GCSE Computing Revision Session - Ultimate Quiz
4 years ago
jwebber
Save
Edit
Host a game
Live GameLive
Homework
Solo Practice
Practice
151 QuestionsShow answers
  • Question 1
    30 seconds
    Q. Which of these computerised systems is NOT categorised as Critical?
    answer choices
    Life Support
    Air Traffic Control
    Graphic Design
    Missile Targeting
  • Question 2
    30 seconds
    Q. Which of these is NOT a 'Proprietary' standard
    answer choices
    HTML
    DOC
    PDF
    MP3
  • Question 3
    30 seconds
    Q. Which of these is NOT an Open standard
    answer choices
    HTML
    CSS
    XLS
    HTTP
  • Question 4
    30 seconds
    Q. The Computer Misuse Act is there to make sure that computers are used for their intended purpose only
    answer choices
    True
    False
  • Question 5
    30 seconds
    Q. Which of these is NOT a way of making computer systems more efficient?
    answer choices
    Automatic Sleep mode
    LED case lighting
    Using Virtual Servers
    Energy Efficient Processors
  • Question 6
    30 seconds
    Q. In binary there are ____ numbers that can be used in each number column
    answer choices
    16
    2
    8
    10
  • Question 7
    30 seconds
    Q. A DENARY number is base _____
    answer choices
    2
    10
    16
    20
  • Question 8
    60 seconds
    Q. The biggest number you can make with 4 binary digits is _____
    answer choices
    15
    14
    13
    16
  • Question 9
    30 seconds
    Q. The biggest number you can make with a 4 digit denary number is 
    answer choices
    10000
    9999
    999
    1000
  • Question 10
    60 seconds
    Q. Denary 28 =  Binary ______
    answer choices
    11100
    11011
    10101
    11110
  • Question 11
    60 seconds
    Q. Denary 5 = Binary ______
    answer choices
    101
    011
    111
    110
  • Question 12
    30 seconds
    Q. Hexadecimal is a base _____ number system
    answer choices
    10
    2
    16
    6
  • Question 13
    30 seconds
    Q. What are IF statements used for?
    answer choices
    Making decisions
    Repeating sections of code
    Storing values while the program is running
    Sharing finished programs online
  • Question 14
    30 seconds
    Q. A VARIABLE is used in a computer program to ....
    answer choices
    Vary the amount of data
    To just store numbers
    A named memory location that stores an input
    To calculate the answer when two numbers are input
  • Question 15
    30 seconds
    Q. This symbol is used in Flow Charts to ...
    answer choices
    input information
    process inputs
    output information
    make a decision
  • Question 16
    30 seconds
    Q. This symbol is used in Flowcharts to ...
    answer choices
    input or output data
    calculate data
    stop a process
    start a process
  • Question 17
    30 seconds
    Q. The following code would
    answer choices
    set the variable "a" to whatever is stored in "answer"
    add whatever is stored in "answer" to the variable "a"
    output the number 7
    repeat forever
  • Question 18
    30 seconds
    Q. What is this piece used for?
    answer choices
    A decision
    A process
    A start or stop?
    A repeat
  • Question 19
    30 seconds
    Q. This student has found out how to make new coding pieces. She has made a new piece called 'spin'. What will happen if the coding piece called spin is clicked or the space bar pressed?
    answer choices
    Nothing
    A sprite will move forward 15 steps
    The sprite will rotate clockwise 15 degrees
    The sprite will keep spinning forever
  • Question 20
    30 seconds
    Q. Which 127 bit system is used by the computer to represent text?
    answer choices
    Floating point
    Binary
    ASCII
    RTF
  • Question 21
    30 seconds
    Q. Which type of graphic stores only the objects and their attributes, e.g. x and y co-ordinates?
    answer choices
    Binary
    Vector
  • Question 22
    30 seconds
    Q. Which type of graphic stores every pixel on the canvas?
    answer choices
    Bitmap
    Vector
  • Question 23
    30 seconds
    Q. What is the name given to the hardware and software that can be used to allow communication between devices?
