Baseline Test 2 Statistics - Tables
How difficult are the questions?
Question | Year 6 | Year 7 | Year 8 | Year 9 | Year 10 | ||||||||||
Boys | Girls | All | Boys | Girls | All | Boys | Girls | All | Boys | Girls | All | Boys | Girls | All | |
1 | 9 | 10 | 10 | 9 | 10 | 10 | 8 | 9 | 9 | 8 | 8 | 8 | 6 | 7 | 7 |
2 | 7 | 5 | 6 | 6 | 5 | 6 | 6 | 4 | 5 | 5 | 4 | 5 | 5 | 4 | 5 |
3 | 20 | 16 | 18 | 21 | 15 | 18 | 19 | 13 | 16 | 17 | 11 | 14 | 12 | 9 | 11 |
4 | 75 | 77 | 76 | 74 | 74 | 74 | 71 | 70 | 71 | 66 | 64 | 65 | 65 | 62 | 64 |
5 | 46 | 46 | 46 | 47 | 44 | 46 | 45 | 43 | 44 | 45 | 42 | 44 | 43 | 40 | 42 |
6 | 38 | 35 | 37 | 40 | 35 | 38 | 38 | 30 | 34 | 35 | 30 | 33 | 30 | 26 | 28 |
7 | 34 | 35 | 35 | 36 | 36 | 36 | 33 | 32 | 33 | 30 | 29 | 30 | 27 | 29 | 28 |
8 | 74 | 76 | 75 | 72 | 74 | 73 | 72 | 71 | 72 | 69 | 69 | 69 | 65 | 68 | 67 |
9 | 63 | 59 | 61 | 62 | 59 | 61 | 61 | 58 | 60 | 58 | 55 | 57 | 56 | 55 | 56 |
10 | 71 | 75 | 73 | 70 | 76 | 73 | 71 | 74 | 73 | 68 | 72 | 70 | 67 | 71 | 69 |
11 | 65 | 64 | 65 | 64 | 64 | 64 | 63 | 61 | 62 | 61 | 61 | 61 | 61 | 62 | 62 |
12 | 73 | 73 | 73 | 73 | 72 | 73 | 74 | 71 | 73 | 73 | 72 | 73 | 72 | 72 | 72 |
13 | 62 | 64 | 63 | 56 | 56 | 56 | 50 | 48 | 49 | 46 | 41 | 44 | 37 | 33 | 35 |
14 | 67 | 66 | 67 | 68 | 68 | 68 | 72 | 71 | 72 | 73 | 73 | 73 | 74 | 76 | 75 |
15 | 19 | 17 | 18 | 18 | 17 | 18 | 16 | 13 | 15 | 14 | 11 | 13 | 12 | 11 | 12 |
16 | 58 | 60 | 59 | 60 | 62 | 61 | 60 | 61 | 61 | 57 | 57 | 57 | 52 | 55 | 54 |
17 | 75 | 73 | 74 | 74 | 72 | 73 | 71 | 69 | 70 | 68 | 65 | 67 | 63 | 63 | 63 |
18 | 54 | 48 | 51 | 56 | 49 | 53 | 51 | 41 | 46 | 44 | 38 | 41 | 39 | 33 | 36 |
19 | 69 | 75 | 72 | 67 | 74 | 71 | 67 | 73 | 70 | 64 | 72 | 68 | 60 | 71 | 66 |
20 | 67 | 64 | 66 | 67 | 64 | 66 | 65 | 65 | 65 | 66 | 64 | 65 | 66 | 64 | 65 |
21 | 57 | 57 | 57 | 57 | 56 | 57 | 57 | 54 | 56 | 55 | 54 | 55 | 56 | 54 | 55 |
22 | 88 | 87 | 88 | 85 | 86 | 86 | 86 | 86 | 86 | 87 | 86 | 87 | 86 | 84 | 85 |
23 | 78 | 77 | 78 | 78 | 76 | 77 | 80 | 79 | 80 | 81 | 79 | 80 | 78 | 79 | 79 |
24 | 58 | 54 | 56 | 58 | 52 | 55 | 56 | 52 | 54 | 52 | 46 | 49 | 50 | 44 | 47 |
