• 1. 
    Check which is NOT part of Computer Network.

  • Bus Topology
  • Point-to-Point
  • Personal Area Network
  • Both A & B
  • 2. 
    A hybrid topology contains only 1 topology.

  • True
  • False
  • 3. 
    Peer (normal English use)

  • someone at your own level
  • he "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server.
  • a powerful computer which provides services required by any of the clients (computers on the network)
  • the computers which people log on to in order to use the network
  • 4. 
    Where does the computers in Star Topology are connected?

  • Hub
  • Cable
  • Server
  • Router
  • 5. 
    Which network topology uses a backbone to connect all of the computers?

  • Bus
  • Ring
  • Star
  • Both A & B
  • 6. 
    Encryption

  • Changing data so that it can no longer be understood without a decryption(decode) key
  • someone at your own level
  • he "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server.
  • a powerful computer which provides services required by any of the clients (computers on the network)
  • 7. 
    What network has the server placed in the centre and the devices around it?

  • Ring
  • Bus
  • Star
  • Mesh
  • 8. 
    A terminator

  • Makes the network quicker
  • Sends Data Packets
  • Stops data collisions
  • Connects devices to the internet
  • 9. 
    Which do you think is the strongest or the most effective network topologies and why?

  • Bus Topology
  • Tree Topology
  • Mesh Topology
  • Hybrid Topology
  • 10. 
    It is the arrangement of the elements of a communication network.

  • Network Topology
  • Bus Topology
  • Metropolitan Area Network
  • Computer Network
  • 11. 
    Encryption algorithm

  • the formula for encrypting (coding) the plaintext (normal message)
  • the encrypted (coded) message
  • the original message to be encrypted (coded)
  • Changing data so that it can no longer be understood without a decryption(decode) key
  • 12. 
    The internet is the worlds biggest

  • LAN
  • WAN
  • 13. 
    Which network topology is the most common way of setting up a network?

  • Star
  • Ring
  • Bus
  • None of these
  • 14. 
    A router can

  • Forward data packets
  • Absorb signals
  • Repeat signals
  • absorb data packets
  • 15. 
    In a star network

  • Each device is connected to a switch or hub
  • Each device connects to each other
  • Each device is connected in a line
  • Each device is connected to a terminal
  • 16. 
    It covers a wide area which may span across provinces and even a whole country.

  • Metropolitan Area Network
  • Local Area Network
  • Wide Area Network
  • Personal Area Network
  • 17. 
    Cryptanalytic attack

  • figuring out the secret code by clever guessing, maybe by trying to find patterns in the data, by using knowledge of the data.
  • figuring out the secret code by clever guessing, maybe by trying to find patterns in the data, by using knowledge of the data.
  • Every possible key is tried to find the secret code
  • the way to decode the ciphertext (coded message) – typically by finding out the secret key
  • 18. 
    What term describes the physical layout of a network?

  • Topology
  • topping
  • topiology
  • toppology
  • 19. 
    A type of network that is spanned inside a building and operated under single administrative system

  • Point-to-Point
  • Local Area Network
  • Wide Area Network
  • Metropolitan Area Network
  • 20. 
    Peer-to-Peer (P2P) Networks

  • he "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server.
  • a powerful computer which provides services required by any of the clients (computers on the network)
  • the computers which people log on to in order to use the network
  • A computer network in which one centralized, powerful computer is the middle where many less powerful personal computers (called clients) are connected. The clients run programs and access data that are stored on the server
  • 21. 
    Brute-force attack

  • Every possible key is tried to find the secret code
  • the way to decode the ciphertext (coded message) – typically by finding out the secret key
  • same key used for encryption (coding the secret message) and decryption (decoding the secret message)
  • the formula that's used to change the message back to normal
  • 22. 
    Client-server network

  • A computer network in which one centralized, powerful computer is the middle where many less powerful personal computers (called clients) are connected. The clients run programs and access data that are stored on the server
  • figuring out the secret code by clever guessing, maybe by trying to find patterns in the data, by using knowledge of the data.
  • figuring out the secret code by clever guessing, maybe by trying to find patterns in the data, by using knowledge of the data.
  • Every possible key is tried to find the secret code
  • s
Report Question
warning
access_time
  Time