What are some of the functions of a network? Select all that apply.
Question 2
2.
What number represents 5 seconds on a microbit
Question 3
3.
What character is missing from this line of code?
Question 4
4.
Read the text below, type the missing works in the answer box, ensure the words are seperaed by a comma.
Radio communication needs two devices:
the ____________________ takes a message, encodes it, and sends it over radio waves
the receiver receives the radio waves and decodes the message
Question 5
5.
with micropython how do you turn the radio on?
Question 6
6.
RE-write this line correctly:
while true:
Question 7
7.
Type the single missing word below:
We _______________ by putting spaces at the beginning of the line. Indentation tells Python that the code is inside the loop. Make sure you use the same number of spaces for indenting each line inside the loop.
Question 8
8.
What is missing in the code below?
while True
message = radio.receive()
if message
display.scroll(message)
Question 9
9.
the code below is attempting to configure a microbit to recieve code on a certian channel, what word is missing?
radio.on()
radio.config(=20)
Question 10
10.
Select the TRUE Statments.
Context: Let's talk security. When we send messages on a micro:bit channel, any device also on that channel can receive the information
Question 11
11.
Read the text then select the false statement below:
What are some of the risks associated with connecting to free wifi networks?
Network security deals with the idea of securing digital communications so that only authorised and intended participants see the contents of the communication
Computer networks form when two or more computing devices are connected, and this gives us benefits such as:
sharing resources such as printers
sharing data between devices and users
backing up data so that important work isn't lost.
Any information sent on a micro:bit network is safe and can not be read by any other device on the network
Network snooping refers to listening in on a conversation
Cyber criminals often have special software kits and devices which allow them to snoop in on data transmissions, thus getting access to sensitive information such as usernames and passwords.