J277 - Wireless Networks

J277 - Wireless Networks

8th - 11th Grade

11 Qs

quiz-placeholder

Similar activities

media transmisyjne

media transmisyjne

9th Grade

10 Qs

MENGENAL PC

MENGENAL PC

10th Grade

11 Qs

Network Classifications

Network Classifications

KG - 10th Grade

10 Qs

Cuestionario sobre seguridad en línea

Cuestionario sobre seguridad en línea

2nd Grade - University

15 Qs

Đề Kiểm Tra Tin Học Lớp 4

Đề Kiểm Tra Tin Học Lớp 4

5th Grade - University

12 Qs

Chapter 3: Storage devices and media (Part 2):

Chapter 3: Storage devices and media (Part 2):

10th - 11th Grade

15 Qs

Computer Devices and its Operating System

Computer Devices and its Operating System

4th - 8th Grade

10 Qs

WJEC ICT  - Chapter 2 -  Network Topologies

WJEC ICT - Chapter 2 - Network Topologies

10th Grade

11 Qs

J277 - Wireless Networks

J277 - Wireless Networks

Assessment

Quiz

Computers

8th - 11th Grade

Hard

Created by

A Brereton

Used 293+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The two kinds of wireless connection are:

WiFi & Bluetooth

WiFi & Airpod

Bluetooth & phone data

Phones & internet

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

To access a wireless network, a device needs a wireless ___ connected to or built into it.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does WAP stand for?

Wireless access point

Wifi access point

Wireless application protocol

Wifi application protocol

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Select all the benefits of using 2.4GHz frequency WiFi:

It is faster

It has a longer range

Less interference from other devices

It is encrypted

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select all the benefits of using 5GHz frequency WiFi:

It is faster

It has a longer range

Less interference from structures such as walls

It is encrypted

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Caesar cipher is a famous ____________ encryption technique.

symmetrical

asymmetrical

complex

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

How many keys are used in asymmetrical encryption?

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers