Computer Science Unit 8 Quiz

Computer Science Unit 8 Quiz

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

Unit 10 AP CSP Advanced

Unit 10 AP CSP Advanced

9th - 12th Grade

10 Qs

The Internet: Encryption & Public Keys (watch vid first)

The Internet: Encryption & Public Keys (watch vid first)

10th Grade

13 Qs

Cryptography Basics Quiz

Cryptography Basics Quiz

10th Grade

10 Qs

Cyber Security Solutions

Cyber Security Solutions

9th - 12th Grade

11 Qs

Computer Security

Computer Security

8th - 10th Grade

10 Qs

Unit 3 - 2.4.3 -Trojans, Backdoors, and RATs

Unit 3 - 2.4.3 -Trojans, Backdoors, and RATs

12th Grade

10 Qs

BTEC DIT: Revision 1-6

BTEC DIT: Revision 1-6

1st - 12th Grade

11 Qs

Data Encryption

Data Encryption

11th Grade

8 Qs

Computer Science Unit 8 Quiz

Computer Science Unit 8 Quiz

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Latisha Whitehead

Used 6+ times

FREE Resource

8 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

_________ is a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources.

2.

DRAG AND DROP QUESTION

1 min • 1 pt

A wireless access point that gives unauthorized access to secure networks.​ (a)  

Rogue Access Point
Computing Innovation
Keylogging

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a process that reverses encryption, taking a secret message and reproducing the original plain text?

Decryption

trojan horse

Multi-Factor Authentication

iCloud

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

_____________ is a process of encoding messages to keep them secret, so only "authorized" parties can read it.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

_______ is information about an individual that identifies, links, relates, or describes them.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Use your Caesar Cipher Wheel (SHIFT 3) to decode the following: JR FDUGV

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Use your Caesar Cipher Wheel (SHIFT 2) to decode the following: EQORWVGT UEKGPEG

8.

MATCH QUESTION

1 min • 1 pt

Match the following words with the correct definition.

Malware

Software intended to damage a computer system.

Multi-factor Authentication

The use of a program to record every keystroke made by a computer user.

Symmetric Key Encryption

Includes a program as an integral part of its function.

Keylogging

A system that requires at least two steps to unlock protected information.

Computing Innovation

Includes one key for both encryption and decryption.