
Ch5 : Networks
Presentation
•
Computers
•
10th Grade
•
Practice Problem
•
Easy
Ala Jaber
Used 6+ times
FREE Resource
48 Slides • 71 Questions
1
2
3
Multiple Choice
What is a network and how does it function?
A network is a single computer
A network connects multiple computers
A network is a type of software
A network is a hardware device
4
5
Multiple Choice
What functionality does a network operating system provide to a stand-alone operating system?
Passing usernames and passwords
Accessing network storage
Separating user accounts
All of the above
6
Multiple Choice
What does a stand-alone operating system mean?
It can only be used when connected to a network
It is capable of functioning on its own without being part of a network
It can only store files on a shared server
It requires network logins to operate
7
Multiple Choice
Which of the following is a function provided by a network operating system?
Preventing users from creating passwords
Allowing users to access network storage and shared resources
Blocking communication between devices
Removing all user accounts from the system
8
9
Multiple Select
What are the three methods used to identify devices on a network?
Internet Protocol (IP)
MAC address
device name
Network Address Translation (NAT)
10
Multiple Choice
Which of the following best describes an IP address?
A temporary password used to log in to a device
A unique address that networked devices use to send data to each other
A label used only for naming files on a computer
A hardware component that stores network cables
11
12
Multiple Choice
Which statement correctly describes the IPv4 addressing format?
A. It uses eight groups of hexadecimal numbers separated by colons
B. It can only be assigned manually by a network administrator
C. It uses a base-16 numbering system for all digits
D. It uses four groups of up to three decimal numbers separated by full stops
13
Match
Match the following
A base-16 number system using digits 0–9 and letters A–F
A person who manages an organisation’s network
A server that automatically assigns IP addresses to devices
Hexadecimal
Network administrator
DHCP
Hexadecimal
Network administrator
DHCP
14
15
Multiple Choice
What is the significance of the address written on a letter?
It helps in identifying the sender
It ensures the letter reaches the correct destination
It is used for tracking the letter
It is not important
16
Multiple Choice
What is the purpose of dialing a number when making a telephone call?
To identify the destination telephone
To connect to the internet
To send a text message
To access voicemail
17
18
Multiple Choice
Which statement correctly describes a MAC address?
A. It is dynamically assigned each time a device connects to a network
B. It is written using four groups of decimal numbers separated by dots
C. It is a fixed, universally unique identifier assigned by the NIC manufacturer
D. It identifies the IP settings of a device on the internet
19
Categorize
Uses eight groups of hexadecimal numbers
Designed to overcome address exhaustioDesigned to overcome address exhaustion
Uses decimal numbers separated by full stops
It is a fixed, universally unique identifier
assigned by the NIC manufacturer
Usually made of six pairs of hexadecimal characters
Used to identify devices on a LAN using Ethernet or Wi-Fi
The last three pairs of the MAC address that identify the individual device
Classify the following characteristics as either IPv4 or IPv6.
20
21
Multiple Choice
Which of the following best describes the main uses of MAC addresses in networks?
A. They are used to block hackers, encrypt data, and increase network speed.
B. They store user passwords and control internet bandwidth limits.
C. They identify devices, control network access, help track device activity, and can be used to assign fixed IP addresses.
D. They replace IP addresses entirely and allow devices to connect to the internet without a DHCP server.
22
23
24
Multiple Choice
What is the primary purpose of IP spoofing by an attacker?
To enhance network performance
To increase internet speed
To hide the origin of an attack
To improve data encryption
25
Multiple Choice
What is the main risk of MAC spoofing when devices connect to a hotspot or network?
A. It makes the internet speed faster for the attacker.
B. It prevents the hotspot from broadcasting its Wi-Fi signal.
C. It allows an attacker to impersonate another device, bypassing access controls and hiding their identity.
D. It permanently damages the network interface card (NIC).
26
27
Multiple Choice
What is a device name and why is it important in identifying computers on a network?
