Search Header Logo
Authentication

Authentication

Assessment

Presentation

•

Computers

•

9th - 10th Grade

•

Practice Problem

•

Medium

Created by

Calum Gordon

Used 2+ times

FREE Resource

11 Slides • 36 Questions

1

Authentication

Creating an authentication algorithm

media

2

media

3

media

4

Multiple Select

Question image

In this lesson I am going to learn to ... ?

1

Define 'authentication'

2

Create an authentication algorithm

3

Implement authentication algorithm using a 2D data structure

5

media

6

Fill in the Blank

The process of accessing a restricted resource by providing data known only to you is called _________

7

Multiple Select

What information is usually requested when logging in to a computer system or restricted website ?

1

Username

2

Password

3

Full name

4

Phone number

5

Date of birth

8

media

9

Multiple Choice

Question image

What type of data structure is this?

1

2D list

2

1D list

3

String

4

Tuple

10

Fill in the Blank

Question image

What is the length of this data structure?

11

media

12

Multiple Choice

Question image

This is a possible algorithm for authentication.

What format is used to represent it?

1

Structured English

2

Flowchart

3

Pseudocode

4

Program code

13

media

14

Multiple Choice

Question image

What should be in the ?

1

User ID found?

2

User password found?

3

User ID and password entered?

4

Valid password?

15

Multiple Choice

Question image

What should be in the ?

1

Find user ID in data structure

2

Is valid user ID?

3

Get user ID

4

Does password match user ID?

16

media

17

Fill in the Blank

Question image

Type the name of a data structure ...

18

Fill in the Blank

Question image

Type the name of a file object ...

19

Fill in the Blank

Question image

Type a line number showing start of iteration over a data structure ...

20

Fill in the Blank

Question image

Type a line number showing start of a conditional loop ...

21

Fill in the Blank

Question image

Type a line number showing the start of a selection statement ...

22

Fill in the Blank

Question image

Type name of a built-in function ...

23

Fill in the Blank

Question image

Type a Python keyword that is shown ...

24

Fill in the Blank

Question image

Type a line number containing a Boolean expression ...

25

Fill in the Blank

Question image

Type name of a string variable ...

26

Fill in the Blank

Question image

Type name of a Boolean variable ...

27

Fill in the Blank

Question image

Type name of an integer variable ...

28

Fill in the Blank

Question image

Type a line number showing incrementation ...

29

Fill in the Blank

Question image

Type a line number showing indexing of a data structure...

30

Fill in the Blank

Question image

Type a line number showing a comment ...

31

Fill in the Blank

Question image

Type name of a string method (without parenthesis) ...

32

Fill in the Blank

Question image

Type name of a list method (without parenthesis) ...

33

media

34

Fill in the Blank

Keeping the users logging in credentials stored in an external data file rather than in the program code is an example of __________ of concerns.

35

Multiple Choice

What file format is most suitable for storing user credentials such as usernames and passwords?

1

.csv

2

.txt

3

.doc

4

.pdf

36

Multiple Choice

Question image

What process should have happened to the password data before it is stored in the data file?

1

Encryption

2

Compression

3

Validation

4

Verification

37

media

38

Multiple Select

What two methods are available to a programmer when accessing a persistent data file of user credentials?

1

Read all the data into a data structure and then process it

2

Read and process the data directly from the data file

3

Read and process the data one line at a time

4

Read some of the data into a data structure before processing

39

Multiple Choice

Which would be the most appropriate method?

Checking if a particular username has been used or not

1

Read all data into data structure

2

Leave data in file and process it from there

40

Multiple Choice

Which would be the most appropriate method?

Sorting all the usernames into alphabetical order

1

Read all data into data structure

2

Leave data in file and process it from there

41

Multiple Choice

Which would be the most appropriate method?

Allowing students to change their passwords

1

Read all data into data structure

2

Leave data in file and process it from there

42

Multiple Choice

Which would be the most appropriate method?

Checking if an entered password matches the username

1

Read all data into data structure

2

Leave data in file and process it from there

43

Multiple Choice

Which would be the most appropriate method?

Increasing the password strength of all users

1

Read all data into data structure

2

Leave data in file and process it from there

44

media

45

Multiple Select

Question image

In this lesson I have learned to ...

1

Define 'authentication'

2

Create an authentication flowchart

3

Implement authentication using a 2D data structure

46

Open Ended

Thinking Hard

What is the most interesting thing you’ve learnt today?

Compare your idea with a friend.

Explain why your idea is more important ...

(press Shift+Enter to take a new line ...)

47

Poll

Question image

How much of this lesson have you understood?

None of it

Some of it

Most of it

All of it

Authentication

Creating an authentication algorithm

media

Show answer

Auto Play

Slide 1 / 47

SLIDE