Computer Science 1.5 -  Topologies, Layers and Protocols

Computer Science 1.5 - Topologies, Layers and Protocols

9th - 11th Grade

19 Qs

quiz-placeholder

Similar activities

Informática I (17-18-A)

Informática I (17-18-A)

10th Grade

20 Qs

la internet

la internet

3rd - 11th Grade

20 Qs

Google Docs Basics Quiz

Google Docs Basics Quiz

9th Grade

20 Qs

Unit 8 Practice Test For CSP

Unit 8 Practice Test For CSP

9th Grade

16 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

LA1.C1: Introduction to Small Basic

LA1.C1: Introduction to Small Basic

9th Grade

15 Qs

Latihan PSAS Kelas 9

Latihan PSAS Kelas 9

9th Grade - University

20 Qs

12AIT - All About W3C <3

12AIT - All About W3C <3

10th Grade - University

18 Qs

Computer Science 1.5 -  Topologies, Layers and Protocols

Computer Science 1.5 - Topologies, Layers and Protocols

Assessment

Quiz

Computers

9th - 11th Grade

Practice Problem

Medium

Created by

Graham Long

Used 136+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What network has the server placed in the centre and the devices around it? (1-4)

Bus
Ring
Star
Mesh

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which is a feature of a Mesh Network? (5-6)

The Server is usually based in the middle of the network
Data can be transmitted from different devices simultaneously.
Devices are dependent on a central server.
Network uses terminators

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of these is not an advantage of a Network? (1-4)

Shared files and resources
Data can be shared across a range of users
Less vulnerable to hackers
User accounts can be created

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which is a disadvantage of WiFi? (1-4)

It is simple to join a WiFi network
You can use it in a range of ‘hard to reach’ locations making users more mobile
It is more cost effective
None of them
It reduces Health & Safety issues by removing wires

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Encryption is? (1-4)

A secret code used to keep data safe
A key which is applied to data to scramble it
A message that is kept secret
A set of numbers used to replace letters in data that is transmitted

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The Encryption method used on Secure Internet transitions is called?(5-6)

Public Key Encrypting
Private Key Encryption
Public Key Encryption
Public Code Encrypting

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Encryption requires a key? (1-4)

false
true

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?