A unique identifier for a computer
A descriptive name for a device
A name used for communication
A name that causes conflicts
28
29
Multiple Choice
What are the maximum data transfer rates for Cat5e cables?
10 Mbit/s for Cat5e
100 Mbit/s for Cat5e
1 Gbit/s for Cat5e
10 Gbit/s for Cat6
30
Multiple Choice
What are the data transfer rates for Cat6 cables?
10 Mbit/s for Cat5e
100 Mbit/s for Cat5e
1 Gbit/s for Cat6
10 Gbit/s for Cat6
31
32
Multiple Choice
What is the main limitation of a network's speed?
The type of cables used
The number of devices connected
The speed of the internet connection
The distance between devices
33
34
Multiple Choice
What are the advantages of using fibre optic cables over traditional wire cables?
Faster data transfer
Lower cost
Easier installation
More durable
35
36
Multiple Choice
What is the purpose of a wireless access point in a network?
To connect devices to a wired network
To provide Wi-Fi connectivity
To act as a router
To increase internet speed
37
38
Multiple Choice
What is the primary advantage of using a switch over a hub in a network?
A switch can provide internet access, while a hub cannot.
A switch can operate at higher speeds than a hub.
A switch can send data directly to the receiving device, reducing network congestion.
A switch is less expensive than a hub.
39
40
Multiple Choice
What type of address is this?
IPv6
IPv4
41
Multiple Choice
42
Multiple Choice
How many bits are in an ipv4 address?
16
32
64
128
43
44
Match
Match the following
Where all the files are stored
Connects the network to the internet
Protects network from harmful viruses
Where all the files are stored
Connects the network to the internet
Protects network from harmful viruses
45
Multiple Choice
What is the primary function of a router in a network?
To connect devices within the same network
To filter and block unauthorized access
To route data packets between different networks
To amplify signals for long-distance transmission
46
47
Multiple Choice
Which of the following devices is used to extend the range of a wireless network?
Modem
Router
Booster
Switch
48
Match
Write the correct function to each device.
Connects wireless devices to a wired network using Wi-Fi signals.
Forwards data to the correct device on the network using MAC addresses and ports.
Connects two different types of networks, such as LAN to WAN.
Stores and forwards traffic using the quickest route and acts as the gateway to the internet.
Extends the range of network signals by amplifying them.
Wireless access point (WAP)
Switch
Gateway
Router
Booster
Wireless access point (WAP)
Switch
Gateway
Router
Booster
49
50
Multiple Choice
What is the role of an authentication server?
To manage print requests
To check usernames and passwords
To share resources with clients
To connect multiple servers
51
Drag and Drop
52
53
Match
all clients connect to this with cables
a powerful computer that stores, saves and serves documents to clients
a device on the network
connects all the devices together
switch
file server
client
ethernet cable
switch
file server
client
ethernet cable
54
Dropdown
55
Multiple Choice
Which statement best describes the role of HTTP?
A. A protocol for routing packets between networks
B. A protocol that controls how web pages (HTML documents) connect to each other
C. A process used to print documents on a network
D. A method for storing user accounts on a server
56
Multiple Choice
Which server is responsible for checking usernames and passwords when a user logs in?
File server
Authentication server
Print server
Web server
57
Match
Match the Server to Its Main Function
Provides access to applications hosted on the server
Processes HTTP requests and delivers web pages
Stores shared and private user documents
Manages multiple printers and print requests
Application server
Web server
File server
Print server
Application server
Web server
File server
Print server
58
59
Multiple Choice
What is the role of an Internet Service Provider (ISP) in connecting users to the internet?
