Search Header Logo
Reviewing Networking

Reviewing Networking

Assessment

Presentation

Computers

9th - 12th Grade

Medium

Created by

Adrian Mallia

Used 6+ times

FREE Resource

9 Slides • 25 Questions

1

Reviewing
Networking

Understanding the intricacies and complexities of networking to enhance connectivity and communication in the digital world.

2

Reviewing Networking

  • Networking Concepts: Learn how devices communicate and share resources

  • Computer Networks: Linked devices sharing computing power and resources

  • Benefits & Risks: Easier communication, security threats, and costs

  • Types of Networks: PAN, LAN, WAN

  • Connectivity Methods: Various ways to connect devices in a network

3

Multiple Select

What are the different types of networks?

1

PAN

2

LAN

3

WAN

4

Router

4

Types of Networks

PAN: Personal Area Network is a network used for communication among devices close to one person.
LAN: Local Area Network is a network that connects devices within a limited area.
WAN: Wide Area Network is a network that spans a large geographical area.

5

Networking Technologies

  • Wired Technologies: Ethernet cable, Powerline, Fibre Optic

  • Wireless Technologies: Bluetooth, Wi-Fi, Mobile Data

  • Wired tech is more efficient due to faster data transfer speed and less prone to interference

    Identifying Networked devices

  • MAC Address: Unique identifier for devices on a LAN

  • IP Address: Unique numerical label for devices on a network

  • IPv4 vs IPv6: IPv6 provides more addresses and better network security

6

Multiple Choice

Which technology provides more data transfer efficiency in long distances?

1

Ethernet cable

2

Powerline

3

Fibre Optic

4

Bluetooth

7

Multiple Choice

What does "MAC" stand for in "MAC Address"?
1
Media Access Control
2
Mandatory Access Control
3
Micro Access Control
4
Media Access Certificate

8

Multiple Choice

What are MAC addresses used to identify?
1
Hardware
2
Networking software
3
DSI-Ware
4
Firmware

9

Multiple Choice

Which of these is a valid MAC Address?
1
ee.ee.ee.ee.ee.ee
2
192.168.0.1
3
6b-44.61-ac.bd-5f
4
81.144.164.210

10

Multiple Choice

IPv4 addresses are ___ bit addresses.

1

2

2

8

3

32

4

128

11

Multiple Choice

IPv6 addresses are ___ bit numbers.

1

2

2

8

3

32

4

128

12

Multiple Choice

What does IP stand for in IP address?
1
Internet Password
2
Internet Procedure
3
Internet Protocol
4
Internet Policy

13

Multiple Choice

What is the purpose of IPv6?

1

To replace IPv4 because IPv4 is no longer used today.

2

To replace IPv4 because we've run out of IPv4 addresses.

3

Used instead of IPv4 because newer computers only understand IPv6

4

To stop connection of non personal computer devices such as smartphones/IPTV

14

Networking Basics

  • Client-Server System: A way of organizing devices in a network to work together.

  • Client: A device that requests services or sends requests.

  • Server: A device that provides services on a network.

  • Protocols: Set of rules for communication between devices.

  • DNS: Domain Name System translates website names into IP addresses.

  • Data Security: Practices and tools to protect devices and data from online threats.

15

DNS: Translating Website Names

DNS stands for Domain Name System. It translates user-friendly website names (like www.example.com) into their corresponding IP addresses (like 192.168.0.1). This allows clients to connect to servers using memorable domain names instead of complex numerical addresses. DNS plays a crucial role in the functioning of the internet, making it easier for users to access websites and services.

16

Multiple Choice

What is the purpose of DNS in a client-server system?

1

Translating website names into IP addresses

2

Providing data security

3

Organizing devices in a network

4

Setting rules for communication between devices

17

Multiple Choice

A Host Name "translates" the IP address of a computer into words so people can remember it more easily.

1

true

2

false

18

Multiple Choice

Which of the following is a Network Interface Card?

1
2
3
4

19

Protocols

Protocols are a set of rules/functions in network communication
HTTPS - allows user to access a webserver via a browser securely
SMTP - allows user to send an e-mail
FTP - allows user to upload a file on a file serve/online file storage
IP - Internet Protocol - allows devices to be identified via an IP address on a network

20

21

Multiple Choice

A client-server network allows people to save their data centrally.
1
True
2
False

22

Multiple Choice

Which one of these items is true of a client-server network?
1
Needs a network manager to run the network
2
No centralised management
3
All computers have equal status
4
No dependency on a server

23

Multiple Choice

What does Protocol mean?

1

Rules

2

Security

3

Services

4

Orders

24

Multiple Choice

Which protocol would you use to transfer files?

1

HTTP

2

FTP

3

POP3

4

SMTP

25

Multiple Choice

Question image

Which protocol does this symbolize?

1

IMAP

2

HTTPS

3

FTP

4

SMTP

26

Multiple Choice

SMTP is used for ..

1

Retrieving emails

2

Maintain CPU performance

3

Downloading files

4

Sending emails from one server to another

27

Network Devices/Equipment

Hub - connecting few devices to form a LAN
Switch - connecting many devices to form a bigger and more sophisticated LAN
Router - provides network security to the network and allows multiple networks to connect to each other
Firewall - provides a layer of security to prevent unauthorized network access
Access Point - extend the network connection to another location
Modem - provides Internet connection service from an ISP

28

Multiple Choice

What does Firewall Do?
1
Prevents Hackers
2
Install Viruses
3
Give you SD cards
4
Blocks all content

29

Multiple Choice

What is biometric authentication?

1

A method of verifying user requests using distinct biological or physiological characteristics

2

A method of verifying user requests using text-based passwords

3

A method of verifying user requests using behavioral biometrics

4

A method of verifying user requests using geofencing

30

Multiple Choice

What are some examples of physical factors used in biometric authentication?

1

Fingerprinting, retina scans, facial recognition, and voice recognition

2

Geofencing, time of request monitoring, and hard tokens

3

Behavioral biometrics and password retrievals

4

Text-based passwords and geofencing

31

Multiple Choice

Which network component is responsible for directing data between different networks?

1

Modem

2

Firewall

3

Switch

4

Router

32

Multiple Choice

What is the purpose of a network switch in a computer network?

1

A network switch is used to play video games on the computer network

2

A network switch is used to make phone calls within the local area network (LAN)

3

A network switch is used to control the temperature of the computer network

4

A network switch is used to connect multiple devices within a local area network (LAN) and manage the traffic between them.

33

Multiple Choice

What is the purpose of a network cable in a computer network?

1

To store data in the network

2

To cool down the devices in the network

3

The purpose of a network cable in a computer network is to physically connect devices to enable communication and data transfer between them.

4

To provide power to the devices in the network

34

Multiple Choice

What is the function of a network repeater/extender/access point in a computer network?

1

A network repeater is used to amplify sound in a computer network.

2

A network repeater is used to regenerate and retransmit signals to extend the reach of a network.

3

A network repeater is used to encrypt data in a computer network.

4

A network repeater is used to block unauthorized users from accessing the network.

Reviewing
Networking

Understanding the intricacies and complexities of networking to enhance connectivity and communication in the digital world.

Show answer

Auto Play

Slide 1 / 34

SLIDE