placeholder image to represent content

Reading Test #2

Quiz by Taylor Wiggins

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
50 questions
Show answers
  • Q1
    There are federal laws against cyberstalking.
    false
    true
    30s
  • Q2
    A violation of the holder's rights is known as copyright ________.
    violation
    abuse
    defrauding
    infringement
    30s
  • Q3
    What is a popular copyleft license used for software?
    General Public License (GNU(
    Software Copy License (SCL)
    NonCommerical (NC)
    Creative Commons (CC)
    30s
  • Q4
    Catfishing is ________.
    creating fake profiles on a dating site and developing a fabricated online and phone relationship
    posting embarrassing pictures, rumors, or videos via social media
    posting inflammatory remarks to solicit angry and negative responses
    bombarding someone with harassing messages
    30s
  • Q5
    The Apple logo would be considered a(n) ________.
    trademark
    service mark
    copyright
    patent
    30s
  • Q6
    A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.
    switch
    node
    network
    broadband
    30s
  • Q7
    One method of cyberbullying involves spreading rumors about another person.
    false
    true
    30s
  • Q8
    Which transmission medium transmits data the fastest?
    twisted-pair cable
    coaxial cable
    wireless
    fiber-optic cable
    30s
  • Q9
    ________ is the actual speed of data transfer that is achieved between two nodes on a network and is always less than or equal to the data transfer rate.
    bandwidth
    broadband
    throuhput
    benchmark
    30s
  • Q10
    Sharing files is a benefit of a network.
    true
    false
    30s
  • Q11
    For the nodes on a network to communicate with each other and access the network, each node needs a ________.
    network adapter
    DSL modem
    router
    hub
    30s
  • Q12
    Wireless network devices use ________ to communicate with each other.
    satellites
    fiber optics
    radio waves
    DSL
    30s
  • Q13
    Data are sent through a network in bundles called ________.
    packets
    packages
    pouches
    nodes
    30s
  • Q14
    Client/server networks are controlled by a central server that runs specialized software called a(n) ________.
    multipersonnel operating system (MPOS)
    central server operating system (CCOS)
    network operating system (NOS)
    central operating system (COS)
    30s
  • Q15
    On a network, a(n) ________ helps prevent data packets from colliding with each other.
    switch
    access point
    adapter
    hub
    30s

Teachers give this quiz to your class