J277 - Wireless Networks

J277 - Wireless Networks

8th - 11th Grade

11 Qs

quiz-placeholder

Similar activities

Types of Networks

Types of Networks

5th - 8th Grade

10 Qs

BTEC DIT Modern Technology Starter (Adhoc & Cloud Storage)

BTEC DIT Modern Technology Starter (Adhoc & Cloud Storage)

8th - 9th Grade

14 Qs

2.5 The Broadband Internet Connection (Wired Connection)

2.5 The Broadband Internet Connection (Wired Connection)

11th - 12th Grade

13 Qs

Bluetooth and WiFi

Bluetooth and WiFi

9th - 11th Grade

10 Qs

Basic Network Hardware

Basic Network Hardware

7th - 9th Grade

10 Qs

Networking Types

Networking Types

5th - 8th Grade

10 Qs

latihan pembuatan soal quizizz

latihan pembuatan soal quizizz

11th Grade

10 Qs

Chapter 7 - Setting Up and Configuring a Mobile Device

Chapter 7 - Setting Up and Configuring a Mobile Device

9th - 12th Grade

10 Qs

J277 - Wireless Networks

J277 - Wireless Networks

Assessment

Quiz

Computers

8th - 11th Grade

Hard

Created by

A Brereton

Used 292+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The two kinds of wireless connection are:

WiFi & Bluetooth

WiFi & Airpod

Bluetooth & phone data

Phones & internet

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

To access a wireless network, a device needs a wireless ___ connected to or built into it.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does WAP stand for?

Wireless access point

Wifi access point

Wireless application protocol

Wifi application protocol

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Select all the benefits of using 2.4GHz frequency WiFi:

It is faster

It has a longer range

Less interference from other devices

It is encrypted

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Select all the benefits of using 5GHz frequency WiFi:

It is faster

It has a longer range

Less interference from structures such as walls

It is encrypted

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Caesar cipher is a famous ____________ encryption technique.

symmetrical

asymmetrical

complex

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

How many keys are used in asymmetrical encryption?

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?