25 | 51 | 46 | 49 | 49 | 43 | 46 | 47 | 39 | 43 | 44 | 37 | 41 | 41 | 38 | 40 |
26 | 60 | 56 | 58 | 60 | 54 | 57 | 58 | 53 | 56 | 60 | 55 | 58 | 57 | 54 | 56 |
27 | 71 | 71 | 71 | 70 | 70 | 70 | 69 | 66 | 68 | 65 | 66 | 66 | 63 | 65 | 64 |
28 | 42 | 38 | 40 | 44 | 39 | 42 | 42 | 36 | 39 | 39 | 33 | 36 | 36 | 32 | 34 |
29 | 44 | 38 | 41 | 44 | 37 | 41 | 44 | 37 | 41 | 40 | 32 | 36 | 37 | 31 | 34 |
30 | 28 | 28 | 28 | 25 | 25 | 25 | 25 | 25 | 25 | 23 | 25 | 24 | 23 | 29 | 26 |
31 | 65 | 69 | 67 | 66 | 72 | 69 | 64 | 69 | 67 | 59 | 68 | 64 | 54 | 63 | 59 |
32 | 70 | 72 | 71 | 67 | 68 | 68 | 63 | 65 | 64 | 57 | 64 | 61 | 54 | 57 | 56 |
33 | 82 | 82 | 82 | 81 | 81 | 81 | 80 | 81 | 81 | 79 | 79 | 79 | 78 | 78 | 78 |
34 | 34 | 31 | 33 | 33 | 33 | 33 | 32 | 32 | 32 | 30 | 31 | 31 | 27 | 32 | 30 |
35 | 55 | 55 | 55 | 54 | 54 | 54 | 53 | 53 | 53 | 49 | 46 | 48 | 45 | 48 | 47 |
36 | 51 | 56 | 54 | 50 | 55 | 53 | 47 | 51 | 49 | 41 | 52 | 47 | 37 | 47 | 42 |
37 | 53 | 50 | 52 | 54 | 51 | 53 | 54 | 49 | 52 | 52 | 46 | 49 | 50 | 44 | 47 |
38 | 62 | 64 | 63 | 62 | 62 | 62 | 61 | 60 | 61 | 57 | 60 | 59 | 56 | 58 | 57 |
39 | 71 | 75 | 73 | 71 | 72 | 72 | 70 | 71 | 71 | 71 | 71 | 71 | 68 | 72 | 70 |
40 | 60 | 56 | 58 | 60 | 55 | 58 | 59 | 54 | 57 | 58 | 53 | 56 | 57 | 53 | 55 |
41 | 49 | 58 | 54 | 46 | 52 | 49 | 41 | 46 | 44 | 35 | 41 | 38 | 29 | 36 | 33 |
42 | 36 | 35 | 36 | 39 | 32 | 36 | 35 | 28 | 32 | 29 | 27 | 28 | 27 | 26 | 27 |
43 | 55 | 50 | 53 | 58 | 50 | 54 | 55 | 47 | 51 | 52 | 42 | 47 | 49 | 43 | 46 |
44 | 73 | 72 | 73 | 71 | 70 | 71 | 70 | 68 | 69 | 67 | 67 | 67 | 65 | 67 | 66 |
45 | 51 | 46 | 49 | 52 | 44 | 48 | 51 | 42 | 47 | 48 | 40 | 44 | 45 | 40 | 43 |
46 | 70 | 69 | 70 | 70 | 66 | 68 | 69 | 65 | 67 | 65 | 63 | 64 | 63 | 62 | 63 |
47 | 67 | 66 | 67 | 65 | 64 | 65 | 66 | 62 | 64 | 63 | 61 | 62 | 61 | 60 | 61 |
48 | 71 | 74 | 73 | 68 | 70 | 69 | 66 | 65 | 66 | 59 | 56 | 58 | 48 | 48 | 48 |
49 | 61 | 64 | 63 | 59 | 59 | 59 | 53 | 54 | 54 | 46 | 47 | 47 | 42 | 44 | 43 |
50 | 70 | 71 | 71 | 71 | 67 | 69 | 67 | 65 | 66 | 65 | 60 | 63 | 58 | 59 | 59 |
Popular wrong answers.
