Code Prinicples U2 Assessment

Code Prinicples U2 Assessment

9th - 12th Grade

26 Qs

quiz-placeholder

Similar activities

Cybersecurity Checkpoint 1

Cybersecurity Checkpoint 1

10th - 12th Grade

23 Qs

Sumative susulan dan remedial Grade 9

Sumative susulan dan remedial Grade 9

9th Grade

24 Qs

Y9 Creative iMedia RO81 Quiz Part 1

Y9 Creative iMedia RO81 Quiz Part 1

9th Grade

21 Qs

Komunikasi dalam Jaringan

Komunikasi dalam Jaringan

10th - 12th Grade

21 Qs

QUIZ DASAR-DASAR TJKT S01-02

QUIZ DASAR-DASAR TJKT S01-02

10th Grade

25 Qs

PTS INFORMATIKA KELAS 9 2024

PTS INFORMATIKA KELAS 9 2024

9th Grade

21 Qs

GEMATMW - Coding Theory

GEMATMW - Coding Theory

6th Grade - University

21 Qs

1. pisana provjera znanja - Povijest i građa računala

1. pisana provjera znanja - Povijest i građa računala

9th Grade

22 Qs

Code Prinicples U2 Assessment

Code Prinicples U2 Assessment

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

David Powell

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A group of connected computers that can send or receive data.

computing device

computing system

computing network

path

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A machine that can run a program

computing device

computing system

computing network

path

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A group of computers working together for a common purpose.

computing device

computing system

computing network

path

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A sequence of direct connections

computing device

computing system

computing network

path

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the protocols used on the Internet?

The protocols of the Internet are designed by government agencies to ensure they remain free to use

The protocols of the Internet are secret to maintain the privacy and security of people using them

Each device connected to the Internet will use a protocol designed by the company that manufactured it

The protocols of the Internet are open and used by all devices connected to the network

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Jesse purchases a new smartphone and is immediately able to use it to send a photo over the Internet to a friend who lives in a different country. Which of the following is NOT necessary to make this possible?

Both devices are using the same shared and open protocols

A single direct connection is established between any two devices connected to the Internet

The data of the image is routed through a sequence of directly connected devices before arriving at its destination.

Both devices are directly connected to at least one part of the Internet

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

This diagram shows a number of computing devices connected to the Internet with each line representing a direct connection. 

What is the MINIMUM number of paths that would need to be broken to prevent Computing Device A from connecting with Computing Device E?

1

2

3

4

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?