J277 - Wireless Networks

J277 - Wireless Networks

8th - 11th Grade

11 Qs

quiz-placeholder

Similar activities

Network Hardware Y8

Network Hardware Y8

8th Grade

15 Qs

Network hardware

Network hardware

10th Grade

14 Qs

Bluetooth & Wifi

Bluetooth & Wifi

9th - 11th Grade

11 Qs

UJI KOMPETENSI BAB 5 JARINGAN KOMPUTER

UJI KOMPETENSI BAB 5 JARINGAN KOMPUTER

7th - 9th Grade

15 Qs

BTEC DIT Modern Technology Starter (Adhoc & Cloud Storage)

BTEC DIT Modern Technology Starter (Adhoc & Cloud Storage)

8th - 9th Grade

14 Qs

Types of Networks

Types of Networks

5th - 8th Grade

10 Qs

OCR GCSE CS MCQ1 1.5 Networks (J276)

OCR GCSE CS MCQ1 1.5 Networks (J276)

9th - 10th Grade

10 Qs

IC3 GS6 Level 1 Domain 2 Lesson 1

IC3 GS6 Level 1 Domain 2 Lesson 1

6th Grade - University

15 Qs

J277 - Wireless Networks

J277 - Wireless Networks

Assessment

Quiz

Computers

8th - 11th Grade

Hard

Created by

A Brereton

Used 291+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The two kinds of wireless connection are:

WiFi & Bluetooth

WiFi & Airpod

Bluetooth & phone data

Phones & internet

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

To access a wireless network, a device needs a wireless ___ connected to or built into it.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does WAP stand for?

Wireless access point

Wifi access point

Wireless application protocol

Wifi application protocol

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Select all the benefits of using 2.4GHz frequency WiFi:

It is faster

It has a longer range

Less interference from other devices

It is encrypted

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select all the benefits of using 5GHz frequency WiFi:

It is faster

It has a longer range

Less interference from structures such as walls

It is encrypted

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Caesar cipher is a famous ____________ encryption technique.

symmetrical

asymmetrical

complex

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

How many keys are used in asymmetrical encryption?

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?