Vocabulary Review Unit 4

Vocabulary Review Unit 4

9th - 12th Grade

12 Qs

quiz-placeholder

Similar activities

2025 python class first quiz

2025 python class first quiz

9th Grade - University

10 Qs

Review for Midterm Test ICT 3

Review for Midterm Test ICT 3

1st - 11th Grade

15 Qs

General Ict Quiz

General Ict Quiz

4th Grade - University

15 Qs

UsoDiWord_01_Generale

UsoDiWord_01_Generale

6th - 12th Grade

17 Qs

OS Essentials Chp11: Windows Configuration Quiz on 11.5 to 11.7

OS Essentials Chp11: Windows Configuration Quiz on 11.5 to 11.7

11th - 12th Grade

10 Qs

Taller Cultura Digital

Taller Cultura Digital

10th Grade

10 Qs

Sklopovlje i programska podrška

Sklopovlje i programska podrška

10th Grade

10 Qs

HTML

HTML

KG - 9th Grade

11 Qs

Vocabulary Review Unit 4

Vocabulary Review Unit 4

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Carrie Mieras

Used 4+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Big Data

a broad term for datasets so large or complex that traditional data processing applications are inadequate.

a predication made by Gordon Moore in 1965 that computing power will double every 1.5-2 years, it has remained more or less true ever since.

A business/corporate term for a one-page document that summarizes a large issue, topic or plan.

a technique for encryption that shifts the alphabet by some number of characters

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Moore's Law

a predication made by Gordon Moore in 1965 that computing power will double every 1.5-2 years, it has remained more or less true ever since.

a broad term for datasets so large or complex that traditional data processing applications are inadequate.

the generic term for a technique (or algorithm) that performs encryption

When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Caesar Cipher

a technique for encryption that shifts the alphabet by some number of characters

the generic term for a technique (or algorithm) that performs encryption

When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption.

a process that reverses encryption, taking a secret message and reproducing the original plain text

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Cracking encryption

When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption.

a process that reverses encryption, taking a secret message and reproducing the original plain text

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.

a technique for encryption that shifts the alphabet by some number of characters

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.

the generic term for a technique (or algorithm) that performs encryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Random Substitution Cipher

an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.

a technique for encryption that shifts the alphabet by some number of characters

a technique for encryption that shifts the alphabet by some number of characters

When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?