
Computer Science Unit 8 Quiz
Authored by Latisha Whitehead
Computers
9th - 12th Grade
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
_________ is a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources.
2.
DRAG AND DROP QUESTION
1 min • 1 pt
A wireless access point that gives unauthorized access to secure networks. (a)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a process that reverses encryption, taking a secret message and reproducing the original plain text?
Decryption
trojan horse
Multi-Factor Authentication
iCloud
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
_____________ is a process of encoding messages to keep them secret, so only "authorized" parties can read it.
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
_______ is information about an individual that identifies, links, relates, or describes them.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Use your Caesar Cipher Wheel (SHIFT 3) to decode the following: JR FDUGV
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Use your Caesar Cipher Wheel (SHIFT 2) to decode the following: EQORWVGT UEKGPEG
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?