Computer Science 1.5 -  Topologies, Layers and Protocols

Computer Science 1.5 - Topologies, Layers and Protocols

9th - 11th Grade

19 Qs

quiz-placeholder

Similar activities

Jaringan Dasar

Jaringan Dasar

10th Grade

20 Qs

IBA Chapter 8B

IBA Chapter 8B

8th - 12th Grade

16 Qs

Network ports

Network ports

1st Grade - University

20 Qs

CIW Vocab 9

CIW Vocab 9

9th - 12th Grade

14 Qs

Networking Vocab

Networking Vocab

9th - 12th Grade

17 Qs

LATIHAN SOAL (TIK KELAS 9)

LATIHAN SOAL (TIK KELAS 9)

9th Grade

16 Qs

Networking Elements: GCSE 9-1

Networking Elements: GCSE 9-1

9th Grade - University

20 Qs

OCR GCSE - Protocols

OCR GCSE - Protocols

11th - 12th Grade

16 Qs

Computer Science 1.5 -  Topologies, Layers and Protocols

Computer Science 1.5 - Topologies, Layers and Protocols

Assessment

Quiz

Computers

9th - 11th Grade

Medium

Created by

Graham Long

Used 135+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What network has the server placed in the centre and the devices around it? (1-4)
Bus
Ring
Star
Mesh

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which is a feature of a Mesh Network? (5-6)
The Server is usually based in the middle of the network
Data can be transmitted from different devices simultaneously.
Devices are dependent on a central server.
Network uses terminators

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of these is not an advantage of a Network? (1-4)
Shared files and resources
Data can be shared across a range of users
Less vulnerable to hackers
User accounts can be created

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which is a disadvantage of WiFi? (1-4)
It is simple to join a WiFi network
You can use it in a range of ‘hard to reach’ locations making users more mobile
It is more cost effective
None of them
It reduces Health & Safety issues by removing wires

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Encryption is? (1-4)
A secret code used to keep data safe
A key which is applied to data to scramble it
A message that is kept secret
A set of numbers used to replace letters in data that is transmitted

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The Encryption method used on Secure Internet transitions is called?(5-6)
Public Key Encrypting
Private Key Encryption
Public Key Encryption
Public Code Encrypting

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Encryption requires a key? (1-4)
false
true

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?