Search Header Logo
Ch5 : Networks

Ch5 : Networks

Assessment

Presentation

Computers

10th Grade

Practice Problem

Easy

Created by

Ala Jaber

Used 6+ times

FREE Resource

48 Slides • 71 Questions

1

media

2

media

3

Multiple Choice

What is a network and how does it function?

1

A network is a single computer

2

A network connects multiple computers

3

A network is a type of software

4

A network is a hardware device

4

media

5

Multiple Choice

What functionality does a network operating system provide to a stand-alone operating system?

1

Passing usernames and passwords

2

Accessing network storage

3

Separating user accounts

4

All of the above

6

Multiple Choice

What does a stand-alone operating system mean?

1

It can only be used when connected to a network

2

It is capable of functioning on its own without being part of a network

3

It can only store files on a shared server

4

It requires network logins to operate

7

Multiple Choice

Which of the following is a function provided by a network operating system?

1

Preventing users from creating passwords

2

Allowing users to access network storage and shared resources

3

Blocking communication between devices

4

Removing all user accounts from the system

8

media

9

Multiple Select

What are the three methods used to identify devices on a network?

1

Internet Protocol (IP)

2

MAC address

3

device name

4

Network Address Translation (NAT)

10

Multiple Choice

Which of the following best describes an IP address?

1

A temporary password used to log in to a device

2

A unique address that networked devices use to send data to each other

3

A label used only for naming files on a computer

4

A hardware component that stores network cables

11

media

12

Multiple Choice

Which statement correctly describes the IPv4 addressing format?

1

A. It uses eight groups of hexadecimal numbers separated by colons

2

B. It can only be assigned manually by a network administrator

3

C. It uses a base-16 numbering system for all digits

4

D. It uses four groups of up to three decimal numbers separated by full stops

13

Match

Match the following

A base-16 number system using digits 0–9 and letters A–F

A person who manages an organisation’s network

A server that automatically assigns IP addresses to devices

Hexadecimal

Network administrator

DHCP

14

media

15

Multiple Choice

What is the significance of the address written on a letter?

1

It helps in identifying the sender

2

It ensures the letter reaches the correct destination

3

It is used for tracking the letter

4

It is not important

16

Multiple Choice

What is the purpose of dialing a number when making a telephone call?

1

To identify the destination telephone

2

To connect to the internet

3

To send a text message

4

To access voicemail

17

media

18

Multiple Choice

Which statement correctly describes a MAC address?

1

A. It is dynamically assigned each time a device connects to a network

2

B. It is written using four groups of decimal numbers separated by dots

3

C. It is a fixed, universally unique identifier assigned by the NIC manufacturer

4

D. It identifies the IP settings of a device on the internet

19

Categorize

Options (8)

Uses eight groups of hexadecimal numbers

Designed to overcome address exhaustioDesigned to overcome address exhaustion

Uses decimal numbers separated by full stops

It is a fixed, universally unique identifier

assigned by the NIC manufacturer

Usually made of six pairs of hexadecimal characters

Used to identify devices on a LAN using Ethernet or Wi-Fi

The last three pairs of the MAC address that identify the individual device

Classify the following characteristics as either IPv4 or IPv6.

IPv6
IPv4
MAC address
NIC-specific address

20

media

21

Multiple Choice

Which of the following best describes the main uses of MAC addresses in networks?

1

A. They are used to block hackers, encrypt data, and increase network speed.

2

B. They store user passwords and control internet bandwidth limits.

3

C. They identify devices, control network access, help track device activity, and can be used to assign fixed IP addresses.

4

D. They replace IP addresses entirely and allow devices to connect to the internet without a DHCP server.

22

media

23

media

24

Multiple Choice

What is the primary purpose of IP spoofing by an attacker?

1

To enhance network performance

2

To increase internet speed

3

To hide the origin of an attack

4

To improve data encryption

25

Multiple Choice

What is the main risk of MAC spoofing when devices connect to a hotspot or network?

1

A. It makes the internet speed faster for the attacker.

2

B. It prevents the hotspot from broadcasting its Wi-Fi signal.

3

C. It allows an attacker to impersonate another device, bypassing access controls and hiding their identity.

4

D. It permanently damages the network interface card (NIC).

26

media

27

Multiple Choice

What is a device name and why is it important in identifying computers on a network?