    answer choices
    Auxiliary
    RGB
    Ethernet
    Interface
  • Question 24
    30 seconds
    Q. Which type of memory is used to store data temporarily (data is lost when the machine switches off)?
    answer choices
    Read Only Memory
    Random Access Memory
  • Question 25
    30 seconds
    Q. Which type of memory holds data permanently?
    answer choices
    Read Only Memory
    Random Access Memory
  • Question 26
    30 seconds
    Q. Which security precaution uses a person's physical characteristics to allow access?
    answer choices
    Encryption
    Biometrics
    Firewall
    Anti-Virus
  • Question 27
    30 seconds
    Q. An internal hyperlink is a link which takes the user to...
    answer choices
    A page within the same website
    A page on a different website
    A different section of the same page
  • Question 28
    30 seconds
    Q. Which language is used to provide the basic formatting and structure of a web page?
    answer choices
    JavaScript
    CSS
    HTML
    Python
  • Question 29
    30 seconds
    Q. Which database field type would be used to store a customer's account balance?
    answer choices
    Numeric
    Object
    Currency
    Text
  • Question 30
    30 seconds
    Q. What is an example of an output device?
    answer choices
    Mouse
    Microphone
    Speakers
    DVD
  • Question 31
    30 seconds
    Q. What is an example of an input device?
    answer choices
    Keyboard
    Speakers
    Monitor
    DVD
  • Question 32
    10 seconds
    Q. What is spam?
    answer choices
    unsolicited messages sent to you
    Send Programs And Machine code
    untitled messages
    A Virus
  • Question 33
    30 seconds
    Q. Which database field type would be used to store a customer's name?
    answer choices
    Text
    Numeric
    Date/Time
    Object
  • Question 34
    30 seconds
    Q. Firefox, Opera, Chrome, Safari and Explorer are types of what?
    answer choices
    Wildlife Charities
    Folder
    Web Browser
    Different colours of the new Vauxhall Vectra
  • Question 35
    20 seconds
    Q. What computer component is displayed?
    answer choices
    Expansion Card
    CPU
    Motherboard
    Memory 
  • Question 36
    20 seconds
    Q. What is PSU?
    answer choices
    Personal Supplying Unit
    None of these
    Personal upplication Unify
    Power supply unit
  • Question 37
    30 seconds
    Q. What are these?
    answer choices
    Tower
    Motherboard
    Harddrive
    RAM memory
  • Question 38
    30 seconds
    Q. In terms of computing, what does CPU stand for?
    answer choices
    central pc unit
    clean processing unit 
    computer processing unit
    Central processing unit
  • Question 39
    30 seconds
    Q. What is the part of a database that only holds 1 type of information?
    answer choices
    Field
    Record
    Table
    Query
  • Question 40
    30 seconds
    Q. What does HTML stand for?
    answer choices
    Hyper Text Mark up Lingo
    Hyper Text Mark Up Language
    Hyper Total Managed Language 
    Handy Texting Management Level
  • Question 41
    30 seconds
    Q. A computer which is attached to a network is called a
    answer choices
    Personal computer
    Stand alone
    Work alone
    Work station
  • Question 42
    30 seconds
    Q. What is a nibble?
    answer choices
    2 bits
    4 bits
    8 bits
    6 bits
  • Question 43
    30 seconds
    Q. What is a byte?
    answer choices
    8 bits
    4 bits
    2 bits
    1 bit
  • Question 44
    30 seconds
    Q. How many bytes in a kilobyte?
    answer choices
    1000
    1024
    256
    512
  • Question 45
    30 seconds
    Q. How many kilobytes in a megabyte?
    answer choices
    1024
    1000
    1000000
    500
  • Question 46
    30 seconds
    Q. How does a computer process instructions?
    answer choices
    By converting it into binary
    By splitting the instruction up into an operand and an operator
    By changing the format of a file
    By magic
  • Question 47
    30 seconds
    Q. What is an operator in computing?
    answer choices
    A mathematical operator
    Something that can be done to a file
    Something that tells the computer what the instruction is
