Unit 1.3 Networks topologies modes

Unit 1.3 Networks topologies modes

7th - 11th Grade

10 Qs

quiz-placeholder

Similar activities

1.5 Packet Switching & Layers

1.5 Packet Switching & Layers

8th - 10th Grade

11 Qs

STM BTEC DIT Component 3 -1. Communication Technologies p140

STM BTEC DIT Component 3 -1. Communication Technologies p140

9th - 10th Grade

10 Qs

Network Topologies

Network Topologies

11th - 12th Grade

15 Qs

OCR 1.5 Networks 1

OCR 1.5 Networks 1

11th Grade

10 Qs

1.3 - Network Topologies

1.3 - Network Topologies

8th - 10th Grade

11 Qs

1.3 Networks (L5)

1.3 Networks (L5)

10th Grade

15 Qs

GCSE Networks Revision

GCSE Networks Revision

9th - 11th Grade

15 Qs

PAN, LAN, WAN

PAN, LAN, WAN

6th - 10th Grade

15 Qs

Unit 1.3 Networks topologies modes

Unit 1.3 Networks topologies modes

Assessment

Quiz

Computers

7th - 11th Grade

Medium

Created by

Helen McLean

Used 74+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What network has the server placed in the centre and the devices around it? (1-4)
Ring
Bus
Star
Mesh

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is a feature of a Mesh Network? (5-6)
Data can be transmitted from different devices simultaneously.
Devices are dependent on a central sever.
The network uses terminators
The Server is usually based in the middle of the network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not an advantage of a Network? (1-4)
Shared files and resources
Less vulnerable to hackers
Data can be shared across a range of users
User accounts can be created

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is a disadvantage of WiFi? (1-4)
You can use it in a range of ‘hard to reach’ locations making users more mobile
It is simple to join a WiFi network
It is more cost effective
None of them

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption is? (1-4)
A secret code used to keep data safe
A key which is applied to data to scramble it (a)
A set of numbers used to replace letters in data that is transmitted
A message that is kept secret

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Encryption method used on Secure Internet transitions is called?(5-6)
Public Key Encryption
Public Code Encrypting
Public Key Encrypting
Private Key Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption requires a key? (1-4)
True
False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?