Networking Elements: GCSE 9-1

Networking Elements: GCSE 9-1

9th Grade - University

20 Qs

quiz-placeholder

Similar activities

Network Protocols and Layers

Network Protocols and Layers

9th - 10th Grade

19 Qs

Network Protocols

Network Protocols

10th Grade

21 Qs

UNIT 1.5 NETWORKS 2

UNIT 1.5 NETWORKS 2

10th Grade

20 Qs

Network Protocols

Network Protocols

10th Grade

15 Qs

GCSE Network Topologies and Protocols

GCSE Network Topologies and Protocols

9th - 11th Grade

24 Qs

BTEC L2 Unit 1 Online World 1-8

BTEC L2 Unit 1 Online World 1-8

11th - 12th Grade

15 Qs

Computer Science 1.5 -  Topologies, Layers and Protocols

Computer Science 1.5 - Topologies, Layers and Protocols

9th - 11th Grade

19 Qs

J277 1.3.2 Wired and Wireless Networks, Protocols and Layers

J277 1.3.2 Wired and Wireless Networks, Protocols and Layers

9th - 11th Grade

19 Qs

Networking Elements: GCSE 9-1

Networking Elements: GCSE 9-1

Assessment

Quiz

Computers

9th Grade - University

Medium

Used 55+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What type of network?

Ring

Star

Mesh

Bus

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is a feature of a mesh network

Data can be transmitted from many devices simultaneously

Devices are dependent on a central server

The network has to use terminators

The server only connects directly with computers

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not an advantage of networking

Sharing of files and resources

Less vulnerable to hackers

Connecting many users over wide areas

Centrally making user accounts

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a disadvantage of WiFi

It can reach far away difficult places

They are easy to join

It is more cost effective

The removal of wires makes health and safety improvements

None of these

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption is?

A secret code

A key which is applied to data to scramble it

Replacing numbers with letters in data that gets transmitted

Converting binary into Hexadecimal for data sharing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Secure Internet transactions use what

Public key encryption

Public code encryption

Public key Algorithm

Private key encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption requires a key

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?