    Something that will change the format of a file
  • Question 48
    30 seconds
    Q. What is an operand in computer?
    answer choices
    Something that tells the computer what to apply the instruction to.
    Something that changes the format of a file
    Something that can be done to a file
    A method of translating text into binary
  • Question 49
    30 seconds
    Q. What is the number 10 in binary?
    answer choices
    1010
    1111
    0001
    0110
  • Question 50
    30 seconds
    Q. What is the hexadecimal number FF in denary?
    answer choices
    255
    256
    254
    257
  • Question 51
    30 seconds
    Q. Why do programmers use hexadecimal?
    answer choices
    To avoid very large and confusing binary numbers
    To prevent the computer decoding binary numbers
    To avoid small binary numbers
    Because they felt that binary was too simple.
  • Question 52
    30 seconds
    Q. The ... allows data packets to travel to and from the system and the network
    answer choices
    Hub
    Switch
    Router
    Modem
  • Question 53
    30 seconds
    Q. The ... is attached to the end of the network to stop the data from bouncing back and causing interference
    answer choices
    Repeater
    Terminator
    Modem
    Switch
  • Question 54
    30 seconds
    Q. The ... is placed between each network segment to boost the signal on to the next one
    answer choices
    Terminator
    Router
    Switch
    Repeater
  • Question 55
    30 seconds
    Q. All computers have Network Interface Cards built in
    answer choices
    True
    False
  • Question 56
    30 seconds
    Q. The further apart the networked computers, the ... the signal will become
    answer choices
    Stronger
    Weaker
  • Question 57
    30 seconds
    Q. If 2 computers try to send data packets at the same time there could be a ...
    answer choices
    Disaster
    Crash
    Collision
    Conflict
  • Question 58
    20 seconds
    Q. Which of the following is external hardware?
    answer choices
    Video Card
    Keyboard
    Sound Card
    ROM
  • Question 59
    20 seconds
    Q. Which of the following is internal hardware?
    answer choices
    Sound Card
    Scanner
    Web Cam
    USB Flash Drive
  • Question 60
    20 seconds
    Q. What are the two main categories of software?
    answer choices
    Apps & Games
    Applications & Systems
    Office & Adobe
    OS & Games
  • Question 61
    20 seconds
    Q. What are the two types of drive used for permanent data storage inside a computer?
    answer choices
    Solid State & ROM
    ROM & RAM
    Hard Disk Drive & RAM
    Hard Disk Drive & Solid State Drive
  • Question 62
    20 seconds
    Q. Which of the following is applications software?
    answer choices
    Anti-Virus
    Device Driver
    Operating System
    Database
  • Question 63
    20 seconds
    Q. Which of the following is systems software?
    answer choices
    Spreadsheet
    Word Processor
    Video Editing
    Disk Defragmentation
  • Question 64
    20 seconds
    Q. Which of the following is contained in the ROM BIOS?
    answer choices
    Boot File
    Apps
    Utilities
    User Interface
  • Question 65
    20 seconds
    Q. What does BIOS stand for?
    answer choices
    Broadband Internet Operating System
    Basic Input Output System
    Basic Internet Operating System
    Binary Input Output System
  • Question 66
    30 seconds
    Q. Name the computer hardware shown.
    answer choices
    CPU and Internal Hard Drive
    Mouse
    Monitor
    Speakers
  • Question 67
    30 seconds
    Q. Name the computer hardware shown.
    answer choices
    Printer
    Mouse
    Monitor
    Speakers
  • Question 68
    30 seconds
    Q. Name the computer hardware shown.
    answer choices
    Keyboard
    Cables
    Printer
    USB Flash Drive
  • Question 69
    30 seconds
    Q. Name the computer hardware shown.
    answer choices
    Printer
    Speakers
    CPU and Internal Hard Drive
    Keyboard
  • Question 70
    30 seconds
    Q. Name the computer hardware shown.
    answer choices
    Printer
    Mouse
    Monitor
    Speakers
  • Question 71
    20 seconds
    Q. All computer systems have input, processes, output and... 
