes characters from multiple languages
5.
CATEGORIZE QUESTION
3 mins • 1 pt
Groups:
(a) IPv4
,
(b) IPv6
,
(c) Static IP Address
,
(d) Dynamic IP Address
it has a total of 340 undecillion addresses
it uses DHCP for address assignment
it is not assigned by a DHCP server
it uses a hexadecimal notation
it is 128-bit
it uses a dotted decimal notation
it assigns IP addresses dynamically
it is 32-bit,
Each group of digits is a number between 0 and 65535
it allows for easy network management
Consists of four groups of digits
Uses double colons (::)
it is typically used for servers
it remains constant and does not change
6.
CATEGORIZE QUESTION
3 mins • 1 pt
Groups:
(a) Compiler
,
(b) Interpreter
,
(c) IDE
Autocorrect
stops when it reaches an error.
Pretty-Prints
produces faster executable files
translates high-level code to machine code
creates an executable
executes code line by line
Auto complete
does not produce executable files
Reports all errors at the end of compilation
Integrated debugger
typically slower
7.
CATEGORIZE QUESTION
3 mins • 1 pt
Groups:
(a) Symmetric Encryption
,
(b) Asymmetric Encryption
requires the sender and receiver to share the same secret key.
commonly used for securing data in transit.
uses a pair of public and private keys for encryption and decryption of data.
known for its strong security guarantees in encrypting data.
does not require the sender and receiver to share a secret key.
provides better security compared to symmetric encryption.
commonly used for key exchange and digital signatures.
examples include RSA, ECC, and DSA.
uses a single key for both encryption and decryption of data.
less secure than asymmetric encryption due to the shared key.
provides faster encryption and decryption compared to asymmetric encryption.
examples include AES, DES, and 3DES.
slower encryption and decryption process compared to symmetric encryption.
often used in secure email communication and SSL certificate issuance.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?