Question | Year 6 | Year 7 | Year 8 | Year 9 | Year 10 | ||||||||||
Boys | Girls | All | Boys | Girls | All | Boys | Girls | All | Boys | Girls | All | Boys | Girls | All | |
1 |
d. circle. |
d. circle. |
d. circle. |
d. circle. |
d. circle. |
d. circle. |
d. circle. |
d. circle. |
d. circle. |
d. circle. |
d. circle. |
d. circle. |
d. circle. |
d. circle. |
d. circle. |
2 |
a. sheep. |
a. sheep. |
a. sheep. |
a. sheep. |
a. sheep. |
a. sheep. |
a. sheep. |
a. sheep. |
a. sheep. |
a. sheep. |
a. sheep. |
a. sheep. |
a. sheep. |
c. people. |
a. sheep. |
3 |
c. someone might see their password in their account. |
c. someone might see their password in their account. |
c. someone might see their password in their account. |
c. someone might see their password in their account. |
c. someone might see their password in their account. |
c. someone might see their password in their account. |
c. someone might see their password in their account. |
c. someone might see their password in their account. |
c. someone might see their password in their account. |
c. someone might see their password in their account. |
c. someone might see their password in their account. |
c. someone might see their password in their account. |
c. someone might see their password in their account. |
c. someone might see their password in their account. |
c. someone might see their password in their account. |
4 |
b. not meet under any circumstances. |
b. not meet under any circumstances. |
b. not meet under any circumstances. |
b. not meet under any circumstances. |
b. not meet under any circumstances. |
b. not meet under any circumstances. |
b. not meet under any circumstances. |
b. not meet under any circumstances. |
b. not meet under any circumstances. |
b. not meet under any circumstances. |
b. not meet under any circumstances. |
b. not meet under any circumstances. |
b. not meet under any circumstances. |
b. not meet under any circumstances. |
b. not meet under any circumstances. |
5 |
b. will always be quicker to draw. |
b. will always be quicker to draw. |
b. will always be quicker to draw. |
b. will always be quicker to draw. |
b. will always be quicker to draw. |
b. will always be quicker to draw. |
b. will always be quicker to draw. |
b. will always be quicker to draw. |
b. will always be quicker to draw. |
b. will always be quicker to draw. |
b. will always be quicker to draw. |
b. will always be quicker to draw. |
b. will always be quicker to draw. |
b. will always be quicker to draw. |
b. will always be quicker to draw. |
6 |
c. Light takes 8 minutes to travel to Earth from the Sun. |
c. Light takes 8 minutes to travel to Earth from the Sun. |
c. Light takes 8 minutes to travel to Earth from the Sun. |
c. Light takes 8 minutes to travel to Earth from the Sun. |
c. Light takes 8 minutes to travel to Earth from the Sun. |
c. Light takes 8 minutes to travel to Earth from the Sun. |
c. Light takes 8 minutes to travel to Earth from the Sun. |
d. Apples, Oranges, Grapefruit and Pears. |
c. Light takes 8 minutes to travel to Earth from the Sun. |
d. Apples, Oranges, Grapefruit and Pears. |
d. Apples, Oranges, Grapefruit and Pears. |
d. Apples, Oranges, Grapefruit and Pears. |
c. Light takes 8 minutes to travel to Earth from the Sun. |
c. Light takes 8 minutes to travel to Earth from the Sun. |
c. Light takes 8 minutes to travel to Earth from the Sun. |
7 |
c. an example of computer processing and memory hardware. |
c. an example of computer processing and memory hardware. |
c. an example of computer processing and memory hardware. |
c. an example of computer processing and memory hardware. |
c. an example of computer processing and memory hardware. |
c. an example of computer processing and memory hardware. |
c. an example of computer processing and memory hardware. |
c. an example of computer processing and memory hardware. |
c. an example of computer processing and memory hardware. |
c. an example of computer processing and memory hardware. |
c. an example of computer processing and memory hardware. |
c. an example of computer processing and memory hardware. |
c. an example of computer processing and memory hardware. |
c. an example of computer processing and memory hardware. |
c. an example of computer processing and memory hardware. |
8 |
b. 3000 volts of electricity will be needed for 3000 connections. |
b. 3000 volts of electricity will be needed for 3000 connections. |
b. 3000 volts of electricity will be needed for 3000 connections. |
b. 3000 volts of electricity will be needed for 3000 connections. |
b. 3000 volts of electricity will be needed for 3000 connections. |
b. 3000 volts of electricity will be needed for 3000 connections. |
b. 3000 volts of electricity will be needed for 3000 connections. |
b. 3000 volts of electricity will be needed for 3000 connections. |
b. 3000 volts of electricity will be needed for 3000 connections. |
b. 3000 volts of electricity will be needed for 3000 connections. |
b. 3000 volts of electricity will be needed for 3000 connections. |
b. 3000 volts of electricity will be needed for 3000 connections. |