    answer choices
    Feedback
    Data
    Information
    Storage
  • Question 72
    20 seconds
    Q. Which of the following is an input device?
    answer choices
    Scanner
    Projector
    Headphones
    Robotic Arm
  • Question 73
    20 seconds
    Q. Which of the following is not a storage device?
    answer choices
    Magnetic Tape
    Hard Disk
    RAM
    ROM
  • Question 74
    20 seconds
    Q. Which of the following is a computer's primary storage?
    answer choices
    Magnetic Tape
    Hard Disk
    RAM
    ROM
  • Question 75
    20 seconds
    Q. What is called when output from a computer system is used as input?
    answer choices
    Storage
    Reinput
    Feedback
    Processing
  • Question 76
    30 seconds
    Q. What type of network is this?
    answer choices
    Ring 
    Bus 
    Star
    Mesh
  • Question 77
    30 seconds
    Q. In a star network
    answer choices
    Each device is connected to a switch or hub
    Each device connects to each other
    Each device is connected in a line
    Each device is connected to a terminal
  • Question 78
    30 seconds
    Q. The internet is the worlds biggest
    answer choices
    LAN
    WAN
  • Question 79
    30 seconds
    Q. What does LAN stand for?
    answer choices
    Local Art Network
    Localise Aerial Network
    Local Area Network
    Local Area News
  • Question 80
    30 seconds
    Q. Repeaters can
    answer choices
    Amplify signals
    Make signals slower
    Absorb signals
    Corrupt signals
  • Question 81
    30 seconds
    Q. What does NIC stand for?
    answer choices
    Network Internet Card
    New Internet Creator
    Network Interface Card
    Network Interceptor Card
  • Question 82
    30 seconds
    Q. A router can
    answer choices
    Forward data packets
    Absorb signals
    Repeat signals
    absorb data packets
  • Question 83
    30 seconds
    Q. Created by Tim Berners-Lee
    answer choices
    Internet
    WWW
  • Question 84
    30 seconds
    Q. What is a  database?  
    answer choices
    An organized Collection of info that pertains to a particular subject or purpose. 
    A category of info in a table (a column
    A collection of info consisting of one or more related fields about a specific entity (a row) 
    A field, contained in two or more tables, that forms a relationship between the table 
  • Question 85
    30 seconds
    Q.  Databases can have a maximum of one foreign key 
    answer choices
    True
    false
  • Question 86
    30 seconds
    Q. What is a collection of info consisting of one or more related fields about a specific entity?
    answer choices
    Table
    field
    record
    database
  • Question 87
    30 seconds
    Q. Computer Systems consist of...
    answer choices
    Hardware (input/output/storage devices)
    Software (operating system/system software etc.)
    Processors (the CPU chip/Graphics processors)
    All of these
  • Question 88
    30 seconds
    Q. The __________________ tells the processor the job that needs to be done. A simple operation might be 'add' or 'subtract'. If we use the analogy of a recipe, the opcode might be 'chop' or 'mix'.
    answer choices
    opcode
    operand
  • Question 89
    30 seconds
    Q. In this example, what is the Opcode?
    MOV AL, 34h
    answer choices
    MOV
    AL
    34h
  • Question 90
    30 seconds
    Q. In this example, what is the Operand??
    MOV AL, 34h
    answer choices
    MOV
    Register AL and Hex 34h
  • Question 91
    30 seconds
    Q. The main purpose of networking is to share data between computers. A file has to be broken up into small chunks of data known as data __________ in order to be transmitted over a network. The data is then re-built once it reaches the destination computer.
    answer choices
    packets
    grams
    information
    networks
  • Question 92
    30 seconds
    Q. What are these advantages and disadvantages for?
    answer choices
    Networks
    Databases
    Spreadsheets
    Dynamic Link Libraries (DLLs)
  • Question 93
    180 seconds
