Search Header Logo

Vocabulary Review Unit 4

Authored by Carrie Mieras

Computers

9th - 12th Grade

Used 4+ times

Vocabulary Review Unit 4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Big Data

a broad term for datasets so large or complex that traditional data processing applications are inadequate.

a predication made by Gordon Moore in 1965 that computing power will double every 1.5-2 years, it has remained more or less true ever since.

A business/corporate term for a one-page document that summarizes a large issue, topic or plan.

a technique for encryption that shifts the alphabet by some number of characters

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Moore's Law

a predication made by Gordon Moore in 1965 that computing power will double every 1.5-2 years, it has remained more or less true ever since.

a broad term for datasets so large or complex that traditional data processing applications are inadequate.

the generic term for a technique (or algorithm) that performs encryption

When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Caesar Cipher

a technique for encryption that shifts the alphabet by some number of characters

the generic term for a technique (or algorithm) that performs encryption

When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption.

a process that reverses encryption, taking a secret message and reproducing the original plain text

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Cracking encryption

When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption.

a process that reverses encryption, taking a secret message and reproducing the original plain text

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.

a technique for encryption that shifts the alphabet by some number of characters

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.

the generic term for a technique (or algorithm) that performs encryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Random Substitution Cipher

an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.

a technique for encryption that shifts the alphabet by some number of characters

a technique for encryption that shifts the alphabet by some number of characters

When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?