Unit 1.5 Network topologies, protocols and layers MCQs 1

Unit 1.5 Network topologies, protocols and layers MCQs 1

7th - 11th Grade

10 Qs

quiz-placeholder

Similar activities

BTEC DIT C3 LAB - Device Hardening & Encryption

BTEC DIT C3 LAB - Device Hardening & Encryption

10th - 11th Grade

10 Qs

10 Question Flashback Quiz 1

10 Question Flashback Quiz 1

10th Grade

10 Qs

Cyber Security - Social Engineering

Cyber Security - Social Engineering

10th - 11th Grade

14 Qs

IC3 GS6 Level 1 Domain 2 Lesson 1

IC3 GS6 Level 1 Domain 2 Lesson 1

6th Grade - University

15 Qs

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

11th Grade - University

9 Qs

Information Technology Vocabulary Test

Information Technology Vocabulary Test

9th Grade

13 Qs

Year 9 L6 SECURITY part 1

Year 9 L6 SECURITY part 1

8th Grade

11 Qs

BTEC DIT - 01 Communication Technologies

BTEC DIT - 01 Communication Technologies

10th - 11th Grade

6 Qs

Unit 1.5 Network topologies, protocols and layers MCQs 1

Unit 1.5 Network topologies, protocols and layers MCQs 1

Assessment

Quiz

Computers

7th - 11th Grade

Medium

Created by

Helen McLean

Used 318+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What network has the server placed in the centre and the devices around it? (1-4) 
Ring 
Bus 
Star 
Mesh 

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is a feature of a Mesh Network? (5-6) 
Data can be transmitted from different devices simultaneously. 
Devices are dependent on a central sever. 
The network uses terminators 
The Server is usually based in the middle of the network 

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not an advantage of a Network? (1-4) 
Shared les and resources 
Less vulnerable to hackers 
Data can be shared across a range of users 
User accounts can be created 

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is a disadvantage of WiFi? (1-4) 
You can use it in a range of ‘hard to reach’ locations making users more mobile 
It is simple to join a WiFi network 
It reduces Health & Safety issues by removing wires 
None of them 

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption is? (1-4) 
A secret code used to keep data safe 
A key which is applied to data to scramble it (a) 
A set of numbers used to replace letters in data that is transmitted 
A message that is kept secret 

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Encryption method used on Secure Internet transitions is called? (5-6) 
Public Key Encryption 
Public Code Encrypting 
Public Key Encrypting 
Private Key Encryption 

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption requires a key? (1-4) 
True 
False 

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?