
IBA Chapter 8B
Authored by George Jenness
Computers
8th - 12th Grade
Used 122+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the most common method for spreading viruses?
Swapping disks or drives
Opening attachments
Installing programs
Downloading files
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You receive an unexpected e-mail with an attachment from a co-worker. You call the co-worker to ask if she sent you an e-mail message with an attachment. She recalls that she sent several e-mails with attachments earlier that day. Which of the following is your co-worker's best response to your question?
She should ask you to open the attachment and describe its contents.
She should ask you to forward the e-mail to her so she can open the attachment and check it.
She should ask you to forward the e-mail to your company's management.
She should ask you to read her the e-mail message including the full name of the attachment and its extension.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement best describes symmetric-key encryption?
An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages
An encryption method in which two separate keys -- a private key and a public key -- are used to encrypt and decrypt a message
An encryption method in which the same key is used to encrypt and decrypt a message
essage
D
An encryption method in which a key is required to encrypt data for storage and to verify its integrity
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term is used to describe the process that converts data into an unreadable form of text?
Certification
Encryption
Authentication
Decryption
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The level of secrecy offered by encryption is dependent on:
whether or not the data you are encrypting is licensed.
the type of encryption used and the size of the key.
the transmission speed used to encrypt or decrypt data.
whether or not the data you are encrypting is copyrighted.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement best describes hash encryption?
An encryption method in which a key is required to encrypt data for storage and verify its integrity
An encryption method in which two separate keys -- a private key and a public key -- are used to encrypt and decrypt a message
An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages
An encryption method in which the same key is used to encrypt and decrypt a message
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term is used to describe an application that installs hidden services on a system that enables the attacker to monitor and control the operation of the system?
Trojan
Worm
Virus
Illicit server
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
12 questions
OCR Internet Technologies
Quiz
•
10th - 11th Grade
20 questions
Browser dan CMS
Quiz
•
7th - 9th Grade
20 questions
Skill Competition Quiz 2024
Quiz
•
10th Grade - University
12 questions
1.2.4. Types of Programming Language
Quiz
•
12th Grade
11 questions
Types of Mass Media
Quiz
•
10th Grade - Professi...
20 questions
CSS - Operating System
Quiz
•
11th Grade
20 questions
Pemetaan alamat melalui subneting
Quiz
•
10th Grade
12 questions
BÀI 2: TRÍ TUỆ NHÂN TAO TRONG KHOA HỌC VÀ CUỘC SÔNG
Quiz
•
12th Grade
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
10 questions
Exploring Valentine's Day with Charlie Brown
Interactive video
•
6th - 10th Grade
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
20 questions
El Verbo IR Practice
Quiz
•
9th Grade
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
10 questions
Valentine's Day History and Traditions
Interactive video
•
6th - 10th Grade
20 questions
Laws of Exponents
Quiz
•
8th Grade
11 questions
Valentines Day
Quiz
•
6th - 8th Grade
20 questions
Graphing Inequalities on a Number Line
Quiz
•
6th - 9th Grade