AP CSP BI 5

AP CSP BI 5

9th - 12th Grade

9 Qs

quiz-placeholder

Similar activities

Technical Terms - Internet (A-Z) - CIFS

Technical Terms - Internet (A-Z) - CIFS

12th Grade

10 Qs

Computer Safety and Security

Computer Safety and Security

9th Grade

13 Qs

CSP I: Unit 8: Lesson 9: Protecting Data Part 2

CSP I: Unit 8: Lesson 9: Protecting Data Part 2

9th Grade

12 Qs

AP Computer Science Principles - Unit 10: Cybersecurity

AP Computer Science Principles - Unit 10: Cybersecurity

9th - 12th Grade

10 Qs

10.3 Authentication

10.3 Authentication

9th - 12th Grade

11 Qs

NETESS 2.0 MODULE 16 QUIZ - Wireless Security Measures

NETESS 2.0 MODULE 16 QUIZ - Wireless Security Measures

12th Grade

14 Qs

Data

Data

11th Grade

10 Qs

Information Security

Information Security

9th Grade

9 Qs

AP CSP BI 5

AP CSP BI 5

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Dana CTA]

Used 73+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The idea that some communities or populations have less access to computing than others, typically due to limitations of Internet speed or computer hardware access.

open access

crowdsourcing

citizen science

digital divide

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A model in which many online users combine efforts to help fund projects, generate ideas, or create goods or services (like Wikipedia).

crowdsourcing

citizen science

Creative Commons

open access

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Crowdsourcing for science! The participation of volunteers from the public in a scientific research project (like collecting rain samples or counting butterflies).

crowdsourcing

citizen science

Creative Commons

open access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information about an individual that can be used to uniquely identify them (directly or indirectly).

PII (Personally identifiable information)

multifactor authentication (MFA)

username

open access

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories (such as knowledge and possession).

encryption

open access

cookie

multifactor authentication (MFA)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of scrambling data to prevent unauthorized access.

encryption

multifactor authentication

Personally identifiable information

open access

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technique for encrypting data where the same key is used to both encrypt and decrypt data.

symmetric encryption

hashing

asymmetric encryption

advanced encryption

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A small amount of text that tracks information about a user visiting a website.

bit

byte

cookie

brownie

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of computer malware that can make copies of itself.

Ddos

rogue access point

virus

phishing