Networks, WiFi and Encryption

Networks, WiFi and Encryption

9th - 10th Grade

10 Qs

quiz-placeholder

Similar activities

5.3 - Web Browsers

5.3 - Web Browsers

10th Grade

10 Qs

Networking Basics

Networking Basics

9th Grade

10 Qs

1.4 Wired and Wireless Networks

1.4 Wired and Wireless Networks

10th - 11th Grade

13 Qs

AQA Computer Science GCSE Revision - Computer Networks

AQA Computer Science GCSE Revision - Computer Networks

10th - 12th Grade

15 Qs

JARINGAN KOMPUTER

JARINGAN KOMPUTER

10th Grade

15 Qs

Communication and the Internet; Edexcel GCSE Computer Science

Communication and the Internet; Edexcel GCSE Computer Science

10th - 12th Grade

10 Qs

3.5 - Fundamentals of Computer Networks

3.5 - Fundamentals of Computer Networks

10th Grade

15 Qs

Teknik Komputer dan Jaringan

Teknik Komputer dan Jaringan

10th - 12th Grade

11 Qs

Networks, WiFi and Encryption

Networks, WiFi and Encryption

Assessment

Quiz

Computers

9th - 10th Grade

Medium

Created by

Graham Long

Used 263+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What network has a server placed in the centre and the devices around it?

Ring

Bus

Star

Mesh

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is a feature of a Mesh Network?

Data can be transmitted from different devices simultaneously

Devices are dependent on a central server

The network uses terminators

The server is usually based in the middle of the network

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of these is not an advantage of a network?

Shared files and resources

Less vulnerable to hackers

Data can be shared across a range of users

User accounts can be created

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is a disadvantage of WiFi

You can use it in a range of 'hard to reach' locations making users more mobile

It is simple to join a WiFi network

It reduces Health and Safety issues by removing wires

None of them

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption

The secret code used to keep data safe

A key which is applied to data to scramble it

The set of numbers used to replace letters in data that is transmitted

A message that is kept secret

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The Encryption method used on Secure Internet transitions is called?

Public Key Encryption

Public Code Encrypting

Public Key Encrypting

Private Key Encryption

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Encryption requires a key?

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?