Search Header Logo

Paper 1:Review_Revisions

Authored by Jocelyn Mallillin Gamo

Computers

10th Grade

Used 1+ times

Paper 1:Review_Revisions
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify three registers that may be used in the Von Neumann model of a computer system.

MAR, MDR, PC

CPU, GPU, ALU

RAM, ROM, Cache

BIOS, OS, Application

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Identify the two other stages of processing instructions besides the decode stage.

Fetch and Execute

Store and Write

Load and Run

Compile and Debug

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the component of the CPU responsible for decoding instructions.

ALU

Control Unit

Register

Cache

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why would a programmer use both an interpreter and a compiler?

To translate high-level language into low-level language

To convert binary code into machine code

To run the code on different operating systems

To improve security of the program

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What are three advantages of using a high-level language over a low-level language?

Easier to understand, debug, and maintain

Uses more memory, is harder to debug, and runs slower

Directly interacts with hardware, requires no interpreter, and is more secure

Needs less storage, is optimized for speed, and runs only on Linux

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How is data encrypted using symmetric encryption before transmission?

It uses a single key for both encryption and decryption

It uses separate keys for encryption and decryption

It converts data into binary before sending

It sends data as plain text with a hash

7.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Which three methods can be used to secure data stored in an office?

Firewall, Passwords, Physical Security (e.g., CCTV)

Cloud backup, Email forwarding, USB encryption

Disabling the internet, Using open-source software, Encrypting emails

Installing antivirus, Printing data, Using Bluetooth transfers

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?