
Vocabulary Review Unit 4
Authored by Carrie Mieras
Computers
9th - 12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Big Data
a broad term for datasets so large or complex that traditional data processing applications are inadequate.
a predication made by Gordon Moore in 1965 that computing power will double every 1.5-2 years, it has remained more or less true ever since.
A business/corporate term for a one-page document that summarizes a large issue, topic or plan.
a technique for encryption that shifts the alphabet by some number of characters
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Moore's Law
a predication made by Gordon Moore in 1965 that computing power will double every 1.5-2 years, it has remained more or less true ever since.
a broad term for datasets so large or complex that traditional data processing applications are inadequate.
the generic term for a technique (or algorithm) that performs encryption
When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Caesar Cipher
a technique for encryption that shifts the alphabet by some number of characters
the generic term for a technique (or algorithm) that performs encryption
When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption.
a process that reverses encryption, taking a secret message and reproducing the original plain text
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Cracking encryption
When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption.
a process that reverses encryption, taking a secret message and reproducing the original plain text
a process of encoding messages to keep them secret, so only "authorized" parties can read it.
an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Decryption
a process that reverses encryption, taking a secret message and reproducing the original plain text
a process of encoding messages to keep them secret, so only "authorized" parties can read it.
an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.
a technique for encryption that shifts the alphabet by some number of characters
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Encryption
a process of encoding messages to keep them secret, so only "authorized" parties can read it.
an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.
the generic term for a technique (or algorithm) that performs encryption
a process that reverses encryption, taking a secret message and reproducing the original plain text
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Random Substitution Cipher
an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.
a technique for encryption that shifts the alphabet by some number of characters
a technique for encryption that shifts the alphabet by some number of characters
When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?