
Data Transmission and Protection Quiz
Authored by Salehddine Meftah
Information Technology (IT)
11th Grade
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary difference between wired and wireless methods of connecting devices?
Wired connections are generally more secure than wireless connections.
Wireless connections are always faster than wired connections.
Wired connections are more expensive to set up than wireless connections.
Wireless connections do not require any hardware.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Ava is setting up a network to connect all the computers and devices in her office building. Which type of network should she use?
Personal Area Network (PAN)
Local Area Network (LAN)
Wide Area Network (WAN)
Virtual Private Network (VPN)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Amelia is tasked with selecting a network for her company. What is a key factor she should consider?
The colour of the network cables
The number of employees who like technology
User experience, including ease of use and performance
The brand of the network hardware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Florence is setting up an online store and wants to ensure that her customers' payment information is secure. Which protocol should she use for secure payment systems?
HTTP
FTP
HTTPS
SMTP
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Arthur is trying to stream a live football match on his laptop, but he notices that the video keeps buffering and is delayed. What is the main implication of this high latency in the network?
Increased data security
Faster data transmission
Delayed data transmission
Reduced data integrity
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Ava is editing a video for her school project and needs to compress the file to upload it online. She doesn't mind if the video loses some quality as long as it reduces the file size. Which type of data compression should she use?
Lossy
Lossless
Redundant
Incremental
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Freya received an email that looked like it was from her bank, asking her to confirm her account details. What is this common threat to data security?
Malware
Phishing
Hacking
Accidental damage
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?