Networks and Internet

Networks and Internet

9th - 10th Grade

15 Qs

quiz-placeholder

Similar activities

BTEC Tech Award Digital information technology (Component 1)

BTEC Tech Award Digital information technology (Component 1)

10th Grade

17 Qs

AP CSP Internet

AP CSP Internet

9th - 12th Grade

20 Qs

INTERNET

INTERNET

7th - 9th Grade

20 Qs

Client/Server side

Client/Server side

7th - 12th Grade

10 Qs

Personal Data

Personal Data

9th - 11th Grade

15 Qs

6.5 Networking Protocols

6.5 Networking Protocols

10th - 12th Grade

13 Qs

HTTP protocol and Privacy on the web

HTTP protocol and Privacy on the web

9th - 12th Grade

12 Qs

Security Risks

Security Risks

10th Grade

15 Qs

Networks and Internet

Networks and Internet

Assessment

Quiz

Computers

9th - 10th Grade

Hard

Created by

M Holloman

Used 43+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best explains what happens when a new device is connected to the Internet?

A packet number is assigned to the device.

An Internet Protocol (IP) address is assigned to the device.

A device driver is assigned to the device.

A Web site is assigned to the device.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following activities poses the greatest personal cybersecurity risk?

Checking a bank account on a bank’s website that uses HTTPS for secure communication

Making a purchase on an online store that uses public key encryption to transmit information

Paying a bill using a secure online electronic payment system

Purchasing a Baby Yoda doll by emailing a credit card number to the couch owner

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is LEAST likely to indicate a phishing attack?

An email indicates you have won money, and asks you to enter your bank account number so the money can be transferred

An email from your water utility company asks you to enter your date of birth and social security number for verification purposes.

An email from your bank asks you to call the number on your card to verify a transaction.

An email from Fortnite.com that asks that you click on a link to reset your password.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered an unethical use of computer resources?

Searching online for an electronic version of a textbook

Searching online for the answers to CodeHS exercises and quizzes

Downloading file sharing software on your home computer

Purchasing an app from an app store and downloading it directly to a mobile device

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the Digital Millennium Copyright Act?

To criminalize plagiarism on the Internet.

To criminalize the act of circumventing, or getting around, access controls that block access to copyrighted works.

To allow for open source software on the Internet.

To make all content on the Internet free for everyone to use.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?

about.example.com

example.com/about.html

example.com.about

example.org

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent back to the user?

The file is broken into packets and sent over a network. The user’s browser must request each packet, in order, until all packets are received.

The server repeatedly attempts to connect directly to the user’s computer until a connection is made. Once the connection is made, the entire file is sent.

The server attempts to connect directly to the user’s computer. If the connection is successful, the entire file is sent at once. If the connection is unsuccessful, an error message is sent to the user.

The file is broken into packets and sent over a network. The packets must be reassembled by the user’s computer when they are received. If any packets are missing, the browser re-requests the missing packets.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?