OCR 1.5 Networks 1

OCR 1.5 Networks 1

11th Grade

10 Qs

quiz-placeholder

Similar activities

Data Encryption

Data Encryption

11th Grade

8 Qs

Basic Networking (Y8)

Basic Networking (Y8)

7th Grade - University

10 Qs

BTEC DIT: Revision 1-6

BTEC DIT: Revision 1-6

1st - 12th Grade

11 Qs

Unit 1.3 Wired and Wireless Networks MCQ1

Unit 1.3 Wired and Wireless Networks MCQ1

7th - 11th Grade

10 Qs

Unit 10 AP CSP Advanced

Unit 10 AP CSP Advanced

9th - 12th Grade

10 Qs

BTEC DIT C3 LAB - Data Level Protection 1

BTEC DIT C3 LAB - Data Level Protection 1

10th - 11th Grade

10 Qs

Networks Quiz

Networks Quiz

11th Grade

15 Qs

BTEC L2 Unit 1 Online World 1-8

BTEC L2 Unit 1 Online World 1-8

11th - 12th Grade

15 Qs

OCR 1.5 Networks 1

OCR 1.5 Networks 1

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Luke Yates

Used 87+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question 1: What network has the server placed in the centre and the devices

around it? (1-4)

Ring

Bus

Star

Mesh

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question 2: Which is a feature of a Mesh Network? (5-6)

Data can be transmitted from different devices simultaneously.

Devices are dependent on a central sever.

The network uses terminators

The Server is usually based in the middle of the network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question 3: Which of these is NOT an advantage of a Network? (1-4)

Shared files and resources

Less vulnerable to hackers

Data can be shared across a range of users

User accounts can be created

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question 4: Which is a disadvantage of WiFi? (1-4)

You can use it in a range of ‘hard to reach’ locations making users more mobile

It is simple to join a WiFi network

It reduces Health & Safety issues by removing wires

None of the other answers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question 5: Encryption is? (1-4)

A secret code used to keep data safe

A key which is applied to data to scramble it

A set of numbers used to replace letters in data that is transmitted

A message that is kept secret

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question 6: The Encryption method used on Secure Internet transitions is called?

(5-6)

Public Key Encryption

Public Code Encrypting

Public Key Encrypting

Private Key Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question 7: Encryption requires a key? (1-4)

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?