    Q. ___________ match domain names like google.com to their associated IP addresses — 216.58.213.110 in the case of google.com. When you type google.com into your web browser’s address bar, your computer contacts your current ____________ and asks what IP address is associated with google.com. Your computer then connects to the IP address and displays “google.com” in your web browser – the connection to 216.58.213.110 happens behind the scenes.
    answer choices
    DNS Server
    Network Protocol
    Firewall
    Internet Protocol (IP)
  • Question 94
    30 seconds
    Q. Name the logic gate
    answer choices
    AND
    OR
    NOT
  • Question 95
    30 seconds
    Q. Name the logic gate
    answer choices
    AND
    OR
    NOT
  • Question 96
    30 seconds
    Q. How many bits are used in ASCII? (1-4)
    answer choices
    16
    1
    7
    8
  • Question 97
    30 seconds
    Q. How many Bytes are used in Unicode? (1-4)
    answer choices
    8
    16
    1
    2
  • Question 98
    30 seconds
    Q. The ASCII is capable of representing non-European languages. (3-4)
    answer choices
    True
    False
  • Question 99
    30 seconds
    Q. What is the maximum number of values that can be represented in 8bits? (4-6)
    answer choices
    16
    256
    65,536
    128
  • Question 100
    30 seconds
    Q. What is the maximum number of values that can be represented in 7bits? (4-6)
    answer choices
    16
    256
    65,536
    128
  • Question 101
    30 seconds
    Q. A character set is… (4-6)
    answer choices
    What language can be used in a computer system
    The fonts that a computer has installed.
    The possible characters that can be represented by a computer system.
  • Question 102
    30 seconds
    Q. ASCII Stands for (6-7)
    answer choices
    American Standard Code for Information Interchange
    American Scientific Code for Information Interchanging
    Absolute Standard Codes for Instruction Interchange
  • Question 103
    30 seconds
    Q. What does HTTPS stand for? (1-4)
    answer choices
    Hypertext Transfer Protocol Secure
    Hyper Text Protocol Secure
    Hidden Text Transfer Protocol Station
    Hypertext Transfer Protocol Station
  • Question 104
    30 seconds
    Q. Which of these Protocols deals with Email? (1-4)
    answer choices
    FTP
    @POP
    SMTP
    HTTP
  • Question 105
    30 seconds
    Q. What does FTP stand for? (1-4)
    answer choices
    Flat Transfer Procedure
    File Transfer Protocol
    Flat Transfer Protocol
    File Transferring Protocol
  • Question 106
    30 seconds
    Q. Which of these is not a Protocol? (5-6)
    answer choices
    TCP/IP
    DCHP
    HTTP
    HTTPS
  • Question 107
    30 seconds
    Q. Which of these is not a Protocol? (5-6)
    answer choices
    DNS
    FTP
    POP
    IMAP
  • Question 108
    30 seconds
    Q. Where is a MAC address stored? (5-6)
    answer choices
    In the computer
    On the NIC
    As a list in the router
    On the Internet
  • Question 109
    30 seconds
    Q. A MAC Address is usually recorded in (5-6)
    answer choices
    Binary
    Denary
    Floats
    Hexadecimal
  • Question 110
    30 seconds
    Q. Which of these if not A real IP address? (7-9)
    answer choices
    192.168.2.156
    192.168.2.1
    192.168.2.200
    192.168.2.328
  • Question 111
    30 seconds
    Q. What does SMTP stand for? (1-4)
    answer choices
    Server Mail Transfer Protocol
    Simple Mail Transition Protocol
    Simple Mail Transfer Protocol
    Server Mailing Transfer Procedure
  • Question 112
    30 seconds
    Q. The Encryption method used on Secure Internet transitions is called?(5-6)
    answer choices
    Public Key Encryption
    Public Code Encrypting
    Public Key Encrypting
    Private Key Encryption
  • Question 113
    30 seconds
    Q. Encryption requires a key? (1-4)
    answer choices
    True
    False
  • Question 114
    30 seconds
    Q. Which term describes the physical layout of a Network? (1-4)
    answer choices
    Topology
    Topping
    Topiology
    Toppology
  • Question 115
    30 seconds
    Q. What is a benefit of a wired network over a wireless network? (7-9)
    answer choices
    Increased costs
    Technical Knowledge needed
    Faster Data Transfer Speeds
    Easier to hack
  • Question 116
    30 seconds
    Q.