b. 3000 volts of electricity will be needed for 3000 connections. |
b. 3000 volts of electricity will be needed for 3000 connections. |
b. 3000 volts of electricity will be needed for 3000 connections. |
9 |
b. Print the name of the user of the program. |
b. Print the name of the user of the program. |
b. Print the name of the user of the program. |
a. Print a list of names. |
b. Print the name of the user of the program. |
a. Print a list of names. |
b. Print the name of the user of the program. |
b. Print the name of the user of the program. |
b. Print the name of the user of the program. |
b. Print the name of the user of the program. |
b. Print the name of the user of the program. |
b. Print the name of the user of the program. |
b. Print the name of the user of the program. |
b. Print the name of the user of the program. |
b. Print the name of the user of the program. |
10 |
d. A computer model needs at least 1 GB of memory in the computer. |
d. A computer model needs at least 1 GB of memory in the computer. |
d. A computer model needs at least 1 GB of memory in the computer. |
d. A computer model needs at least 1 GB of memory in the computer. |
d. A computer model needs at least 1 GB of memory in the computer. |
d. A computer model needs at least 1 GB of memory in the computer. |
d. A computer model needs at least 1 GB of memory in the computer. |
d. A computer model needs at least 1 GB of memory in the computer. |
d. A computer model needs at least 1 GB of memory in the computer. |
d. A computer model needs at least 1 GB of memory in the computer. |
d. A computer model needs at least 1 GB of memory in the computer. |
d. A computer model needs at least 1 GB of memory in the computer. |
d. A computer model needs at least 1 GB of memory in the computer. |
d. A computer model needs at least 1 GB of memory in the computer. |
d. A computer model needs at least 1 GB of memory in the computer. |
11 |
b. The algorithm would be more efficient if instruction 3 was put before instruction 2. |
b. The algorithm would be more efficient if instruction 3 was put before instruction 2. |
b. The algorithm would be more efficient if instruction 3 was put before instruction 2. |
b. The algorithm would be more efficient if instruction 3 was put before instruction 2. |
b. The algorithm would be more efficient if instruction 3 was put before instruction 2. |
b. The algorithm would be more efficient if instruction 3 was put before instruction 2. |
b. The algorithm would be more efficient if instruction 3 was put before instruction 2. |
b. The algorithm would be more efficient if instruction 3 was put before instruction 2. |
b. The algorithm would be more efficient if instruction 3 was put before instruction 2. |
b. The algorithm would be more efficient if instruction 3 was put before instruction 2. |
b. The algorithm would be more efficient if instruction 3 was put before instruction 2. |
b. The algorithm would be more efficient if instruction 3 was put before instruction 2. |
b. The algorithm would be more efficient if instruction 3 was put before instruction 2. |
b. The algorithm would be more efficient if instruction 3 was put before instruction 2. |
b. The algorithm would be more efficient if instruction 3 was put before instruction 2. |
12 |
c. "PRINT count" should be moved after "MAKE count INTO count + 1" |
c. "PRINT count" should be moved after "MAKE count INTO count + 1" |
c. "PRINT count" should be moved after "MAKE count INTO count + 1" |
c. "PRINT count" should be moved after "MAKE count INTO count + 1" |
c. "PRINT count" should be moved after "MAKE count INTO count + 1" |
c. "PRINT count" should be moved after "MAKE count INTO count + 1" |
c. "PRINT count" should be moved after "MAKE count INTO count + 1" |
c. "PRINT count" should be moved after "MAKE count INTO count + 1" |
c. "PRINT count" should be moved after "MAKE count INTO count + 1" |
c. "PRINT count" should be moved after "MAKE count INTO count + 1" |
c. "PRINT count" should be moved after "MAKE count INTO count + 1" |
c. "PRINT count" should be moved after "MAKE count INTO count + 1" |
c. "PRINT count" should be moved after "MAKE count INTO count + 1" |
c. "PRINT count" should be moved after "MAKE count INTO count + 1" |
c. "PRINT count" should be moved after "MAKE count INTO count + 1" |
13 |
a. .png |
a. .png |
a. .png |
a. .png |
a. .png |
a. .png |
a. .png |
a. .png |
a. .png |
a. .png |
a. .png |
a. .png |
a. .png |
a. .png |
a. .png |
14 |
b. .bmp |
b. .bmp |
b. .bmp |
b. .bmp |
b. .bmp |
b. .bmp |
b. .bmp |
b. .bmp |
b. .bmp |
b. .bmp |
b. .bmp |
b. .bmp |
b. .bmp |
b. .bmp |
b. .bmp |
15 |
d. software used to format discs |
d. software used to format discs |
d. software used to format discs |
d. software used to format discs |
d. software used to format discs |
d. software used to format discs |
d. software used to format discs |
d. software used to format discs |
d. software used to format discs |
d. software used to format discs |
d. software used to format discs |
d. software used to format discs |
d. software used to format discs |
d. software used to format discs |
