2ND TERM STEAM CAT 2025

2ND TERM STEAM CAT 2025

5th Grade

20 Qs

quiz-placeholder

Similar activities

S3 What do you remember from S2?

S3 What do you remember from S2?

KG - University

18 Qs

Year 6C copy

Year 6C copy

5th Grade

15 Qs

COMPUTACION

COMPUTACION

5th Grade

20 Qs

Ulangan harian Informatika

Ulangan harian Informatika

1st Grade - University

20 Qs

Web Design- HTML Review

Web Design- HTML Review

KG - University

17 Qs

HTML

HTML

1st - 5th Grade

20 Qs

HTML Review

HTML Review

5th - 8th Grade

15 Qs

CIT4304-PRELIM EXAM

CIT4304-PRELIM EXAM

5th Grade

20 Qs

2ND TERM STEAM CAT 2025

2ND TERM STEAM CAT 2025

Assessment

Quiz

Computers

5th Grade

Medium

Created by

Grade5 teacher

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital theft in Computer Security is described as ____________.

the legal acquisition of digital information
the unauthorized access and theft of digital information
the process of securing digital data
the sharing of digital information among users

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following options is a strong password?

password123
12345678
qwertyuiop
P@ssw0rd123!

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital theft can be prevented by using ____________ for different accounts.

the same password for all accounts
no password at all
passwords that are easy to guess
unique passwords

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is another name for an exhaustive search attack?

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Two-factor authentication adds an extra layer of _______.

security
authentication
encryption
verification

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Caesar cipher is explained as ________.

a type of transposition cipher
a substitution cipher that shifts letters by a fixed number of places
a method of encrypting images
a technique for encoding numbers

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the key in a Caesar Cipher?

The key is a random string of letters.
The key is the alphabet used in the cipher.
The key is the number of positions each letter is shifted.
The key is the original message itself.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?