OCR 1.5 Networks 1

OCR 1.5 Networks 1

11th Grade

10 Qs

quiz-placeholder

Similar activities

Imagen GIMP

Imagen GIMP

9th - 12th Grade

15 Qs

Impresa e siti web

Impresa e siti web

8th - 12th Grade

10 Qs

Input Devices of Computer

Input Devices of Computer

11th Grade

10 Qs

الشبكات السلكية واللاسلكية والانترنت

الشبكات السلكية واللاسلكية والانترنت

11th Grade

15 Qs

AIJ XI TKJ

AIJ XI TKJ

11th Grade

10 Qs

Ms. Exel dan Fungsi Logika IF

Ms. Exel dan Fungsi Logika IF

10th Grade - University

15 Qs

Bimestral 2P

Bimestral 2P

11th Grade

15 Qs

BÀI TẬP T7 - KHỞI ĐỘNG

BÀI TẬP T7 - KHỞI ĐỘNG

10th - 12th Grade

10 Qs

OCR 1.5 Networks 1

OCR 1.5 Networks 1

Assessment

Quiz

Computers

11th Grade

Practice Problem

Medium

Created by

Luke Yates

Used 87+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question 1: What network has the server placed in the centre and the devices

around it? (1-4)

Ring

Bus

Star

Mesh

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question 2: Which is a feature of a Mesh Network? (5-6)

Data can be transmitted from different devices simultaneously.

Devices are dependent on a central sever.

The network uses terminators

The Server is usually based in the middle of the network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question 3: Which of these is NOT an advantage of a Network? (1-4)

Shared files and resources

Less vulnerable to hackers

Data can be shared across a range of users

User accounts can be created

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question 4: Which is a disadvantage of WiFi? (1-4)

You can use it in a range of ‘hard to reach’ locations making users more mobile

It is simple to join a WiFi network

It reduces Health & Safety issues by removing wires

None of the other answers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question 5: Encryption is? (1-4)

A secret code used to keep data safe

A key which is applied to data to scramble it

A set of numbers used to replace letters in data that is transmitted

A message that is kept secret

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question 6: The Encryption method used on Secure Internet transitions is called?

(5-6)

Public Key Encryption

Public Code Encrypting

Public Key Encrypting

Private Key Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question 7: Encryption requires a key? (1-4)

True

False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?