
Computer Science 1.5 - Topologies, Layers and Protocols
Authored by Graham Long
Computers
9th - 11th Grade
Used 136+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What network has the server placed in the centre and the devices around it? (1-4)
Bus
Ring
Star
Mesh
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which is a feature of a Mesh Network? (5-6)
The Server is usually based in the middle of the network
Data can be transmitted from different devices simultaneously.
Devices are dependent on a central server.
Network uses terminators
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of these is not an advantage of a Network? (1-4)
Shared files and resources
Data can be shared across a range of users
Less vulnerable to hackers
User accounts can be created
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which is a disadvantage of WiFi? (1-4)
It is simple to join a WiFi network
You can use it in a range of ‘hard to reach’ locations making users more mobile
It is more cost effective
None of them
It reduces Health & Safety issues by removing wires
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Encryption is? (1-4)
A secret code used to keep data safe
A key which is applied to data to scramble it
A message that is kept secret
A set of numbers used to replace letters in data that is transmitted
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
The Encryption method used on Secure Internet transitions is called?(5-6)
Public Key Encrypting
Private Key Encryption
Public Key Encryption
Public Code Encrypting
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Encryption requires a key? (1-4)
false
true
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?