You are on page 1of 21

1

Pakistan International School Jeddah - English Section


Computer Science (0478)

Test 4 Review Sheet– Y9-____ Total Marks: Obtained Marks:

Name: Student ID: Date:

Y9
Computer science 0478
Test4 Review Sheet
Time allowed: 40 min
Note: Calculator is not allowed.

Y9-CS-2023-24-Test4 Review Sheet


2

1.

Y9-CS-2023-24-Test4 Review Sheet


3

2.

Y9-CS-2023-24-Test4 Review Sheet


4

Y9-CS-2023-24-Test4 Review Sheet


5

3.

Y9-CS-2023-24-Test4 Review Sheet


6

Y9-CS-2023-24-Test4 Review Sheet


7

5.

Y9-CS-2023-24-Test4 Review Sheet


8

Y9-CS-2023-24-Test4 Review Sheet


9

6.

Y9-CS-2023-24-Test4 Review Sheet


10

7.

Y9-CS-2023-24-Test4 Review Sheet


11

8.

Y9-CS-2023-24-Test4 Review Sheet


12

9.

Y9-CS-2023-24-Test4 Review Sheet


13

Y9-CS-2023-24-Test4 Review Sheet


14

10.
Study the flowchart.

Y9-CS-2023-24-Test4 Review Sheet


15

11.

Y9-CS-2023-24-Test4 Review Sheet


16

12.

Y9-CS-2023-24-Test4 Review Sheet


17

Y9-CS-2023-24-Test4 Review Sheet


18

13.

Y9-CS-2023-24-Test4 Review Sheet


19

14.

Y9-CS-2023-24-Test4 Review Sheet


20

Y9-CS-2023-24-Test4 Review Sheet


21

15. Fill in the blank with the words given below. One word can be used more than once.

private key public network Asymmetric encryption same key


encryption Symmetric encryption public key eavesdropper
intercepted

When data is transmitted over any ………………………………………… (wired or wireless), there is

always a risk of it being intercepted by, for example, a hacker. Under these circumstances, a hacker

is often referred to as an ………………………………………… Using

………………………………………… helps to minimise this risk.

………………………………………… alters data into a form that is unreadable by anybody for whom

the data is not intended. It cannot prevent the data being …………………………………………, but it

stops it from making any sense to the eavesdropper. This is particularly important if the data is

sensitive or confidential (for example, credit card/bank details, medical history or legal documents).

………………………………………… uses an encryption key; the

…………………………………………is used to encrypt and decrypt the encoded message. First of all,

consider a simple system that uses a 10-digit denary encryption key (this gives 1 × 1010 possible

codes); and a decryption key.

………………………………………… was developed to overcome the security problems associated

with symmetric encryption. It makes use of two keys called the

…………………………………………and the ………………………………………….

Y9-CS-2023-24-Test4 Review Sheet

You might also like