
Computer Science Review
Authored by Charles Martinez
Computers
9th - 12th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is LEAST likely to indicate a phishing attack?
An e-mail from your bank asks you to call the number on your card to verify a transaction
An e-mail from a merchant asks that you click on a link to reset your password
An e-mail from a utility company asks you to enter your date of birth and social security number for verification purposes
An e-mail indicates that you have won a large sum of money and asks you to enter your bank account number so that the money can be transferred to you
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following activities poses the greatest personal cybersecurity risk?
Making a purchase at an online store that uses public key encryption to transmit credit card information
Paying a bill using a secure electronic payment system
Reserving a hotel room by e-mailing a credit card number to a hotel
Withdrawing money from a bank account using an automated teller machine (ATM)
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following best describes a Distributed Denial of Service (DDoS) attack?
An attempt by a country to deny its citizens access to the Internet
An attempt to deny users access to a Web site's resources by flooding the Web site with requests from multiple systems
An attempt by one user to deny service to another user by posting material on a social network
An attempt by a user of the Internet to get private information from a secure database
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A program is expressed in a programming language. Which of the following is true of the program?
The program can also be expressed as binary code, but will be more easily understood by humans when expressed in a higher-level programming language.
The program can also be expressed as binary code, which will reduce the likelihood of errors.
The program cannot be expressed as binary code, because binary code can only be used to represent data.
Some parts of the program can be expressed as binary code, but operations must be expressed using a higher-level programming language.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following statements best describes the properties of public key encryption?
Public key encryption is an encryption method which relies on separate keys for encrypting and decrypting information.
Public key encryption is a highly secure encryption scheme that in which a single key is used by both the sender and receiver of the message.
Public key encryption makes use of certain types of problems which are easier for humans to solve than computers.
Public key encryption makes use of mathematical problems which no algorithm can be used to solve.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A flowchart is a way to visually represent an algorithm. The flowchart above uses the building blocks from the table above.
Which of the following statements best describes the behavior of the algorithm depicted in the flowchart?
Assume a always starts greater than b.
It displays the sum of a and b.
It displays the difference between a and b.
It displays the product of a and b
It runs in an infinite loop.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Consider the process of encoding and decoding a message using the following Caesar cipher encoding scheme in which the plaintext and ciphertext alphabets are offset by four positions, as shown above.
Which of the following encoded ciphertext strings decodes to an original plaintext message of “secret”?
ersecr
wigvix
kwujwl
oaynap
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
ICT as Social Change
Quiz
•
12th Grade
10 questions
Word 2016
Quiz
•
10th Grade
10 questions
C# lesson10
Quiz
•
1st - 10th Grade
15 questions
Excel - basic
Quiz
•
9th Grade
10 questions
Konsep Routing
Quiz
•
1st - 10th Grade
15 questions
Cyber Security Homework 1
Quiz
•
7th - 9th Grade
10 questions
Паскаль. Основные команды
Quiz
•
8th - 11th Grade
15 questions
Identidad Corporativa
Quiz
•
10th Grade
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
10 questions
Exploring Valentine's Day with Charlie Brown
Interactive video
•
6th - 10th Grade
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
20 questions
El Verbo IR Practice
Quiz
•
9th Grade
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
10 questions
Valentine's Day History and Traditions
Interactive video
•
6th - 10th Grade
20 questions
Graphing Inequalities on a Number Line
Quiz
•
6th - 9th Grade
20 questions
Exponent Properties
Quiz
•
9th Grade
21 questions
Presidents Day Trivia
Quiz
•
6th - 12th Grade