AP CSP BI 5

AP CSP BI 5

9th - 12th Grade

9 Qs

quiz-placeholder

Similar activities

Cybersecurity and Global Impacts _code.org U8

Cybersecurity and Global Impacts _code.org U8

9th Grade

12 Qs

Unit 3 - 4.5.1 Endpoint Protocol and Email Security

Unit 3 - 4.5.1 Endpoint Protocol and Email Security

9th Grade - University

9 Qs

IGCSE Comp Sci -  Security revision

IGCSE Comp Sci - Security revision

9th - 11th Grade

10 Qs

Terms in cyber security

Terms in cyber security

12th Grade

6 Qs

Networks and Devices Review

Networks and Devices Review

10th Grade

14 Qs

Introduction to Cybersecurity Practice Test

Introduction to Cybersecurity Practice Test

11th Grade

12 Qs

Technical Terms - Internet (A-Z) - HTTPS

Technical Terms - Internet (A-Z) - HTTPS

12th Grade

10 Qs

Technical Terms - Internet (A-Z) - SSH

Technical Terms - Internet (A-Z) - SSH

12th Grade

10 Qs

AP CSP BI 5

AP CSP BI 5

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Dana CTA]

Used 73+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The idea that some communities or populations have less access to computing than others, typically due to limitations of Internet speed or computer hardware access.

open access

crowdsourcing

citizen science

digital divide

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A model in which many online users combine efforts to help fund projects, generate ideas, or create goods or services (like Wikipedia).

crowdsourcing

citizen science

Creative Commons

open access

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Crowdsourcing for science! The participation of volunteers from the public in a scientific research project (like collecting rain samples or counting butterflies).

crowdsourcing

citizen science

Creative Commons

open access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information about an individual that can be used to uniquely identify them (directly or indirectly).

PII (Personally identifiable information)

multifactor authentication (MFA)

username

open access

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories (such as knowledge and possession).

encryption

open access

cookie

multifactor authentication (MFA)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of scrambling data to prevent unauthorized access.

encryption

multifactor authentication

Personally identifiable information

open access

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technique for encrypting data where the same key is used to both encrypt and decrypt data.

symmetric encryption

hashing

asymmetric encryption

advanced encryption

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A small amount of text that tracks information about a user visiting a website.

bit

byte

cookie

brownie

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of computer malware that can make copies of itself.

Ddos

rogue access point

virus

phishing