phần còn lại

phần còn lại

Professional Development

44 Qs

quiz-placeholder

Similar activities

INVENTORY MANAGEMENT QUIZ 2

INVENTORY MANAGEMENT QUIZ 2

Professional Development

45 Qs

AZ-900 Quiz

AZ-900 Quiz

Professional Development

40 Qs

JP Certification 2021

JP Certification 2021

Professional Development

40 Qs

Test 5

Test 5

Professional Development

40 Qs

CPC Official Study Guide 2023 Ch 20

CPC Official Study Guide 2023 Ch 20

Professional Development

40 Qs

Computer Basics, Valentine's Day and February Trivia 2024

Computer Basics, Valentine's Day and February Trivia 2024

Professional Development

39 Qs

Jeep Wrangler

Jeep Wrangler

Professional Development

40 Qs

Bali Destination assessment

Bali Destination assessment

Professional Development

45 Qs

phần còn lại

phần còn lại

Assessment

Quiz

Other

Professional Development

Hard

Created by

Phuong Do

FREE Resource

44 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Find the Z10's reversible value set

1,3,5,7,9

3,7,9

1,3,7,9

5,7,9

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following numbers is equal to 9 when modulo is equal to 5

-12

-10

-11

-13

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following numbers is equal to -132 when modulo is equal to 5

-12

-13

-11

-10

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many reversible elements does episode Z13 have?

12

11

10

13

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Public key certificates are used for

Applications in the block code system

Provide a public key

Provide the secret key

Use a private public key

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In public-key cryptography, what is the public key used for?

decryption and signature generation

decryption and signature generation

decryption and signature generation

Encryption and signature generation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the following code systems, the public encryption system is the code system

Lock only people in the transmission group

The key is conventionally for the sender and the receiver

Keyless encrypted messages

The key is divided into 2 parts, 1 part is made public and the rest is kept secret

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?