1

A unique identifier for a computer

2

A descriptive name for a device

3

A name used for communication

4

A name that causes conflicts

28

media

29

Multiple Choice

What are the maximum data transfer rates for Cat5e cables?

1

10 Mbit/s for Cat5e

2

100 Mbit/s for Cat5e

3

1 Gbit/s for Cat5e

4

10 Gbit/s for Cat6

30

Multiple Choice

What are the data transfer rates for Cat6 cables?

1

10 Mbit/s for Cat5e

2

100 Mbit/s for Cat5e

3

1 Gbit/s for Cat6

4

10 Gbit/s for Cat6

31

media

32

Multiple Choice

What is the main limitation of a network's speed?

1

The type of cables used

2

The number of devices connected

3

The speed of the internet connection

4

The distance between devices

33

media

34

Multiple Choice

What are the advantages of using fibre optic cables over traditional wire cables?

1

Faster data transfer

2

Lower cost

3

Easier installation

4

More durable

35

media

36

Multiple Choice

What is the purpose of a wireless access point in a network?

1

To connect devices to a wired network

2

To provide Wi-Fi connectivity

3

To act as a router

4

To increase internet speed

37

media

38

Multiple Choice

What is the primary advantage of using a switch over a hub in a network?

1

A switch can provide internet access, while a hub cannot.

2

A switch can operate at higher speeds than a hub.

3

A switch can send data directly to the receiving device, reducing network congestion.

4

A switch is less expensive than a hub.

39

media

40

Multiple Choice

Question image

What type of address is this?

1

IPv6

2

IPv4

41

Multiple Choice

The biggest decimal number in any part of an IPv4 address is
1
255
2
256
3
100
4
1000

42

Multiple Choice

How many bits are in an ipv4 address?

1

16

2

32

3

64

4

128

43

media

44

Match

Match the following

Where all the files are stored

Connects the network to the internet

Protects network from harmful viruses

45

Multiple Choice

What is the primary function of a router in a network?

1

To connect devices within the same network

2

To filter and block unauthorized access

3

To route data packets between different networks

4

To amplify signals for long-distance transmission

46

media

47

Multiple Choice

Which of the following devices is used to extend the range of a wireless network?

1

Modem

2

Router

3

Booster

4

Switch

48

Match

Write the correct function to each device.

Connects wireless devices to a wired network using Wi-Fi signals.

Forwards data to the correct device on the network using MAC addresses and ports.

Connects two different types of networks, such as LAN to WAN.

Stores and forwards traffic using the quickest route and acts as the gateway to the internet.

Extends the range of network signals by amplifying them.

Wireless access point (WAP)

Switch

Gateway

Router

Booster

49

media

50

Multiple Choice

What is the role of an authentication server?

1

To manage print requests

2

To check usernames and passwords

3

To share resources with clients

4

To connect multiple servers

51

Drag and Drop

A computer that connects to a server and uses the resources it provides.​
Checks usernames and passwords and issues certificates for access to resources.​
Shares resources such as storage, printers, and applications with connected devices.​
Manages multiple printers, adds print jobs to a queue, and processes printing requests.​
Drag these tiles and drop them in the correct blank above
Client
Authentication server
Server
Print server
Printer
router

52

media

53

Match

Question image

Match the following

all clients connect to this with cables

a powerful computer that stores, saves and serves documents to clients

a device on the network

connects all the devices together

switch

file server

client

ethernet cable

54

Dropdown

HTTP and HTTPs: These are ​
used for transferring web pages. ​
is a ​
of HTTP commonly used for online transactions.

55

Multiple Choice

Which statement best describes the role of HTTP?

1

A. A protocol for routing packets between networks

2

B. A protocol that controls how web pages (HTML documents) connect to each other

3

C. A process used to print documents on a network

4

D. A method for storing user accounts on a server

56

Multiple Choice

Which server is responsible for checking usernames and passwords when a user logs in?

1

File server

2

Authentication server

3

Print server

4

Web server

57

Match

Match the Server to Its Main Function

Provides access to applications hosted on the server

Processes HTTP requests and delivers web pages

Stores shared and private user documents

Manages multiple printers and print requests

Application server

Web server

File server

Print server

58

media

59

Multiple Choice

What is the role of an Internet Service Provider (ISP) in connecting users to the internet?

