COMPUETR AND NETWORK

COMPUETR AND NETWORK

9th - 12th Grade

11 Qs

quiz-placeholder

Similar activities

Cyber Security

Cyber Security

8th - 12th Grade

10 Qs

Security Features

Security Features

10th Grade

16 Qs

Network Security Basics

Network Security Basics

10th Grade

15 Qs

Online Safety: CyberSecurity

Online Safety: CyberSecurity

6th - 12th Grade

16 Qs

IT Security & Encryption of Data

IT Security & Encryption of Data

8th - 10th Grade

15 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Societal impacts of IT

Societal impacts of IT

9th - 10th Grade

16 Qs

Revision OCR J277 1.1-1.4

Revision OCR J277 1.1-1.4

10th - 11th Grade

15 Qs

COMPUETR AND NETWORK

COMPUETR AND NETWORK

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Hussein Shatnawi

Used 6+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Access Control referred to physical address, is a unique, 12-character alphanumeric attribute that is used to identify individual electronic devices on a network.

MAC Address

IP Address

DNS

DHCP

2.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

Network components are :

ROUTER

PC

CAT 6

CABLE

SWITCH

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

DNS is stands for :

Domain Name System

Data network server

Dynamic Host configuration protocol

Direct name server

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

fiber optic cables is faster than CAT 6 cables in Data transmission

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The connection of two computers or more to transmit data between them or share resources is a :

computer hardware

computer software

computer

network

internet

protocol

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

is an attack that attempts to steal your money, or your identity, by getting you to reveal personal information -- such as credit card numbers, bank information, or passwords -- on websites that pretend to be legitimate. Cybercriminals typically pretend to be reputable companies, friends, or acquaintances in a fake message, which contains a link to a phishing website.

Phishing

Spyware

Ransomware

Virus

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

is used to protect data from being stolen, changed, or compromised and works by scrambling data into a secret code that can only be unlocked with a unique digital key.

Antivirus software

Firewall

software

Passwords

Encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?