Error Detection and Correction Quiz

Error Detection and Correction Quiz

10th Grade

14 Qs

quiz-placeholder

Similar activities

2.2 Error detection

2.2 Error detection

10th Grade

18 Qs

unit 2: error detection

unit 2: error detection

9th - 12th Grade

13 Qs

CS_revision

CS_revision

9th - 11th Grade

12 Qs

Communication

Communication

9th - 12th Grade

16 Qs

Error Detection and Encryption Quiz

Error Detection and Encryption Quiz

10th Grade

12 Qs

Cambridge IGCSE Computer Science 0478 Syllabus

Cambridge IGCSE Computer Science 0478 Syllabus

10th Grade

10 Qs

Year 10 Data Transmission

Year 10 Data Transmission

9th - 12th Grade

13 Qs

Data Transmission

Data Transmission

10th - 12th Grade

11 Qs

Error Detection and Correction Quiz

Error Detection and Correction Quiz

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Batsirai Mandebvu

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a parity bit?

To locate where an error occurred

To correct an error in data

To check if an error occurred during transmission

To compress the data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which error detection method checks both rows and columns in a data block?

Checksum

Echo check

Parity block

ARQ

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In even parity, the number of 1s in a byte including the parity bit must be:

Always 8

An even number

An odd number

Zero

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main disadvantage of an echo check?

It only works with wired transmissions

It is too fast to be reliable

Errors can happen during the return transmission

It cannot detect any type of error

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a check digit algorithm?

Symmetric encryption

ISBN number validation

SHA-2 hashing

Diffie-Hellman exchange

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does asymmetric encryption use?

Only a public key

One shared key

A public key and a private key

No keys at all

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the SHA-2 algorithm?

To compress data

To create secure hash keys

To decrypt ciphertext

To check parity

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?