Computer Science 1.5 -  Topologies, Layers and Protocols

Computer Science 1.5 - Topologies, Layers and Protocols

9th - 11th Grade

19 Qs

quiz-placeholder

Similar activities

 KOMPUTER dan JARINGAN

KOMPUTER dan JARINGAN

1st - 10th Grade

20 Qs

Networking Revision - Part 1

Networking Revision - Part 1

11th Grade

16 Qs

GCSE Networking Essentials Terms Retrieval 3/4

GCSE Networking Essentials Terms Retrieval 3/4

10th Grade

20 Qs

Starter 5

Starter 5

9th Grade

15 Qs

IT Fundamentals

IT Fundamentals

9th - 12th Grade

17 Qs

JKI - 3

JKI - 3

10th Grade

20 Qs

OCR GCSE - Protocols

OCR GCSE - Protocols

11th - 12th Grade

16 Qs

Jaringan Dasar TKJ

Jaringan Dasar TKJ

10th - 11th Grade

20 Qs

Computer Science 1.5 -  Topologies, Layers and Protocols

Computer Science 1.5 - Topologies, Layers and Protocols

Assessment

Quiz

Computers

9th - 11th Grade

Medium

Created by

Graham Long

Used 136+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What network has the server placed in the centre and the devices around it? (1-4)
Bus
Ring
Star
Mesh

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which is a feature of a Mesh Network? (5-6)
The Server is usually based in the middle of the network
Data can be transmitted from different devices simultaneously.
Devices are dependent on a central server.
Network uses terminators

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of these is not an advantage of a Network? (1-4)
Shared files and resources
Data can be shared across a range of users
Less vulnerable to hackers
User accounts can be created

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which is a disadvantage of WiFi? (1-4)
It is simple to join a WiFi network
You can use it in a range of ‘hard to reach’ locations making users more mobile
It is more cost effective
None of them
It reduces Health & Safety issues by removing wires

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Encryption is? (1-4)
A secret code used to keep data safe
A key which is applied to data to scramble it
A message that is kept secret
A set of numbers used to replace letters in data that is transmitted

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The Encryption method used on Secure Internet transitions is called?(5-6)
Public Key Encrypting
Private Key Encryption
Public Key Encryption
Public Code Encrypting

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Encryption requires a key? (1-4)
false
true

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?