To provide free internet access to everyone
To charge fees for internet access
To connect users to telecommunications infrastructure
To limit internet access to certain users
60
Match
Match the Term to Its Description
Provides internet access through mobile and landline networks
Networks of hardware facilities used to transfer data
Offers free or low-cost internet access to specific groups
ISP
Telecommunications infrastructure
Community scheme
ISP
Telecommunications infrastructure
Community scheme
61
Fill in the Blank
____To provide users with access to the telecommunications infrastructure required to connect to the internet
62
63
Multiple Choice
What is a web browser?
A type of hardware
A type of software application
A type of operating system
A type of network protocol
64
65
66
Multiple Choice
Explain the difference between a web browser and a search engine.
A search engine is used to access the internet, while a web browser is used to find specific information on the internet.
A web browser is used to access the internet, while a search engine is used to find specific information on the internet.
A web browser is used to search for information on the internet, while a search engine is used to access specific websites.
A search engine is a type of web browser used to access specific websites, while a web browser is used to find general information on the internet.
67
Multiple Choice
68
Multiple Choice
69
70
Multiple Choice
What happens if a webpage URL matches an item in the blacklist?
A. The user is allowed to view the page normally
B. The software asks the user for permission
C. The user is prevented from viewing the page
D. The page is automatically added to the whitelist
71
Multiple Select
What are the two lists used in filter software to manage web page access?
blacklist
whitelist
URL
filter software
72
Categorize
Add URLs to blacklist
Compare URL to whitelist
Update blacklist during updates
Protect children from harmful content
Organize these options into the right categories
73
74
Multiple Choice
75
Multiple Select
What are the two different models that computers in a LAN can be connected using?
peer-to-peer
client-server
hub-and-spoke
mesh
76
77
78
Multiple Choice
Which statement best describes a peer-to-peer network?
a) A network where computers access resources via a central server.
b) A network where each computer stores all data for the whole network.
c) A network where computers share resources directly with each other without a server.
d) A network that requires an authentication server to function.
79
Multiple Choice
What is the main feature of a client-server network?
a) All devices have equal responsibility and share files directly.
b) A central server manages resources and services for multiple clients.
c) Users must physically connect their computers to share files.
d) Each computer acts as both server and client at the same time.
80
81
Multiple Choice
Which of the following is a major benefit of using a Local Area Network (LAN)?
Each computer must have its own dedicated printer and storage device.
Users can only access files from the device they originally created them on.
LANs allow shared access to peripherals, storage, media streaming, and communication between connected devices.
LANs prevent devices from sharing the same internet connection.
82
83
84
Multiple Choice
Which of the following is a key benefit of using a client-server network?
a) Every user must manually back up their own data to avoid loss.
b) Users can freely access all resources without any restrictions.
c) Resources and user accounts can be centrally managed, and automated backups help protect user data.
d) Only peer-to-peer connections can be used to share storage and printers.
85
Match
Match each benefit to the correct description.
Backups can be automated for all users, reducing the chance of data loss.
Users or groups can be allowed or restricted from accessing specific resources.
Resources and user accounts can be managed by administrators with an overview of the whole network.
Centralised backup
Control of user access rights
Centralised administration
Centralised backup
Control of user access rights
Centralised administration
86
Match
Match each network service to the correct description.
Allows users to log into any computer on the network and see their own settings and files.
Provides access to applications or operating systems hosted on servers.
Users can centrally store files and set permissions such as read-only or read/write.
Roaming profiles
Shared software
Shared storage and file access
Roaming profiles
Shared software
Shared storage and file access
87
88
Match
Match each term to the correct description.
Confirms that a user is who they claim to be before allowing access.
Required information (such as username/account name) used to access a network.
Manages the verification of users so they can access network resources without repeated logins.
Authenticate
Login
Authentication server
Authenticate
Login
Authentication server
89
90
Multiple Choice
What is the main purpose of a firewall in a network?
To increase the speed of the network connection
To control and filter network traffic, preventing unauthorised access
To store all user passwords securely
To connect multiple devices together in a wired network
91
92
Multiple Choice
What is the purpose of encryption?
