G8 L5 PLEN

G8 L5 PLEN

8th Grade

30 Qs

quiz-placeholder

Similar activities

Đề 3

Đề 3

6th - 8th Grade

25 Qs

SUMATIF TENGAH SEMESTER GENAP  (INFORMATIKA -8 C&D)

SUMATIF TENGAH SEMESTER GENAP (INFORMATIKA -8 C&D)

6th - 8th Grade

25 Qs

Unit #10 | Worksheet #1

Unit #10 | Worksheet #1

8th Grade

25 Qs

Kuis Informatika 2 : 8th Grade (A)

Kuis Informatika 2 : 8th Grade (A)

8th Grade

25 Qs

Science for JSS 3

Science for JSS 3

8th - 9th Grade

25 Qs

y8.1 Final Quiz

y8.1 Final Quiz

8th Grade

27 Qs

Introduction to computer

Introduction to computer

7th - 8th Grade

30 Qs

Network Threat Prevention 2

Network Threat Prevention 2

8th - 10th Grade

25 Qs

G8 L5 PLEN

G8 L5 PLEN

Assessment

Quiz

Computers

8th Grade

Easy

Created by

Kiers McFarlane

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of encryption?

To speed up the internet

To turn files into images

To protect data by scrambling it into a code

To delete old messages

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is plaintext?

A type of password

The readable message before encryption

The encrypted version of a message

A coding language

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which device is encryption most useful for?

A broken printer

A disconnected mouse

A phone connected to public Wi-Fi

A computer without a screen

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is using encryption important on public networks?

It makes downloads faster

It saves battery

Hackers can more easily intercept data

It lets anyone access your data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ciphertext mean?

An email draft

A file that has been compressed

A message that has been turned into unreadable code

The same as plaintext

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a key do in encryption?

Locks your phone

Opens websites faster

Encrypts or decrypts a message

Stores your files

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these best describes symmetric encryption?

Uses emojis to hide data

Uses the same key to encrypt and decrypt

Uses images as passwords

Uses two different keys

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?