CS_Activity2.9

CS_Activity2.9

10th Grade

10 Qs

quiz-placeholder

Similar activities

Quiz #2 ETEC 486 | Spr. 16

Quiz #2 ETEC 486 | Spr. 16

KG - University

10 Qs

processing methods

processing methods

10th Grade

11 Qs

Chapter 8 Week 1

Chapter 8 Week 1

9th - 12th Grade

11 Qs

Computer Security

Computer Security

8th - 10th Grade

10 Qs

3rd week g9 summative

3rd week g9 summative

7th - 12th Grade

15 Qs

Computer Basics 2 - CESA

Computer Basics 2 - CESA

7th Grade - University

10 Qs

WAN Sesi 1

WAN Sesi 1

1st Grade - University

10 Qs

CS_Activity2.9

CS_Activity2.9

Assessment

Quiz

Computers

10th Grade

Practice Problem

Hard

Created by

Huma Deshmukh

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by the term ciphertext when used in encryption?

an encryption or decryption algorithm

an encrypted message

a type of session key

another name for plaintext

text following an encryption algorithm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When carrying out asymmetric encryption, which of the following users would keep the private key?

the sender

the receiver

both sender and receiver

all recipients of the message

none of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In encryption, which of the following is the term used to describe the message before it is encrypted?

simpletext

plaintext

notext

ciphertext

firsttext

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is the biggest disadvantage of using symmetric encryption?

it is very complex and time consuming

it is rarely used anymore

the value of the key reads the same in both directions

it only works on computers with older operating systems

there is a security problem when transmitting the encryption key

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is the correct name for a form of encryption in which both the sender and the recipient use the same key to encrypt and decrypt?

symmetric key encryption

asymmetric key encryption

public key encryption

parity bit

parity bit

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What of the following is the final number in a code, which is calculated from all the numbers in the code; its purpose is to find errors in data entry?

parity check

checksum

cyclic redundancy check

parity bit

check digit

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a form of error detection that makes use of a system of acknowledgements and timeouts?

automatic repeat request

echo check

check digit

parity bit

cyclic redundancy check

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?