d. software used to format discs |
16 |
a. always be shown a random set of advertisements. |
a. always be shown a random set of advertisements. |
a. always be shown a random set of advertisements. |
a. always be shown a random set of advertisements. |
a. always be shown a random set of advertisements. |
a. always be shown a random set of advertisements. |
a. always be shown a random set of advertisements. |
a. always be shown a random set of advertisements. |
a. always be shown a random set of advertisements. |
a. always be shown a random set of advertisements. |
a. always be shown a random set of advertisements. |
a. always be shown a random set of advertisements. |
a. always be shown a random set of advertisements. |
a. always be shown a random set of advertisements. |
a. always be shown a random set of advertisements. |
17 |
a. has to be run on a desktop computer whereas executable code will run on a mobile phone or tablet. |
a. has to be run on a desktop computer whereas executable code will run on a mobile phone or tablet. |
a. has to be run on a desktop computer whereas executable code will run on a mobile phone or tablet. |
a. has to be run on a desktop computer whereas executable code will run on a mobile phone or tablet. |
a. has to be run on a desktop computer whereas executable code will run on a mobile phone or tablet. |
a. has to be run on a desktop computer whereas executable code will run on a mobile phone or tablet. |
a. has to be run on a desktop computer whereas executable code will run on a mobile phone or tablet. |
a. has to be run on a desktop computer whereas executable code will run on a mobile phone or tablet. |
a. has to be run on a desktop computer whereas executable code will run on a mobile phone or tablet. |
a. has to be run on a desktop computer whereas executable code will run on a mobile phone or tablet. |
a. has to be run on a desktop computer whereas executable code will run on a mobile phone or tablet. |
a. has to be run on a desktop computer whereas executable code will run on a mobile phone or tablet. |
a. has to be run on a desktop computer whereas executable code will run on a mobile phone or tablet. |
a. has to be run on a desktop computer whereas executable code will run on a mobile phone or tablet. |
a. has to be run on a desktop computer whereas executable code will run on a mobile phone or tablet. |
18 |
c. a real variable |
c. a real variable |
c. a real variable |
c. a real variable |
c. a real variable |
c. a real variable |
c. a real variable |
c. a real variable |
c. a real variable |
c. a real variable |
c. a real variable |
c. a real variable |
c. a real variable |
c. a real variable |
c. a real variable |
19 |
b. 1920 x 1080 |
b. 1920 x 1080 |
b. 1920 x 1080 |
b. 1920 x 1080 |
b. 1920 x 1080 |
b. 1920 x 1080 |
b. 1920 x 1080 |
b. 1920 x 1080 |
b. 1920 x 1080 |
b. 1920 x 1080 |
b. 1920 x 1080 |
b. 1920 x 1080 |
b. 1920 x 1080 |
b. 1920 x 1080 |
b. 1920 x 1080 |
20 |
a. she has given up the copyright and anyone can copy the program without any conditions. |
a. she has given up the copyright and anyone can copy the program without any conditions. |
a. she has given up the copyright and anyone can copy the program without any conditions. |
a. she has given up the copyright and anyone can copy the program without any conditions. |
a. she has given up the copyright and anyone can copy the program without any conditions. |
a. she has given up the copyright and anyone can copy the program without any conditions. |
a. she has given up the copyright and anyone can copy the program without any conditions. |
a. she has given up the copyright and anyone can copy the program without any conditions. |
a. she has given up the copyright and anyone can copy the program without any conditions. |
a. she has given up the copyright and anyone can copy the program without any conditions. |
a. she has given up the copyright and anyone can copy the program without any conditions. |
a. she has given up the copyright and anyone can copy the program without any conditions. |
a. she has given up the copyright and anyone can copy the program without any conditions. |
a. she has given up the copyright and anyone can copy the program without any conditions. |
a. she has given up the copyright and anyone can copy the program without any conditions. |
21 |
a. file an application with the government and pay a fee. |
a. file an application with the government and pay a fee. |
a. file an application with the government and pay a fee. |
a. file an application with the government and pay a fee. |
a. file an application with the government and pay a fee. |
a. file an application with the government and pay a fee. |
a. file an application with the government and pay a fee. |
a. file an application with the government and pay a fee. |
a. file an application with the government and pay a fee. |
a. file an application with the government and pay a fee. |
a. file an application with the government and pay a fee. |
a. file an application with the government and pay a fee. |
a. file an application with the government and pay a fee. |
