Search Header Logo
2.6 Encryption

2.6 Encryption

Assessment

Presentation

Computers

9th Grade

Practice Problem

Easy

Created by

Adrian Ortiga

Used 4+ times

FREE Resource

3 Slides • 9 Questions

1

2.6 Encryption

media

2

Open Ended

What kind of data would you want to protect from others when transferring it over a connection?

3

media

The data can be stolen from a wire or from a wireless connection.

media

4

Fill in the Blank

What is a method of securing data for storage or transmission that scrambles it and makes it meaningless?

5

media

Before encryption, data is called plain text. Encryption uses a key to turn it into cipher text.

6

Multiple Choice

Is plain text readable by anyone, and can someone steal the information if they see it?

1

Yes.

2

No.

7

Fill in the Blank

What is the name of the text that anyone can read without needing a key?

8

Fill in the Blank

What is the name of the type of algorithm used to encrypt data?

9

Multiple Choice

Does encryption turn plain text into cipher text?

1

Yes

2

No

10

Fill in the Blank

What is the name given to encrypted data after encryption?

11

Labelling

Identify the various components of the encryption process.

Drag labels to their correct position on the image

plain text

cipher text

encryption key

An incorrect option to distract you.

12

Open Ended

How a cipher text is decrypted when arrive to its destination?

2.6 Encryption

media

Show answer

Auto Play

Slide 1 / 12

SLIDE