1

To provide free internet access to everyone

2

To charge fees for internet access

3

To connect users to telecommunications infrastructure

4

To limit internet access to certain users

60

Match

Match the Term to Its Description

Provides internet access through mobile and landline networks

Networks of hardware facilities used to transfer data

Offers free or low-cost internet access to specific groups

ISP

Telecommunications infrastructure

Community scheme

61

Fill in the Blank

____To provide users with access to the telecommunications infrastructure required to connect to the internet

62

media

63

Multiple Choice

What is a web browser?

1

A type of hardware

2

A type of software application

3

A type of operating system

4

A type of network protocol

64

media

65

media

66

Multiple Choice

Explain the difference between a web browser and a search engine.

1

A search engine is used to access the internet, while a web browser is used to find specific information on the internet.

2

A web browser is used to access the internet, while a search engine is used to find specific information on the internet.

3

A web browser is used to search for information on the internet, while a search engine is used to access specific websites.

4

A search engine is a type of web browser used to access specific websites, while a web browser is used to find general information on the internet.

67

Multiple Choice

Question image
1
Internet Browsers
2
Firebox
3

Google

4
Windows

68

Multiple Choice

A website that allows you to search the internet is a ________________ ________________.
1
Search Engine
2
Web Browser
3
Internet Provider
4
Site Finder

69

media

70

Multiple Choice

What happens if a webpage URL matches an item in the blacklist?

1

A. The user is allowed to view the page normally

2

B. The software asks the user for permission

3

C. The user is prevented from viewing the page

4

D. The page is automatically added to the whitelist

71

Multiple Select

What are the two lists used in filter software to manage web page access?

1

blacklist

2

whitelist

3

URL

4

filter software

72

Categorize

Options (4)

Add URLs to blacklist

Compare URL to whitelist

Update blacklist during updates

Protect children from harmful content

Organize these options into the right categories

Administrator
Filter software

73

media

74

Multiple Choice

Question image
What does LAN stand for?
1
Local Area Network
2
Legal Access Network
3
Legendary Access Node
4
Local Admin Network

75

Multiple Select

What are the two different models that computers in a LAN can be connected using?

1

peer-to-peer

2

client-server

3

hub-and-spoke

4

mesh

76

media

77

media

78

Multiple Choice

Which statement best describes a peer-to-peer network?

1

a) A network where computers access resources via a central server.

2

b) A network where each computer stores all data for the whole network.

3

c) A network where computers share resources directly with each other without a server.

4

d) A network that requires an authentication server to function.

79

Multiple Choice

What is the main feature of a client-server network?

1

a) All devices have equal responsibility and share files directly.

2

b) A central server manages resources and services for multiple clients.

3

c) Users must physically connect their computers to share files.

4

d) Each computer acts as both server and client at the same time.

80

media

81

Multiple Choice

Which of the following is a major benefit of using a Local Area Network (LAN)?

1

Each computer must have its own dedicated printer and storage device.

2

Users can only access files from the device they originally created them on.

3

LANs allow shared access to peripherals, storage, media streaming, and communication between connected devices.

4

LANs prevent devices from sharing the same internet connection.

82

media

83

media

84

Multiple Choice

Which of the following is a key benefit of using a client-server network?

1

a) Every user must manually back up their own data to avoid loss.

2

b) Users can freely access all resources without any restrictions.

3

c) Resources and user accounts can be centrally managed, and automated backups help protect user data.

4

d) Only peer-to-peer connections can be used to share storage and printers.

85

Match

Match each benefit to the correct description.

Backups can be automated for all users, reducing the chance of data loss.

Users or groups can be allowed or restricted from accessing specific resources.

Resources and user accounts can be managed by administrators with an overview of the whole network.

Centralised backup

Control of user access rights

Centralised administration

86

Match

Match each network service to the correct description.

Allows users to log into any computer on the network and see their own settings and files.

Provides access to applications or operating systems hosted on servers.

Users can centrally store files and set permissions such as read-only or read/write.

Roaming profiles

Shared software

Shared storage and file access

87

media

88

Match

Match each term to the correct description.

