COMPUETR AND NETWORK

COMPUETR AND NETWORK

9th - 12th Grade

11 Qs

quiz-placeholder

Similar activities

PowerPoint Quiz 2

PowerPoint Quiz 2

9th Grade

13 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

แบบทดสอบ หน่วยที่ 1 แนวคิดเชิงคำนวณ

แบบทดสอบ หน่วยที่ 1 แนวคิดเชิงคำนวณ

10th Grade

10 Qs

WJEC GCSE ICT Unit 1 E-Mail

WJEC GCSE ICT Unit 1 E-Mail

9th - 10th Grade

13 Qs

Kuis Pengayaan (Aplikasi Sehari-hari?

Kuis Pengayaan (Aplikasi Sehari-hari?

9th Grade

10 Qs

Scratch

Scratch

KG - Professional Development

10 Qs

Lesson 1 Introduction to Database System

Lesson 1 Introduction to Database System

10th Grade

10 Qs

Review

Review

9th - 12th Grade

10 Qs

COMPUETR AND NETWORK

COMPUETR AND NETWORK

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Hard

Created by

Hussein Shatnawi

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Access Control referred to physical address, is a unique, 12-character alphanumeric attribute that is used to identify individual electronic devices on a network.

MAC Address

IP Address

DNS

DHCP

2.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

Network components are :

ROUTER

PC

CAT 6

CABLE

SWITCH

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

DNS is stands for :

Domain Name System

Data network server

Dynamic Host configuration protocol

Direct name server

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

fiber optic cables is faster than CAT 6 cables in Data transmission

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The connection of two computers or more to transmit data between them or share resources is a :

computer hardware

computer software

computer

network

internet

protocol

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

is an attack that attempts to steal your money, or your identity, by getting you to reveal personal information -- such as credit card numbers, bank information, or passwords -- on websites that pretend to be legitimate. Cybercriminals typically pretend to be reputable companies, friends, or acquaintances in a fake message, which contains a link to a phishing website.

Phishing

Spyware

Ransomware

Virus

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

is used to protect data from being stolen, changed, or compromised and works by scrambling data into a secret code that can only be unlocked with a unique digital key.

Antivirus software

Firewall

software

Passwords

Encryption

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?