5.9.1: Networks and the Internet Test Prep

5.9.1: Networks and the Internet Test Prep

9th Grade

15 Qs

quiz-placeholder

Similar activities

IBCA-Unit 1

IBCA-Unit 1

9th Grade

15 Qs

Technology Concepts Quiz

Technology Concepts Quiz

10th Grade - University

11 Qs

 OPERATION SYSTEMS/CLASS EXPECTATIONS  QUIZ

OPERATION SYSTEMS/CLASS EXPECTATIONS QUIZ

11th Grade - University

20 Qs

Using the Internet as Source of Information

Using the Internet as Source of Information

7th - 12th Grade

11 Qs

POBF 2.02 Vocabulary

POBF 2.02 Vocabulary

10th - 12th Grade

15 Qs

BF10 BE Unit 5 Test

BF10 BE Unit 5 Test

9th - 12th Grade

20 Qs

Digital Citizenship

Digital Citizenship

5th - 12th Grade

15 Qs

Digital Marketing

Digital Marketing

11th - 12th Grade

11 Qs

5.9.1: Networks and the Internet Test Prep

5.9.1: Networks and the Internet Test Prep

Assessment

Quiz

Business

9th Grade

Hard

Created by

Steve Wills

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best explains what happens when a new device is connected to the Internet?

A device driver is assigned to the device.

An Internet Protocol (IP) address is assigned to the device.

A packet number is assigned to the device.

A Web site is assigned to the device.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following activities poses the greatest personal cybersecurity risk?

Making a purchase on an online store that uses public key encryption to transmit information

Paying a bill using a secure online electronic payment system

Purchasing a couch by emailing a credit card number to the couch owner

Checking a bank account on a bank’s website that uses HTTPS for secure communication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is LEAST likely to indicate a phishing attack?

An email from a website asks that you click on a link to reset your password.

An email from your bank asks you to call the number on your card to verify a transaction.

An email from your water utility company asks you to enter your date of birth and social security number for verification purposes.

An email indicates you have won money, and asks you to enter your bank account number so the money can be transferred

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered an unethical use of computer resources?

Downloading file sharing software on your home computer

Searching online for the answers to CodeHS exercises and quizzes

Purchasing an app from an app store and downloading it directly to a mobile device

Searching online for an electronic version of a textbook

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the Digital Millennium Copyright Act?

To criminalize the act of circumventing, or getting around, access controls that block access to copyrighted works.

To make all content on the Internet free for everyone to use.

To criminalize plagiarism on the Internet.

To allow for open source software on the Internet.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?

about.example.com

example.com/about.html

example.com.about

example.org

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent back to the user?

The file is broken into packets and sent over a network. The packets must be reassembled by the user’s computer when they are received. If any packets are missing, the browser re-requests the missing packets.

The file is broken into packets and sent over a network. The user’s browser must request each packet, in order, until all packets are received.

The server attempts to connect directly to the user’s computer. If the connection is successful, the entire file is sent at once. If the connection is unsuccessful, an error message is sent to the user.

The server repeatedly attempts to connect directly to the user’s computer until a connection is made. Once the connection is made, the entire file is sent.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?