1.5 Network Topologies, Protocols & Layers  MCQs L1

1.5 Network Topologies, Protocols & Layers MCQs L1

10th - 11th Grade

10 Qs

quiz-placeholder

Similar activities

Networking Recall

Networking Recall

11th Grade

10 Qs

Web Components

Web Components

KG - University

12 Qs

Peer-to-peer & Client-server

Peer-to-peer & Client-server

11th Grade

10 Qs

OCR ALevel CS: 1.3.2 Networks

OCR ALevel CS: 1.3.2 Networks

10th - 12th Grade

13 Qs

1.4.3 Client-Server and Peer to Peer Networks

1.4.3 Client-Server and Peer to Peer Networks

10th - 11th Grade

10 Qs

1.5 Network topologies & Layers

1.5 Network topologies & Layers

11th Grade

13 Qs

CIW

CIW

9th - 12th Grade

15 Qs

Activity 2.1.2 Encyrption: Keep it Confidential

Activity 2.1.2 Encyrption: Keep it Confidential

9th - 12th Grade

11 Qs

1.5 Network Topologies, Protocols & Layers  MCQs L1

1.5 Network Topologies, Protocols & Layers MCQs L1

Assessment

Quiz

Computers

10th - 11th Grade

Medium

Created by

Matt Fearn

Used 121+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What network has the server placed in the centre and the devices around it?
Ring
Bus
Star
Mesh

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is a feature of a Mesh Network?
Data can be transmitted from different devices simultaneously
Devices are dependent on a central server
The network uses terminators
The Server is usually based in the middle of the network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not an advantage of a Network?
Shared files and resources
Less vulnerable to hackers 
Data can be shared across a range of users
User accounts can be created

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is a disadvantage of WiFi?
You can use it in a range of 'hard to reach' locations making users more mobile 
It is simple to join a WiFi network
It reduces Health & Safety issues by removing wires
None of them

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption is?
A secret code used to keep data safe
A key which is applied to data to scramble it
A set of numbers used to replace letters in data that is transmitted
A message that is kept secret

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Encryption method used on Secure Internet transition is called?
Public Key Encryption
Public Code Encrypting
Public Key Encrypting 
Private Key Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption requires a key?
True
False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?