a. file an application with the government and pay a fee. |
a. file an application with the government and pay a fee. |
22 |
b. dimming |
b. dimming |
b. dimming |
b. dimming |
b. dimming |
b. dimming |
b. dimming |
b. dimming |
b. dimming |
b. dimming |
b. dimming |
b. dimming |
b. dimming |
b. dimming |
b. dimming |
23 |
c. sequence. |
c. sequence. |
c. sequence. |
c. sequence. |
c. sequence. |
c. sequence. |
c. sequence. |
c. sequence. |
c. sequence. |
c. sequence. |
c. sequence. |
c. sequence. |
c. sequence. |
c. sequence. |
c. sequence. |
24 |
d. only use the network from your own computer. |
a. never write your password down. |
d. only use the network from your own computer. |
d. only use the network from your own computer. |
a. never write your password down. |
d. only use the network from your own computer. |
d. only use the network from your own computer. |
a. never write your password down. |
d. only use the network from your own computer. |
d. only use the network from your own computer. |
a. never write your password down. |
d. only use the network from your own computer. |
d. only use the network from your own computer. |
a. never write your password down. |
d. only use the network from your own computer. |
25 |
b. the same thing as data. |
b. the same thing as data. |
b. the same thing as data. |
b. the same thing as data. |
b. the same thing as data. |
b. the same thing as data. |
b. the same thing as data. |
b. the same thing as data. |
b. the same thing as data. |
b. the same thing as data. |
b. the same thing as data. |
b. the same thing as data. |
b. the same thing as data. |
b. the same thing as data. |
b. the same thing as data. |
26 |
b. There is no common factor to these data. |
b. There is no common factor to these data. |
b. There is no common factor to these data. |
b. There is no common factor to these data. |
b. There is no common factor to these data. |
b. There is no common factor to these data. |
b. There is no common factor to these data. |
b. There is no common factor to these data. |
b. There is no common factor to these data. |
b. There is no common factor to these data. |
b. There is no common factor to these data. |
b. There is no common factor to these data. |
b. There is no common factor to these data. |
b. There is no common factor to these data. |
b. There is no common factor to these data. |
27 |
a. is impossible which is why data files have file extensions such as .doc. |
a. is impossible which is why data files have file extensions such as .doc. |
a. is impossible which is why data files have file extensions such as .doc. |
a. is impossible which is why data files have file extensions such as .doc. |
a. is impossible which is why data files have file extensions such as .doc. |
a. is impossible which is why data files have file extensions such as .doc. |
a. is impossible which is why data files have file extensions such as .doc. |
a. is impossible which is why data files have file extensions such as .doc. |
a. is impossible which is why data files have file extensions such as .doc. |
a. is impossible which is why data files have file extensions such as .doc. |
a. is impossible which is why data files have file extensions such as .doc. |
a. is impossible which is why data files have file extensions such as .doc. |
a. is impossible which is why data files have file extensions such as .doc. |
a. is impossible which is why data files have file extensions such as .doc. |
a. is impossible which is why data files have file extensions such as .doc. |
28 |
d. most effective when the same information is only searched once. |
d. most effective when the same information is only searched once. |
d. most effective when the same information is only searched once. |
d. most effective when the same information is only searched once. |
d. most effective when the same information is only searched once. |
d. most effective when the same information is only searched once. |
d. most effective when the same information is only searched once. |
d. most effective when the same information is only searched once. |
d. most effective when the same information is only searched once. |
d. most effective when the same information is only searched once. |
d. most effective when the same information is only searched once. |
d. most effective when the same information is only searched once. |
d. most effective when the same information is only searched once. |
d. most effective when the same information is only searched once. |
d. most effective when the same information is only searched once. |
29 |
a. remix. |
d. open source. |
d. open source. |
a. remix. |
d. open source. |
a. remix. |
a. remix. |
d. open source. |
d. open source. |
d. open source. |
d. open source. |
d. open source. |
d. open source. |
d. open source. |
d. open source. |
30 |
c. 73percent$. |
c. 73percent$. |
c. 73percent$. |
c. 73percent$. |
c. 73percent$. |
c. 73percent$. |
c. 73percent$. |
c. 73percent$. |
c. 73percent$. |
c. 73percent$. |
c. 73percent$. |
c. 73percent$. |
c. 73percent$. |
c. 73percent$. |
c. 73percent$. |
31 |
b. software |
b. software |
