CS_Activity2.9

CS_Activity2.9

10th Grade

10 Qs

quiz-placeholder

Similar activities

Interstate Competition

Interstate Competition

7th - 10th Grade

11 Qs

Learning Checkpoint 3: Primary & Secondary Storage

Learning Checkpoint 3: Primary & Secondary Storage

9th - 10th Grade

15 Qs

Fairy Tales and Middle Ages Vocabulary

Fairy Tales and Middle Ages Vocabulary

10th Grade

14 Qs

4th quarter 2nd summative

4th quarter 2nd summative

10th Grade

14 Qs

Pre-Assessment: ICT 10 Orientation Day

Pre-Assessment: ICT 10 Orientation Day

10th Grade

10 Qs

Coding Quiz

Coding Quiz

6th - 10th Grade

15 Qs

Computer Lab Rules

Computer Lab Rules

9th - 12th Grade

13 Qs

Recap: Introduction to Python

Recap: Introduction to Python

10th Grade

10 Qs

CS_Activity2.9

CS_Activity2.9

Assessment

Quiz

Computers

10th Grade

Practice Problem

Hard

Created by

Huma Deshmukh

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by the term ciphertext when used in encryption?

an encryption or decryption algorithm

an encrypted message

a type of session key

another name for plaintext

text following an encryption algorithm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When carrying out asymmetric encryption, which of the following users would keep the private key?

the sender

the receiver

both sender and receiver

all recipients of the message

none of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In encryption, which of the following is the term used to describe the message before it is encrypted?

simpletext

plaintext

notext

ciphertext

firsttext

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is the biggest disadvantage of using symmetric encryption?

it is very complex and time consuming

it is rarely used anymore

the value of the key reads the same in both directions

it only works on computers with older operating systems

there is a security problem when transmitting the encryption key

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is the correct name for a form of encryption in which both the sender and the recipient use the same key to encrypt and decrypt?

symmetric key encryption

asymmetric key encryption

public key encryption

parity bit

parity bit

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What of the following is the final number in a code, which is calculated from all the numbers in the code; its purpose is to find errors in data entry?

parity check

checksum

cyclic redundancy check

parity bit

check digit

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a form of error detection that makes use of a system of acknowledgements and timeouts?

automatic repeat request

echo check

check digit

parity bit

cyclic redundancy check

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?