Confirms that a user is who they claim to be before allowing access.

Required information (such as username/account name) used to access a network.

Manages the verification of users so they can access network resources without repeated logins.

Authenticate

Login

Authentication server

89

media

90

Multiple Choice

What is the main purpose of a firewall in a network?

1

To increase the speed of the network connection

2

To control and filter network traffic, preventing unauthorised access

3

To store all user passwords securely

4

To connect multiple devices together in a wired network

91

media

92

Multiple Choice

What is the purpose of encryption?

1

To speed up the processing of data on a network

2

To encode or scramble data so unauthorised users cannot understand it

3

To store passwords in a secure database

4

To convert binary numbers into text

93

media

94

media

95

media

96

media

97

media

98

Multiple Choice

Which statement correctly describes public key encryption?

1

A. It uses one key for encryption and the same key for decryption.

2

B. It uses two unrelated random keys to encrypt and decrypt data.

3

C. It uses two mathematically related keys, one public and one private.

4

D. It allows anyone with the private key to encrypt messages for others.

99

Multiple Choice

What is a feature of symmetric key encryption?

1

A. A public key is used to encrypt and a private key is used to decrypt.

2

B. It uses different keys for encryption and decryption.

3

C. The key used to encrypt is mathematically related to a secret key.

4

D. The same key is used to encrypt and decrypt the data.

100

media

101

Multiple Choice

Question image

Why does Farooq use Iyabode’s public key to encrypt the message?

1

A. Because the public key decrypts the message faster

2

B. Because only Iyabode’s private key can decrypt the message

3

C. Because the public key hides the sender’s identity

4

D. Because the public key changes every time a message is sent

102

Dropdown

Used by the receiver to decrypt the message​
Shared so others can encrypt a message for the receiver​

103

media

104

Multiple Choice

Question image

Why is WEP considered the least secure wireless encryption method?

1

A. It uses different keys for every device on the network

2

B. It generates a new key for every packet of data

3

C. All devices use the same key, making it easy for attackers to discover

4

D. It only works on wired networks

105

Multiple Choice

Question image

What is one advantage of WPA over WEP?

1

A. WPA uses no encryption at all

2

B. WPA uses the same key for all devices

3

C. WPA generates new keys for each device and each packet

4

D. WPA is slower because it does not encrypt packets

106

media

107

media

108

media

109

Multiple Choice

Which of the following is a valid reason for using a Virtual Private Network (VPN)?

1

To increase the speed of the user’s local Wi-Fi connection

2

To access a private LAN securely from a remote location

3

To remove viruses from a computer automatically

4

To replace an ISP and provide a new internet connection

110

Multiple Choice

What does a VPN do to ensure that data remains secure when transmitted over the internet?

1

A. It encrypts the data so it cannot be read if intercepted

2

B. It increases the size of the data packets to make them harder to track

3

C. It changes the user’s hardware address to hide their identity

4

D. It blocks all websites except those approved by the user’s ISP

111

media

112

Multiple Choice

Which statement best describes the purpose of a transaction log on a network?

1

A. It prevents users from opening files they do not have permission for

2

B. It stores backup copies of important files in case the originals are lost

3

C. It records all network activity so administrators can identify unusual or suspicious events

4

D. It encrypts all user files to protect them from unauthorized access

113

Match

Match each term to its correct description.

A copy of one or more files stored on a different device from the original

Records network activity so administrators can identify unusual or suspicious events

Permissions that control whether a user can read, write, or access specific files or folders

Backup

Transaction log

File access rights

114

media

115

media

116

Poll

Question image

How well did you understand today's material?


Totally got it

Pretty well

Not very well

Not at all

117

Open Ended

Question image

What did you learn in today's class?

118

Open Ended

Question image

What is VPN stands for?

119

Drag and Drop

Question image
A security protocol that creates new encryption keys for each device and packet​
An unauthorised person or software that intercepts data​
A method of using a public network to securely access a private network​
An early wireless security protocol that uses the same key for all devices​
The use of a user’s location to restrict access to online services​
Drag these tiles and drop them in the correct blank above
WPA (Wi-Fi Protected Access)
Eavesdropper
VPN
WEP
Geolocation rights management
media

Show answer

Auto Play

Slide 1 / 119

SLIDE