    What is a benefit of a mesh network over a star network? (7-9)

    answer choices

    Cabling is often easier to follow

    Increased redundancy

    There is no benefit

    It costs less to set up

  • Question 117
    60 seconds
    Q. What is the purpose of the CPU?
    answer choices
    To process all the data and instructions.
    To turn the computer on.
    To create PowerPoint presentations.
    To provide power to the computer.
  • Question 118
    30 seconds
    Q. What is meant by the term ‘stakeholder’? (1-4)
    answer choices
    A stakeholder is the person who owns a product or organisation
    A stakeholder is anyone who has an interest in or concern about a product ororganisation
    A stakeholder is the person who buys products from an organisation
    A stakeholder is the person who creates the legislation that governs the buying andselling of products
  • Question 119
    30 seconds
    Q. Which legislation governs the act of hacking? (1-4)
    answer choices
    The Freedom of Information Act
    The Data Protection Act
    The Creative Commons License
    The Computer Misuse Act
  • Question 120
    30 seconds
    Q. What does the Data Protection Act give an individual the right to do? (3-6)
    answer choices
    A right to request the data an organisation holds about them without paying a fee
    A right to request the data an organisation holds on them for a fee
    A right to request the data an organisation holds about anyone without paying a fee
    A right to request the data an organisation holds about anyone for a fee
  • Question 121
    30 seconds
    Q. Which of these statements is true about the Freedom of Information Act? (3-6)
    answer choices
    An individual has the right to have any of their personal data corrected that is inaccurateor out of date
    An individual has the right to compensation if their personal data is stolen
    An individual has right of access to information held by public authorities
    An individual has the right to share any intellectual property they have
  • Question 122
    30 seconds
    Q. A company produces an App using only the ASCII character set. What issue may they not have considered?
    answer choices
    Cultural
    Legal
    Environmental
    Moral/Ethical
  • Question 123
    30 seconds
    Q. A company produces an App using only the ASCII character set. What issue may they not have considered?
    answer choices
    Cultural
    Legal
    Environmental
    Moral/Ethical
  • Question 124
    30 seconds
    Q. What numeric base does Binary operate on? (1-4)
    answer choices
    2
    1
    8
    16
  • Question 125
    30 seconds
    Q. How Bytes are there in a Terabyte? (5-7)
    answer choices
    1024 Kilobytes
    1024 Megabytes
    1024 Gigabytes
    1024 bytes
  • Question 126
    30 seconds
    Q. Which of these is not a method for ensuring a program is robust? (1-4) 
    answer choices
    Keeping passwords safe 
    Data Validation 
    Authentication 
    Data Sanitisation 
  • Question 127
    30 seconds
    Q. Why is code indented? (1-4) 
    answer choices
    To group together a function 
    The code does not use a { syntax and indentation is used instead 
    To make it easier to read 
    All of the above 
  • Question 128
    30 seconds
    Q. Which of these authentication methods is most secure? (1-4) 
    answer choices
    Password 
    Password and username 
    Key Card 
    Physical and Code 
  • Question 129
    30 seconds
    Q.

    When a program runs it asks the user to enter their first name. Which is an example of Valid data? (4-6)

