Computer Science 1.5 -  Topologies, Layers and Protocols

Computer Science 1.5 - Topologies, Layers and Protocols

9th - 11th Grade

19 Qs

quiz-placeholder

Similar activities

مراجعة حاسب2 ثلاث وحدات

مراجعة حاسب2 ثلاث وحدات

11th Grade

16 Qs

Computer Science - X

Computer Science - X

8th - 10th Grade

20 Qs

Administrasi Infrastruktur Jaringan 1

Administrasi Infrastruktur Jaringan 1

11th Grade

20 Qs

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

Google

Google

7th - 12th Grade

20 Qs

BÀI 24-25 TIN 10

BÀI 24-25 TIN 10

10th Grade

20 Qs

UNIT 1.8 ELCE

UNIT 1.8 ELCE

10th Grade

14 Qs

PSTS1 Informatika

PSTS1 Informatika

10th Grade

17 Qs

Computer Science 1.5 -  Topologies, Layers and Protocols

Computer Science 1.5 - Topologies, Layers and Protocols

Assessment

Quiz

Computers

9th - 11th Grade

Practice Problem

Medium

Created by

Graham Long

Used 136+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What network has the server placed in the centre and the devices around it? (1-4)

Bus
Ring
Star
Mesh

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which is a feature of a Mesh Network? (5-6)

The Server is usually based in the middle of the network
Data can be transmitted from different devices simultaneously.
Devices are dependent on a central server.
Network uses terminators

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of these is not an advantage of a Network? (1-4)

Shared files and resources
Data can be shared across a range of users
Less vulnerable to hackers
User accounts can be created

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which is a disadvantage of WiFi? (1-4)

It is simple to join a WiFi network
You can use it in a range of ‘hard to reach’ locations making users more mobile
It is more cost effective
None of them
It reduces Health & Safety issues by removing wires

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Encryption is? (1-4)

A secret code used to keep data safe
A key which is applied to data to scramble it
A message that is kept secret
A set of numbers used to replace letters in data that is transmitted

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The Encryption method used on Secure Internet transitions is called?(5-6)

Public Key Encrypting
Private Key Encryption
Public Key Encryption
Public Code Encrypting

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Encryption requires a key? (1-4)

false
true

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?