1) who is bill gates ? a) the founder of apple b) the founder of Microsoft c) a famous actor d) a famous scientist e) the first person to step on the moon f) a famous cook 2) what operating system do school computers use? a) windows b) Linux c) Unix d) android e) IOS f) Mac OS 3) what operating systems do Samsung phones use? a) android b) Linux c) windows d) Unix e) IOS f) Mac OS 4) what do Operating systems do? a) make a computer actually functional b) they build the computer c) they are just useless software d) they are a special type of insurance e) it is another name of a keyboard f) it is an A.I 5) what is RAM? a) random access memory b) read only memory c) an extra storage unit you plug into a computer  d) a random piece of a fan  e) the mother board  f) some useless piece of rubbish 6) what is ROM? a) read only memory b) Random access memory c) an extra storage unit you plug into a computer d) a random piece of a fan e) the mother board f) some useless piece of rubbish 7) what is volatile? a) memory that is only there when the computer is powered on b) ROM c) the keyboard response d) the mouse sensitivity e) another name for the space bar f) the graphics card 8) what is non volatile? a) RAM b) memory that is still there when the computer is turned off c) the sound card d) the same as volatile e) the graphics card   f) a random software 9) what is secondary storage? a) the storage that is not always available for example CD's or DVD's b) RAM c) ROM d) the keyboard e) the mouse f) the monitor 10) why is secondary storage needed? a) because it is Non volatile b) because it is volatile c) because it is the operating system 11) what is the FDE cycle? a) it is the process where it gets instructions from its memory b) it starts the computer up c) it is the graphics card d) it controls the operating system e) it is the clock on the computer f) the off button 12) What is the CPU (Central Processing Unit) main purpose? a) to Carrie out commands b) to manage the FDE cycle c) to turn the computer on d) to keep the RAM updated e) to make it so text can be entered 13) What storage device/medium would you use to store a word document ? a) a hard disk b) headphones c) the monitor d) the mouse e) the keyboard f) the mouse pad 14) Why would you use that storage device/medium? a) to make it accessible b) to make the monitor work c) to make the mouse work d) to make the keyboard work  e) to make the software work f) for fun 15) What storage device would you use to store a game ? a) a flash drive b) a pencil c) primary storage d) ROM e) the monitor f) the keyboard 16) Why would you use that storage device/medium? a) to make it accessible b) for fun c) to add to the fun d) to make the monitor work e) to add effect 17) What is binary ? a) 1001101 b) base 2 c) hello d) yes e) no 10101010101001 f) base 10 18) How do you convert binary to denary ? a) 1,2,4,8,1,6,32,64 b) 5+10+15+20+25+30 c) 1+2+3+4+5+6+7+8+9+10 d) 2-9+10 e) 001101010010101010 f) 0000000000 19) - What is denary (what numbers use this)? a) base 10 b) base 11 c) base 12 d) base 2 e) base 0.1 f) base 100 20) How do you convert denary to binary? a) 1,2,4,8,1,6,32,64 b) using base 3 c) using base 4 d) using base 5 e) using base 6 f) using base 7 21) what is the screen on a computer called a) monitor b) keyboard c) mouse d) mother board e) graphics card f) 01101101 01101111 01101110 01101001 01110100 01101111 01110010 0010000 22) Which of these character sets allows the largest number of different characters? a) ASCII b) Extended ASCII c) Unicode 23) Which character set can represent English text using the least storage space? a) ASCII b) Extended ASCII c) Unicode 24) Which character set can represent emoji's? a) ASCII b) Extended ASCII c) Unicode 25) What is meant by encryption? a) the process of decoding data in such a way that only authorised parties can access it b) the process of encoding data in such a way that only unauthorised parties can access it c) the process of encoding data in such a way that only authorised parties can access it 26) Which of these are not a method of encryption?  a) The Caesar Cipher b) The Atbash Cipher c) The Sherlock Cipher 27) Which method of encryption uses a key where the letters of the alphabet are reversed? a) The Caesar Cipher b) The Atbash Cipher c) The Affine Cipher 28) Who was Alan Turing? a) A British pioneer in computer science b) The man who wrote the Enigma code c) A solider in the second world war 29) What did Alan Turing do? a) Invented the computer b) Invented the machine that wrote the Enigma code c) Invented the machine that cracked the Enigma code

ลีดเดอร์บอร์ด

สไตล์ภาพ

ตัวเลือก

สลับแม่แบบ

คืนค่าการบันทึกอัตโนมัติ: ใช่ไหม