Search Header Logo

A+ Core 1

Authored by Michael Nefzger

Computers

6th - 8th Grade

Used 1+ times

A+ Core 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

What is an

Access point?

An access point (AP) is a device that enables wireless stations to connect to a wired local area network (LAN). It acts as a bridge between wireless-capable devices (such as laptops, smartphones, or tablets) and the wired network infrastructure.

When a person points in the direction of an access.

Point due west

What do you call a programmer's cats?

Java and JavaScript

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What does encryption mean in information technology?

Why did the computer keep falling asleep?

It had a bad case of "Hibernate"!

Form of crying!

Encryption converts the original representation of the information, known as plaintext, into an alternative form known as ciphere.

Encryption is the process of encoding information.

Answer explanation

WEBEncryption is a form of data security in which information is converted to ciphertext. Only authorized people who have the key can decipher the code and access the original plaintext information. In even simpler terms, encryption is a way to render data unreadable to an

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following devices can be used to extend the range of a wireless network?

Router

Switch

Hub

Access Point

Why did the developer go broke?

Because he lost his domain in a poker game!

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An Access Point is used for what purpose in a network?

To connect different network segments

To provide a wireless connection to a wired network

To manage IP addresses within a network

To control data flow between two networks

Why was the math book sad?

Because it had too many problems!

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of wireless access point has all the software required to manage the WLAN

processes with no need for additional controllers or switches.

integrated access point

autonomous access point

centralized access point
dependent access point

Why do not programmers like nature hikes?

They perfer the comfort of their

"terminal"!

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Using this type of technology allows you to connect your device without wires

USB

MP3

Bluetooth

Browser

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common tactic used to defeat access security?

Using high-resolution cameras

Piggybacking or tailgating

Encryption

Installing more locks

Answer explanation

Tailgating – Unauthorized person follows authorized person into restricted area without permission.

Piggybacking – Unauthorized person gains access to restricted area by using credentials of authorized person with or without their consent.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?