Y8 Codes & codebreaking #1

Y8 Codes & codebreaking #1

8th Grade

10 Qs

quiz-placeholder

Similar activities

Bebras Colage B

Bebras Colage B

7th - 12th Grade

15 Qs

encryption

encryption

8th Grade

8 Qs

Bebras Junior Challenge Problems (Difficult)

Bebras Junior Challenge Problems (Difficult)

6th - 8th Grade

15 Qs

Ciphers and Encryption

Ciphers and Encryption

7th - 9th Grade

7 Qs

MOAC Excel 2016 Lesson 01

MOAC Excel 2016 Lesson 01

8th - 12th Grade

10 Qs

Unit 1: Cryptograpy

Unit 1: Cryptograpy

8th Grade

14 Qs

Code De Joy (Break Codes Using the Cesar Cipher)

Code De Joy (Break Codes Using the Cesar Cipher)

KG - 8th Grade

5 Qs

Google Sheets

Google Sheets

7th - 8th Grade

14 Qs

Y8 Codes & codebreaking #1

Y8 Codes & codebreaking #1

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Jon Bridgeman

Used 21+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There were no vowels in Engyption heiroglyphics

TRUE

FALSE

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cryptography and codebreaking, the original message - before being encoded - is called:

Simple text

Plaintext

Cipher text

Codetext

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What information would be needed to create a key grid to decode a rail fence cipher?

The number of letters

The number of rows

The number of letters and the number of rows

The number of columns

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Humans have been using codes for over...

100 years

1000 years

2000 years

3000 years

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which type or types of code can be used to describe heiroglyphics?

(Choose 1 - 4 anwers)

Pictograms

Transposition cipher

Substitution cipher

Symbol replacement cipher

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

The heiroglyphics in this image are written...

From left to right

From right to left

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Persina Scytale is an example of..

A pictogram

A substitutuion cipher

A transposition cipher

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?