Unit 1.3 Networks topologies modes

Unit 1.3 Networks topologies modes

7th - 11th Grade

10 Qs

quiz-placeholder

Similar activities

IGCSE Comp Sci -  Security revision

IGCSE Comp Sci - Security revision

9th - 11th Grade

10 Qs

Networks and Devices Review

Networks and Devices Review

10th Grade

14 Qs

Data Transmission Methods Quiz

Data Transmission Methods Quiz

9th Grade

10 Qs

1.2.5 - Starter Task/Operating Systems

1.2.5 - Starter Task/Operating Systems

10th Grade

13 Qs

Networks, WiFi and Encryption

Networks, WiFi and Encryption

9th - 10th Grade

10 Qs

OSI Layer 4: Transport

OSI Layer 4: Transport

10th Grade

10 Qs

1.5 Network Protocols & Toplogy

1.5 Network Protocols & Toplogy

10th Grade

12 Qs

Principles of IT Vocabulary A-J

Principles of IT Vocabulary A-J

7th Grade - University

10 Qs

Unit 1.3 Networks topologies modes

Unit 1.3 Networks topologies modes

Assessment

Quiz

Computers

7th - 11th Grade

Medium

Created by

Helen McLean

Used 74+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What network has the server placed in the centre and the devices around it? (1-4)
Ring
Bus
Star
Mesh

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is a feature of a Mesh Network? (5-6)
Data can be transmitted from different devices simultaneously.
Devices are dependent on a central sever.
The network uses terminators
The Server is usually based in the middle of the network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not an advantage of a Network? (1-4)
Shared files and resources
Less vulnerable to hackers
Data can be shared across a range of users
User accounts can be created

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is a disadvantage of WiFi? (1-4)
You can use it in a range of ‘hard to reach’ locations making users more mobile
It is simple to join a WiFi network
It is more cost effective
None of them

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption is? (1-4)
A secret code used to keep data safe
A key which is applied to data to scramble it (a)
A set of numbers used to replace letters in data that is transmitted
A message that is kept secret

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Encryption method used on Secure Internet transitions is called?(5-6)
Public Key Encryption
Public Code Encrypting
Public Key Encrypting
Private Key Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption requires a key? (1-4)
True
False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?