b. software |
b. software |
b. software |
b. software |
b. software |
b. software |
b. software |
b. software |
b. software |
b. software |
b. software |
b. software |
b. software |
32 |
a. a very strong program. |
c. a way of organising data. |
a. a very strong program. |
a. a very strong program. |
a. a very strong program. |
a. a very strong program. |
a. a very strong program. |
c. a way of organising data. |
c. a way of organising data. |
a. a very strong program. |
c. a way of organising data. |
c. a way of organising data. |
a. a very strong program. |
c. a way of organising data. |
c. a way of organising data. |
33 |
a. is accurate. |
a. is accurate. |
a. is accurate. |
a. is accurate. |
a. is accurate. |
a. is accurate. |
a. is accurate. |
a. is accurate. |
a. is accurate. |
a. is accurate. |
a. is accurate. |
a. is accurate. |
a. is accurate. |
a. is accurate. |
a. is accurate. |
34 |
b. DDR RAM. |
a. a motherboard. |
a. a motherboard. |
b. DDR RAM. |
a. a motherboard. |
b. DDR RAM. |
b. DDR RAM. |
a. a motherboard. |
a. a motherboard. |
b. DDR RAM. |
a. a motherboard. |
a. a motherboard. |
b. DDR RAM. |
a. a motherboard. |
a. a motherboard. |
35 |
b. good conductors of electricity |
b. good conductors of electricity |
b. good conductors of electricity |
b. good conductors of electricity |
b. good conductors of electricity |
b. good conductors of electricity |
b. good conductors of electricity |
b. good conductors of electricity |
b. good conductors of electricity |
b. good conductors of electricity |
b. good conductors of electricity |
b. good conductors of electricity |
b. good conductors of electricity |
b. good conductors of electricity |
b. good conductors of electricity |
36 |
a. it is less expensive to install cable than wireless connections. |
a. it is less expensive to install cable than wireless connections. |
a. it is less expensive to install cable than wireless connections. |
a. it is less expensive to install cable than wireless connections. |
a. it is less expensive to install cable than wireless connections. |
a. it is less expensive to install cable than wireless connections. |
a. it is less expensive to install cable than wireless connections. |
a. it is less expensive to install cable than wireless connections. |
a. it is less expensive to install cable than wireless connections. |
a. it is less expensive to install cable than wireless connections. |
a. it is less expensive to install cable than wireless connections. |
a. it is less expensive to install cable than wireless connections. |
a. it is less expensive to install cable than wireless connections. |
a. it is less expensive to install cable than wireless connections. |
a. it is less expensive to install cable than wireless connections. |
37 |
b. 100,000 |
b. 100,000 |
b. 100,000 |
b. 100,000 |
b. 100,000 |
b. 100,000 |
b. 100,000 |
b. 100,000 |
b. 100,000 |
b. 100,000 |
b. 100,000 |
b. 100,000 |
b. 100,000 |
b. 100,000 |
b. 100,000 |
38 |
c. 6 million |
c. 6 million |
c. 6 million |
c. 6 million |
c. 6 million |
c. 6 million |
b. 3 million |
c. 6 million |
c. 6 million |
b. 3 million |
c. 6 million |
c. 6 million |
c. 6 million |
c. 6 million |
c. 6 million |
39 |
c.computer processors can work faster than any large scale storage. |
c.computer processors can work faster than any large scale storage. |
c.computer processors can work faster than any large scale storage. |
c.computer processors can work faster than any large scale storage. |
c.computer processors can work faster than any large scale storage. |
c.computer processors can work faster than any large scale storage. |
c.computer processors can work faster than any large scale storage. |
c.computer processors can work faster than any large scale storage. |
c.computer processors can work faster than any large scale storage. |
c.computer processors can work faster than any large scale storage. |
c.computer processors can work faster than any large scale storage. |
c.computer processors can work faster than any large scale storage. |
c.computer processors can work faster than any large scale storage. |
c.computer processors can work faster than any large scale storage. |
c.computer processors can work faster than any large scale storage. |
40 |
b. 75 |
b. 75 |
b. 75 |
b. 75 |
b. 75 |
b. 75 |
b. 75 |
b. 75 |
b. 75 |
b. 75 |
b. 75 |
b. 75 |
b. 75 |
b. 75 |
b. 75 |
41 |
d. MS Word |
d. MS Word |
d. MS Word |
d. MS Word |
d. MS Word |
d. MS Word |
d. MS Word |
d. MS Word |
d. MS Word |
d. MS Word |
b. inkscape |
b. inkscape |
b. inkscape |
b. inkscape |
b. inkscape |
42 |
c. change for a 20p piece. |
c. change for a 20p piece. |
c. change for a 20p piece. |
c. change for a 20p piece. |
c. change for a 20p piece. |
c. change for a 20p piece. |
c. change for a 20p piece. |
c. change for a 20p piece. |
c. change for a 20p piece. |
c. change for a 20p piece. |
c. change for a 20p piece. |
c. change for a 20p piece. |
c. change for a 20p piece. |
c. change for a 20p piece. |
c. change for a 20p piece. |
43 |
b. a procedure. |
b. a procedure. |
b. a procedure. |
b. a procedure. |
b. a procedure. |
