COMPUETR AND NETWORK

COMPUETR AND NETWORK

9th - 12th Grade

11 Qs

quiz-placeholder

Similar activities

threats to computer systems and networks

threats to computer systems and networks

9th Grade

15 Qs

Quiz Konten Digital dan Keamanan

Quiz Konten Digital dan Keamanan

10th Grade - University

15 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

10th Grade

15 Qs

Revision OCR J277 1.1-1.4

Revision OCR J277 1.1-1.4

10th - 11th Grade

15 Qs

Societal impacts of IT

Societal impacts of IT

9th - 10th Grade

16 Qs

eSecurity

eSecurity

11th Grade

10 Qs

Security Features

Security Features

10th Grade

16 Qs

Terms in cyber security

Terms in cyber security

12th Grade

6 Qs

COMPUETR AND NETWORK

COMPUETR AND NETWORK

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Hussein Shatnawi

Used 6+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Access Control referred to physical address, is a unique, 12-character alphanumeric attribute that is used to identify individual electronic devices on a network.

MAC Address

IP Address

DNS

DHCP

2.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

Network components are :

ROUTER

PC

CAT 6

CABLE

SWITCH

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

DNS is stands for :

Domain Name System

Data network server

Dynamic Host configuration protocol

Direct name server

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

fiber optic cables is faster than CAT 6 cables in Data transmission

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The connection of two computers or more to transmit data between them or share resources is a :

computer hardware

computer software

computer

network

internet

protocol

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

is an attack that attempts to steal your money, or your identity, by getting you to reveal personal information -- such as credit card numbers, bank information, or passwords -- on websites that pretend to be legitimate. Cybercriminals typically pretend to be reputable companies, friends, or acquaintances in a fake message, which contains a link to a phishing website.

Phishing

Spyware

Ransomware

Virus

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

is used to protect data from being stolen, changed, or compromised and works by scrambling data into a secret code that can only be unlocked with a unique digital key.

Antivirus software

Firewall

software

Passwords

Encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?