1.5 Networks

1.5 Networks

5th Grade - University

26 Qs

quiz-placeholder

Similar activities

LANs, WANs & Network Performance (Mr I's) [OCR 1.4 - Networks)

LANs, WANs & Network Performance (Mr I's) [OCR 1.4 - Networks)

9th - 11th Grade

21 Qs

TCP IP (H446)

TCP IP (H446)

10th Grade - University

24 Qs

Ciw Network Technology Foundations

Ciw Network Technology Foundations

8th Grade - Professional Development

24 Qs

Vocabulary #7 Quiz

Vocabulary #7 Quiz

11th Grade - University

24 Qs

Basics of Networking

Basics of Networking

University

25 Qs

Networking Final Exam

Networking Final Exam

10th Grade

22 Qs

Networks and the Internet

Networks and the Internet

9th - 12th Grade

25 Qs

The Transport Layer

The Transport Layer

9th Grade

21 Qs

1.5 Networks

1.5 Networks

Assessment

Quiz

Computers

5th Grade - University

Hard

Used 392+ times

FREE Resource

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which network features all devices connected to all/multiple other devices?

Mesh

Star

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which are features of a Mesh Network?

Data can be transmitted from different devices simultaneously.

Devices are dependent on a central sever.

The network uses terminators

The Server is usually based in the middle of the network

If one device fails there is an alternative route for the data

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which are features of the Star Topology?

Adding/removing devices is easy

Less network traffic/collisions

Doesn't rely on the central server being operational

Doesn't use any cables

If one client fails the rest of the network will continue to operate as normal

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which are disadvantages of WiFi?

It makes users less mobile

It increases Health & Safety issues by removing wires

It is requires extensive use of expensive cables

Tend to have slow transfer speeds

It is more vulnerable to hacking

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption is?
A secret code used to keep data safe
A key which is applied to data to scramble it
A set of numbers used to replace letters in data that is transmitted
A message that is kept secret

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Encryption method used on Secure Internet transitions is called?
Public Key Encryption
Public Code Encrypting
Public Key Encrypting
Private Key Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption requires a key?
True
False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?