Search Header Logo

lakshya and nirvan

Authored by bdzxj sdnklv

Computers

8th Grade

Used 1+ times

lakshya and nirvan
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 20 pts

i am a security system that keeps track of filters and outgoing & incoming data through the network

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or false? Programming an encryption algorithm is much quicker and easier than encrypting one message.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5.Which one of the following is actually considered as the first computer virus?

Sasser

Blaster

Creeper

Both A and C

4.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

what does the word cyber stand for

hacking

computer related

antivirus

viruses

5.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

we need to ______ our data

scan

secure

protect

safe keep

6.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

Kiara was working on a ppt when she got a mail saying someone logged in to her account and deleted all her projects.

what kind of attack did Kiara face

password

hacker

virus

pishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

The VLOOKUP function is used to create a spreadsheet that encrypts and decrypts messages using the Atbash Cipher.

The lookup_value should be the cell reference(s) for the

Ciphertext character

plaintext character

atbash table

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?