0 of 34 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 34 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
What is meant by the term ‘clock speed’ when discussing the CPU?
Which stage of the CPU processing cycle is being described here: “instructions are carried out on the data”?
What is a ‘register’ when discussing CPU’s?
What is the advantage of cache memory?
Where are data and instructions taken from during a CPU processing cycle?
Which register is responsible for storing the ‘address’ of the next instruction required by the CPU?
The term given to devices which store applications and files and do not directly supply the CPU with data/instructions, is known as…
This type of memory enables the computer to continue to function (albeit slower) if too many programs are open and in use at the same time.
Volatile memory is…
What is the purpose of the ROM?
USB memory sticks and SD cards all use which type of storage technology?
Flash memory technology works by…
An upgrade of this type of memory will mean that the computer will be more efficient at multi-tasking as more programs will be able to run simultaneously.
Which topology is being described? “All cables connect to a hub or a switch and therefore data doesn’t share one cable, which results in fewer data collisions and therefore a faster network. However, this is a very expensive topology as it requires a lot of cable”
Tick the 4 different devices required to set up a LAN.
Select the device being described. “This device converts the data signals from a nodes into data signals that can be transferred across the network”.
Which statement best describes the internet?
What is an ISP?
Which statement describes a virtual network?
This data transfer medium “uses pulses of electricity to transport data”.
Tick all of the structures that you would find on a data packet.
POP, IMAP and SMTP are all examples of protocols relating to…
“Experts try to simulate a range of network attacks (such as Denial of Service attacks (DoS), SQL injections and Brute Force Attacks) in an attempt to discover any weaknesses in the system “…is an example of what security method?
“The art of ‘bolting on’ some ‘database query instructions’ to the end of a password, which will allow access the accounts of other users”. Which threat is being described here?
“Software, which is specifically designed to cause physical harm to a computer system”. Which threat is being described here?
Which statement best defines the term ‘Interface’?
Which statement best describes the ‘Kernel’?
“Offering only a limited number of computer functions, from which the user can choose”…is an example of which user interface?
“Reduces the size of files”…describes which type of utility software?
“Scrambles data before being sent across a network”…describes which type of utility software?
“When data is temporarily removed from the file, but added back (rebuilt), when the file is to be used again”…is an example of which type of compression?
Which law deals with issues surrounding ‘the use of people’s data’?
“How technology impacts the environment and how environmental issues affect technological progress” describes which type of issue?
Which law deals with issues surrounding ‘hacking’ and ‘viruses’?