b. a procedure. |
b. a procedure. |
b. a procedure. |
b. a procedure. |
b. a procedure. |
b. a procedure. |
b. a procedure. |
b. a procedure. |
b. a procedure. |
b. a procedure. |
44 |
b. link back to A. |
b. link back to A. |
b. link back to A. |
b. link back to A. |
b. link back to A. |
b. link back to A. |
b. link back to A. |
b. link back to A. |
b. link back to A. |
b. link back to A. |
b. link back to A. |
b. link back to A. |
b. link back to A. |
b. link back to A. |
b. link back to A. |
45 |
c. the value of the coins is equal to two 20p coins. |
c. the value of the coins is equal to two 20p coins. |
c. the value of the coins is equal to two 20p coins. |
c. the value of the coins is equal to two 20p coins. |
c. the value of the coins is equal to two 20p coins. |
c. the value of the coins is equal to two 20p coins. |
c. the value of the coins is equal to two 20p coins. |
c. the value of the coins is equal to two 20p coins. |
c. the value of the coins is equal to two 20p coins. |
c. the value of the coins is equal to two 20p coins. |
c. the value of the coins is equal to two 20p coins. |
c. the value of the coins is equal to two 20p coins. |
c. the value of the coins is equal to two 20p coins. |
c. the value of the coins is equal to two 20p coins. |
c. the value of the coins is equal to two 20p coins. |
46 |
a. not needed because there is a check for 10p coins at C. |
a. not needed because there is a check for 10p coins at C. |
a. not needed because there is a check for 10p coins at C. |
a. not needed because there is a check for 10p coins at C. |
a. not needed because there is a check for 10p coins at C. |
a. not needed because there is a check for 10p coins at C. |
d. only needed if the machine has run out of 20p coins. |
a. not needed because there is a check for 10p coins at C. |
a. not needed because there is a check for 10p coins at C. |
d. only needed if the machine has run out of 20p coins. |
d. only needed if the machine has run out of 20p coins. |
d. only needed if the machine has run out of 20p coins. |
d. only needed if the machine has run out of 20p coins. |
d. only needed if the machine has run out of 20p coins. |
d. only needed if the machine has run out of 20p coins. |
47 |
d. give 5 x 10p coins. |
a. give exactly the right change. |
a. give exactly the right change. |
a. give exactly the right change. |
a. give exactly the right change. |
a. give exactly the right change. |
d. give 5 x 10p coins. |
d. give 5 x 10p coins. |
d. give 5 x 10p coins. |
d. give 5 x 10p coins. |
d. give 5 x 10p coins. |
d. give 5 x 10p coins. |
d. give 5 x 10p coins. |
a. give exactly the right change. |
d. give 5 x 10p coins. |
48 |
b. stop viruses attacking web sites. |
b. stop viruses attacking web sites. |
b. stop viruses attacking web sites. |
b. stop viruses attacking web sites. |
b. stop viruses attacking web sites. |
b. stop viruses attacking web sites. |
b. stop viruses attacking web sites. |
b. stop viruses attacking web sites. |
b. stop viruses attacking web sites. |
b. stop viruses attacking web sites. |
b. stop viruses attacking web sites. |
b. stop viruses attacking web sites. |
b. stop viruses attacking web sites. |
b. stop viruses attacking web sites. |
b. stop viruses attacking web sites. |
49 |
c. a way of protecting computers from malware. |
c. a way of protecting computers from malware. |
c. a way of protecting computers from malware. |
c. a way of protecting computers from malware. |
c. a way of protecting computers from malware. |
c. a way of protecting computers from malware. |
c. a way of protecting computers from malware. |
c. a way of protecting computers from malware. |
c. a way of protecting computers from malware. |
c. a way of protecting computers from malware. |
c. a way of protecting computers from malware. |
c. a way of protecting computers from malware. |
c. a way of protecting computers from malware. |
c. a way of protecting computers from malware. |
c. a way of protecting computers from malware. |
50 |
c. make sure accounts are secure when authorised and linked to the user. |
c. make sure accounts are secure when authorised and linked to the user. |
c. make sure accounts are secure when authorised and linked to the user. |
c. make sure accounts are secure when authorised and linked to the user. |
c. make sure accounts are secure when authorised and linked to the user. |
c. make sure accounts are secure when authorised and linked to the user. |
c. make sure accounts are secure when authorised and linked to the user. |
c. make sure accounts are secure when authorised and linked to the user. |
c. make sure accounts are secure when authorised and linked to the user. |
c. make sure accounts are secure when authorised and linked to the user. |
c. make sure accounts are secure when authorised and linked to the user. |
c. make sure accounts are secure when authorised and linked to the user. |
c. make sure accounts are secure when authorised and linked to the user. |
c. make sure accounts are secure when authorised and linked to the user. |
c. make sure accounts are secure when authorised and linked to the user. |