Search Header Logo
Authentication

Authentication

Assessment

Presentation

Computers

9th - 10th Grade

Practice Problem

Medium

Created by

Calum Gordon

Used 2+ times

FREE Resource

11 Slides • 36 Questions

1

Authentication

Creating an authentication algorithm

media

2

media

3

media

4

Multiple Select

Question image

In this lesson I am going to learn to ... ?

1

Define 'authentication'

2

Create an authentication algorithm

3

Implement authentication algorithm using a 2D data structure

5

media

6

Fill in the Blanks

Type answer...

7

Multiple Select

What information is usually requested when logging in to a computer system or restricted website ?

1

Username

2

Password

3

Full name

4

Phone number

5

Date of birth

8

media

9

Multiple Choice

Question image

What type of data structure is this?

1

2D list

2

1D list

3

String

4

Tuple

10

Fill in the Blanks

media image

Type answer...

11

media

12

Multiple Choice

Question image

This is a possible algorithm for authentication.

What format is used to represent it?

1

Structured English

2

Flowchart

3

Pseudocode

4

Program code

13

media

14

Multiple Choice

Question image

What should be in the ?

1

User ID found?

2

User password found?

3

User ID and password entered?

4

Valid password?

15

Multiple Choice

Question image

What should be in the ?

1

Find user ID in data structure

2

Is valid user ID?

3

Get user ID

4

Does password match user ID?

16

media

17

Fill in the Blanks

media image

Type answer...

18

Fill in the Blanks

media image

Type answer...

19

Fill in the Blanks

media image

Type answer...

20

Fill in the Blanks

media image

Type answer...

21

Fill in the Blanks

media image

Type answer...

22

Fill in the Blanks

media image

Type answer...

23

Fill in the Blanks

media image

Type answer...

24

Fill in the Blanks

media image

Type answer...

25

Fill in the Blanks

media image

Type answer...

26

Fill in the Blanks

media image

Type answer...

27

Fill in the Blanks

media image

Type answer...

28

Fill in the Blanks

media image

Type answer...

29

Fill in the Blanks

media image

Type answer...

30

Fill in the Blanks

media image

Type answer...

31

Fill in the Blanks

media image

Type answer...

32

Fill in the Blanks

media image

Type answer...

33

media

34

Fill in the Blanks

Type answer...

35

Multiple Choice

What file format is most suitable for storing user credentials such as usernames and passwords?

1

.csv

2

.txt

3

.doc

4

.pdf

36

Multiple Choice

Question image

What process should have happened to the password data before it is stored in the data file?

1

Encryption

2

Compression

3

Validation

4

Verification

37

media

38

Multiple Select

What two methods are available to a programmer when accessing a persistent data file of user credentials?

1

Read all the data into a data structure and then process it

2

Read and process the data directly from the data file

3

Read and process the data one line at a time

4

Read some of the data into a data structure before processing

39

Multiple Choice

Which would be the most appropriate method?

Checking if a particular username has been used or not

1

Read all data into data structure

2

Leave data in file and process it from there

40

Multiple Choice

Which would be the most appropriate method?

Sorting all the usernames into alphabetical order

1

Read all data into data structure

2

Leave data in file and process it from there

41

Multiple Choice

Which would be the most appropriate method?

Allowing students to change their passwords

1

Read all data into data structure

2

Leave data in file and process it from there

42

Multiple Choice

Which would be the most appropriate method?

Checking if an entered password matches the username

1

Read all data into data structure

2

Leave data in file and process it from there

43

Multiple Choice

Which would be the most appropriate method?

Increasing the password strength of all users

1

Read all data into data structure

2

Leave data in file and process it from there

44

media

45

Multiple Select

Question image

In this lesson I have learned to ...

1

Define 'authentication'

2

Create an authentication flowchart

3

Implement authentication using a 2D data structure

46

Open Ended

Thinking Hard

What is the most interesting thing you’ve learnt today?

Compare your idea with a friend.

Explain why your idea is more important ...

(press Shift+Enter to take a new line ...)

47

Poll

Question image

How much of this lesson have you understood?

None of it

Some of it

Most of it

All of it

Authentication

Creating an authentication algorithm

media

Show answer

Auto Play

Slide 1 / 47

SLIDE