Unit 1.3 Networks topologies modes

Unit 1.3 Networks topologies modes

7th - 11th Grade

10 Qs

quiz-placeholder

Similar activities

Threats to Data

Threats to Data

9th - 12th Grade

11 Qs

HEALTH AND SAFETY 9

HEALTH AND SAFETY 9

7th - 9th Grade

11 Qs

LEDs on micro:bit

LEDs on micro:bit

8th Grade

15 Qs

LMS dan Media Pembelajaran SMP Ricci 1

LMS dan Media Pembelajaran SMP Ricci 1

7th - 9th Grade

10 Qs

ICT Grade 8

ICT Grade 8

8th Grade

10 Qs

Recuperação PC - 8º Ano - Projeto Pega Pega Digital

Recuperação PC - 8º Ano - Projeto Pega Pega Digital

8th Grade

10 Qs

Latihan Soal Informatika Analisis Data Kelas 7

Latihan Soal Informatika Analisis Data Kelas 7

7th Grade

14 Qs

Sumatif Harian 3

Sumatif Harian 3

7th Grade

12 Qs

Unit 1.3 Networks topologies modes

Unit 1.3 Networks topologies modes

Assessment

Quiz

Computers

7th - 11th Grade

Medium

Created by

Helen McLean

Used 74+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What network has the server placed in the centre and the devices around it? (1-4)
Ring
Bus
Star
Mesh

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is a feature of a Mesh Network? (5-6)
Data can be transmitted from different devices simultaneously.
Devices are dependent on a central sever.
The network uses terminators
The Server is usually based in the middle of the network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not an advantage of a Network? (1-4)
Shared files and resources
Less vulnerable to hackers
Data can be shared across a range of users
User accounts can be created

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is a disadvantage of WiFi? (1-4)
You can use it in a range of ‘hard to reach’ locations making users more mobile
It is simple to join a WiFi network
It is more cost effective
None of them

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption is? (1-4)
A secret code used to keep data safe
A key which is applied to data to scramble it (a)
A set of numbers used to replace letters in data that is transmitted
A message that is kept secret

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Encryption method used on Secure Internet transitions is called?(5-6)
Public Key Encryption
Public Code Encrypting
Public Key Encrypting
Private Key Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption requires a key? (1-4)
True
False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?