decryption

decryption

10th Grade

12 Qs

quiz-placeholder

Similar activities

Accessing the Internet

Accessing the Internet

9th - 10th Grade

15 Qs

Logos - Digital Images

Logos - Digital Images

2nd - 10th Grade

10 Qs

Computing figures

Computing figures

4th - 12th Grade

14 Qs

Keyboarding Terms

Keyboarding Terms

9th - 12th Grade

10 Qs

Computer Performance

Computer Performance

9th - 11th Grade

10 Qs

Networking

Networking

8th - 10th Grade

10 Qs

conditional constructs in Java

conditional constructs in Java

10th Grade

10 Qs

Do you know alot about Roblox?

Do you know alot about Roblox?

2nd Grade - University

10 Qs

decryption

decryption

Assessment

Quiz

Computers

10th Grade

Practice Problem

Medium

Created by

Arasaka Teacher

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

DRAG AND DROP QUESTION

2 mins • 4 pts

Data is encrypted to keep it safe during transmission.

Complete the paragraph about asymmetric encryption.

 .......................................​ (a)   ...................... is encrypted into ..................................​ (b)   ............................ using a ........................................​​ (c)   ...................... . The encrypted data is then transmitted from the sender to the receiver. The encrypted data is then decrypted using a

..................​ (d)   ........................................ .

plain text
cipher text
public key
. private key ..
decrypted
symmetric
asymmetric

2.

DROPDOWN QUESTION

1 min • 1 pt

·  Encryption converts plain text into unreadable ​ ​ (a)   .

·  An algorithm and a key are used for encryption and decryption.

·  The same key is needed to both encrypt and decrypt the data.

·  The key can be created using an algorithm.

·  The key must be securely shared with the receiver.

·  If someone else gets the key, they can read the data.

·  ​ (b)   protects information and keeps it private.

Encryption
cipher text
decryption
plain text
hash value

3.

DRAG AND DROP QUESTION

1 min • 1 pt

Give the purpose of encryption.

 To help keep the ​ (a)  

· To make the data ​ (b)  

data secure
meaningless

4.

FILL IN THE BLANK QUESTION

2 mins • 4 pts

Symmetric encryption uses a shared key …

… which is used for both —————— and decryption.

Both the sender and receiver must know the key in advance.

If the key is leaked, anyone can decrypt the data.

Asymmetric encryption uses two different keys // a—————— and a———————— .

… The public key is used to encrypt the data, and the private key is used to decrypt it.

… Anyone can know the public key, but only the intended recipient has the private key.

Asymmetric encryption provides better security for communication but is slower than symmetric encryption.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

对称性加密

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

非对称性加密

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

解密

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?