To speed up the processing of data on a network
To encode or scramble data so unauthorised users cannot understand it
To store passwords in a secure database
To convert binary numbers into text
93
94
95
96
97
98
Multiple Choice
Which statement correctly describes public key encryption?
A. It uses one key for encryption and the same key for decryption.
B. It uses two unrelated random keys to encrypt and decrypt data.
C. It uses two mathematically related keys, one public and one private.
D. It allows anyone with the private key to encrypt messages for others.
99
Multiple Choice
What is a feature of symmetric key encryption?
A. A public key is used to encrypt and a private key is used to decrypt.
B. It uses different keys for encryption and decryption.
C. The key used to encrypt is mathematically related to a secret key.
D. The same key is used to encrypt and decrypt the data.
100
101
Multiple Choice
Why does Farooq use Iyabode’s public key to encrypt the message?
A. Because the public key decrypts the message faster
B. Because only Iyabode’s private key can decrypt the message
C. Because the public key hides the sender’s identity
D. Because the public key changes every time a message is sent
102
Dropdown
103
104
Multiple Choice
Why is WEP considered the least secure wireless encryption method?
A. It uses different keys for every device on the network
B. It generates a new key for every packet of data
C. All devices use the same key, making it easy for attackers to discover
D. It only works on wired networks
105
Multiple Choice
What is one advantage of WPA over WEP?
A. WPA uses no encryption at all
B. WPA uses the same key for all devices
C. WPA generates new keys for each device and each packet
D. WPA is slower because it does not encrypt packets
106
107
108
109
Multiple Choice
Which of the following is a valid reason for using a Virtual Private Network (VPN)?
To increase the speed of the user’s local Wi-Fi connection
To access a private LAN securely from a remote location
To remove viruses from a computer automatically
To replace an ISP and provide a new internet connection
110
Multiple Choice
What does a VPN do to ensure that data remains secure when transmitted over the internet?
A. It encrypts the data so it cannot be read if intercepted
B. It increases the size of the data packets to make them harder to track
C. It changes the user’s hardware address to hide their identity
D. It blocks all websites except those approved by the user’s ISP
111
112
Multiple Choice
Which statement best describes the purpose of a transaction log on a network?
A. It prevents users from opening files they do not have permission for
B. It stores backup copies of important files in case the originals are lost
C. It records all network activity so administrators can identify unusual or suspicious events
D. It encrypts all user files to protect them from unauthorized access
113
Match
Match each term to its correct description.
A copy of one or more files stored on a different device from the original
Records network activity so administrators can identify unusual or suspicious events
Permissions that control whether a user can read, write, or access specific files or folders
Backup
Transaction log
File access rights
Backup
Transaction log
File access rights
114
115
116
Poll
How well did you understand today's material?
Totally got it
Pretty well
Not very well
Not at all
117
Open Ended
What did you learn in today's class?
118
Open Ended
What is VPN stands for?
119
Drag and Drop
Show answer
Auto Play
Slide 1 / 119
SLIDE
Similar Resources on Wayground
114 questions
My Winter Vacation
Lesson
•
11th Grade
117 questions
F5 Life's Great Mysteries L13 Review
Lesson
•
10th Grade
114 questions
POTUS/Executive Branch
Lesson
•
11th - 12th Grade
112 questions
Workshop IKM
Lesson
•
9th Grade
114 questions
Holt Ch 11
Lesson
•
9th - 12th Grade
118 questions
McKissic- HPE Current Events
Lesson
•
10th - 12th Grade
107 questions
National 5 Biology Scientific Literacy Skills
Lesson
•
10th - 11th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
14 questions
[AP CSP] JavaScript Programming Quiz
Quiz
•
9th - 12th Grade
10 questions
Understanding Computers and Computer Engineering
Interactive video
•
7th - 12th Grade
37 questions
Python - Tuples, Lists, and List Methods
Quiz
•
9th - 12th Grade