Computer Science 1.5 -  Topologies, Layers and Protocols

Computer Science 1.5 - Topologies, Layers and Protocols

9th - 11th Grade

19 Qs

quiz-placeholder

Similar activities

Informatika Kelas 5 Bab 2

Informatika Kelas 5 Bab 2

5th Grade - University

19 Qs

PRUEBA FINAL COMPUTACION

PRUEBA FINAL COMPUTACION

1st Grade - University

18 Qs

TIN 11 BÀI 11 KIỂU MẢNG

TIN 11 BÀI 11 KIỂU MẢNG

11th Grade

18 Qs

Начала программирования на языке Паскаль

Начала программирования на языке Паскаль

8th - 11th Grade

15 Qs

Online Platform Block Q

Online Platform Block Q

11th - 12th Grade

20 Qs

Quis Internet

Quis Internet

11th Grade

20 Qs

โปรแกรมตารางงาน ทดสอบปลายภาค ชุดที่1

โปรแกรมตารางงาน ทดสอบปลายภาค ชุดที่1

10th - 12th Grade

20 Qs

11° Evaluación bimestral de informática

11° Evaluación bimestral de informática

11th Grade

15 Qs

Computer Science 1.5 -  Topologies, Layers and Protocols

Computer Science 1.5 - Topologies, Layers and Protocols

Assessment

Quiz

Computers

9th - 11th Grade

Practice Problem

Medium

Created by

Graham Long

Used 136+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What network has the server placed in the centre and the devices around it? (1-4)

Bus
Ring
Star
Mesh

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which is a feature of a Mesh Network? (5-6)

The Server is usually based in the middle of the network
Data can be transmitted from different devices simultaneously.
Devices are dependent on a central server.
Network uses terminators

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of these is not an advantage of a Network? (1-4)

Shared files and resources
Data can be shared across a range of users
Less vulnerable to hackers
User accounts can be created

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which is a disadvantage of WiFi? (1-4)

It is simple to join a WiFi network
You can use it in a range of ‘hard to reach’ locations making users more mobile
It is more cost effective
None of them
It reduces Health & Safety issues by removing wires

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Encryption is? (1-4)

A secret code used to keep data safe
A key which is applied to data to scramble it
A message that is kept secret
A set of numbers used to replace letters in data that is transmitted

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The Encryption method used on Secure Internet transitions is called?(5-6)

Public Key Encrypting
Private Key Encryption
Public Key Encryption
Public Code Encrypting

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Encryption requires a key? (1-4)

false
true

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?