    answer choices

    Mr Jones

    Sarah

    Sarah Jones

    Mrs Jones

  • Question 130
    30 seconds
    Q. Which one of these is not a method for planning for misuse? (1-4) 
    answer choices
    Stripping unwanted characters
    Removing duplicated letters
    Converting lowercase to uppercase Letters
    Calculating answers from formula
  • Question 131
    30 seconds
    Q. What is defensive programming design? (4-6) 
    answer choices
    Making your code / program error free 
    Creating code that is easy to use and understand 
    A method of ensuring that your code is not misused 
    Code where the data is validated 
  • Question 132
    30 seconds
    Q. What is the difference between Data Validation and Input Sanitsation? (6-9) 
    answer choices
    Nothing, they are the same? 
    Data Validation checks the data is reasonable and Sanitsation removes unexpected or unrequired data. 
    Sanitisation checks the data is correct and Validation removes invalid 
    Calculating answers from formula 
  • Question 133
    30 seconds
    Q. A program has a section of code that could cause errors, which method could be used to identify this issue? (6-9) 
    answer choices
    Maintainability 
    Authentication 
    Program Comments 
    Indentation 
  • Question 134
    30 seconds
    Q. A section of a program has recently stopped working, which method could be used to resolve this issue? (6-9) 
    answer choices
    Data Validation 
    Input Sanitsation 
    Maintainability 
    Authentication 
  • Question 135
    30 seconds
    Q. When is terminal testing carried out? (1-3) 
    answer choices
    Before you start 
    At the end 
    During the project 
    After the design section 
  • Question 136
    30 seconds
    Q. Why is code indented? (1-3) 
    answer choices
    To group together a function 
    The code may not use a { synax and indentation is used instead 
    To support code maintainability 
    All of the above 
  • Question 137
    30 seconds
    Q. Which of these is NOT a feature of a test plan? (3-5) 
    answer choices
    The type of test data 
    If the testing is terminal or iterative 
    The expected outcome 
    The result of the test 
  • Question 138
    30 seconds
    Q. When is a runtime error identi ed? (3-5) 
    answer choices
    After the program is executed 
    Before a program runs 
    While the program runs 
  • Question 139
    30 seconds
    Q. Which line contains a syntax error? (3-5) 
    answer choices
    print (“hello”) 
    sprint(“Hello”) 
    print(“hello) 
    print(“HELLO”) 
  • Question 140
    30 seconds
    Q.

    When is a runtime error identified? (3-5)

    answer choices

    After the program is executed

    Before a program runs

    While the program runs

  • Question 141
    30 seconds
    Q. What is iterative testing? (3-5) 
    answer choices
    Testing completed after an error is found 
    Random tests on a computer program 
    Tests completed as the program is being coded 
    Tests which are planned 
  • Question 142
    20 seconds
    Q. What are the programs that run on a computer system called? 
    answer choices
    Algorithms
    Code
    Software
    Languages
  • Question 143
    20 seconds
    Q. What is the answer to 1010 + 0101?
    answer choices
    1011
    1001
    1111
    0111
  • Question 144
    30 seconds
    Q. What is cache memory?
    answer choices
    It is used to permanently store data and programs
    It is used to store numbers
    It is used between the RAM and CPU to improve performance by holding data that has just been or is about to be processed.
    It is used to store letters  
  • Question 145
    30 seconds
    Q. Databases are made up of one or more ......
    answer choices
    Tables
    Files
    File types
    Spreadsheets
  • Question 146
    30 seconds
    Q. Complete the following SQL query to find all records for surname = "Khan":
    SELECT * FROM Customers ......
    answer choices
    surname = "Khan"
    WHERE surname = "Khan"
    AND surname = "Khan"
    WHEN surname = "Khan"
  • Question 147
    30 seconds
    Q.

    What is meant by bit depth?

    answer choices

    The number of samples taken per second

    The amplitude of each sample

    The number of bits used per second of audio

    The number of bits used to store each sound sample

  • Question 148
    30 seconds
    Q.

    What is Packet Switching?

    answer choices

    Sending packets over different routes on the internet

    exchanging packets from one user to another

    stealing one packet and swapping another one to replace it

  • Question 149
    30 seconds
    Q.

    The Barcode used for books is called

    answer choices

    ISBN

    PDF 417

    Maxi Code

    QR code

  • Question 150
    30 seconds
    Q.

    What sample rate is used for CD quality sound?

    answer choices

    44,100Hz

    88,200Hz

    22,100Hz

  • Question 151
    30 seconds
    Q.

    What unit is sample rate measured in?

    answer choices

    Bits per second

    Hertz

    Megabits per second

Report Quiz
Join a game