COMPUETR AND NETWORK

COMPUETR AND NETWORK

9th - 12th Grade

11 Qs

quiz-placeholder

Similar activities

ICT - Networks and communication

ICT - Networks and communication

9th Grade

11 Qs

4Q Week3 Review Quiz (Who missed the Quiz ONLY))

4Q Week3 Review Quiz (Who missed the Quiz ONLY))

9th Grade

10 Qs

Cell Phone Vocabulary

Cell Phone Vocabulary

9th - 12th Grade

12 Qs

Sprawdź się

Sprawdź się

4th - 12th Grade

10 Qs

BP TIK 1

BP TIK 1

10th Grade

10 Qs

Networking Quiz

Networking Quiz

8th - 9th Grade

15 Qs

HARDWARE AND SOFTWARE

HARDWARE AND SOFTWARE

2nd - 10th Grade

10 Qs

Q1 M 2 - TOPIC 2 / Check your understanding

Q1 M 2 - TOPIC 2 / Check your understanding

10th Grade

10 Qs

COMPUETR AND NETWORK

COMPUETR AND NETWORK

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Hard

Created by

Hussein Shatnawi

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Access Control referred to physical address, is a unique, 12-character alphanumeric attribute that is used to identify individual electronic devices on a network.

MAC Address

IP Address

DNS

DHCP

2.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

Network components are :

ROUTER

PC

CAT 6

CABLE

SWITCH

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

DNS is stands for :

Domain Name System

Data network server

Dynamic Host configuration protocol

Direct name server

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

fiber optic cables is faster than CAT 6 cables in Data transmission

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The connection of two computers or more to transmit data between them or share resources is a :

computer hardware

computer software

computer

network

internet

protocol

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

is an attack that attempts to steal your money, or your identity, by getting you to reveal personal information -- such as credit card numbers, bank information, or passwords -- on websites that pretend to be legitimate. Cybercriminals typically pretend to be reputable companies, friends, or acquaintances in a fake message, which contains a link to a phishing website.

Phishing

Spyware

Ransomware

Virus

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

is used to protect data from being stolen, changed, or compromised and works by scrambling data into a secret code that can only be unlocked with a unique digital key.

Antivirus software

Firewall

software

Passwords

Encryption

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?