
Ch15 : Encryption
Presentation
•
Computers
•
10th Grade
•
Practice Problem
•
Medium
Ala Jaber
Used 4+ times
FREE Resource
31 Slides • 35 Questions
1
2
3
Multiple Choice
What is the difference between asymmetric and symmetric encryption?
Asymmetric uses two keys, symmetric uses one key
Asymmetric is faster than symmetric
Symmetric is more secure than asymmetric
Asymmetric is used for HTTPS connections
4
Multiple Choice
What must a user need to decrypt a file?
Coin
Key
Token
Graph
5
Multiple Choice
What is the purpose of data encryption?
To speed up data transfer
To make data unreadable to unauthorized users
To reduce the amount of data storage needed
To make data easier to read
6
Multiple Choice
"______ encryption is a method of encryption involving one key for both encryption and decryption."
Private Key
Symmetric
Asymmetric
Public Key
7
Multiple Choice
Which process involves transforming ciphertext into plaintext using a key
8
Drag and Drop
9
10
11
Multiple Choice
Plan a strategy to decode a Pigpen Cipher message without a key.
Use frequency analysis to determine common symbols.
Randomly guess the letters.
Use a computer program to brute force the message.
Look for patterns and common words in the symbols.
12
Multiple Choice
What is encryption?
A person who tricks you into giving your password
converting information or data into a code to prevent unauthorized access.
To upload your personal data to the cloud
When there is a security breach in your data
13
Multiple Select
What does Encryption Mean? (Select two answers)
That data can no longer be read without the key
That data is secure
That data has been lost
That data is changed
14
Match
The same key is used to encrypt and decrypt the message.
Different keys are used to encrypt and decrypt the message.
Key shared with everybody used to encrypt a message.
Key that can only be decrypted by a computer with access.
Symmetric
Asymmetric
Public Key
Private Key
Symmetric
Asymmetric
Public Key
Private Key
15
16
Multiple Choice
Compare the Pigpen Cipher to the Caesar Cipher. Which statement is true?
Both ciphers use geometric symbols.
The Pigpen Cipher is more secure than the Caesar Cipher.
The Caesar Cipher shifts letters, while the Pigpen Cipher uses symbols.
Both ciphers were used by the Freemasons.
17
18
Multiple Choice
In a Caesar cipher with a key of –3, what happens to the letters of the alphabet?
a) They are shifted three places to the right
b) They are replaced with numbers
c) They are shifted three places to the left
d) They are arranged in random order
19
Multiple Choice
To decrypt a Caesar cipher, the letters are shifted in the same direction as encryption.
True
False
20
21
22
Multiple Choice
What is the purpose of the Caesar cipher algorithm?
To encrypt messages
To decrypt messages
To both encrypt and decrypt messages
To analyze strings
23
24
Multiple Choice
What is the first step in the flowchart for setting out a Caesar cipher?
Input 'e' for encryption
Input 'd' for decryption
Input shift to be used
Input message to be encrypted or decrypted
25
26
Multiple Choice
What are the sub-problems that your program needs to address when checking user input?
Checking if the input is empty
Traversing the string
Handling upper and lower case letters
Leaving characters as they are
27
28
Multiple Choice
What will happen if the key is +3 and the letter to be encoded is 'X'?
It will encrypt to 'A'
It will encrypt to 'B'
It will encrypt to 'C'
It will encrypt to 'D'
29
30
Multiple Choice
What are the steps involved in using functions for structured programming?
Ask the user for the key
Ask the user for the message
Carry out the encryption or decryption
Ask the user if they want to encrypt or decrypt
31
32
Multiple Choice
What values do the functions return that are used by the main program?
Get method
Get key
Get message
Decrypt message
33
Multiple Choice
______________ is/are Programs designed by dividing problems into smaller, logical problems to make them easier to execute.
34
Multiple Choice
35
36
Multiple Choice
What does the variable 'run' control in the given code?
The method of encryption
The loop execution
The key for encryption
The message to display
37
38
Multiple Choice
What is the Vigenère cipher based on?
Polyalphabetic substitution
Single alphabet substitution
Transposition
None of the above
39
40
Multiple Choice
What is the Vigenère cipher used for?
Encrypting messages
Decrypting messages
Both encrypting and decrypting messages
None of the above
41
42
43
44
45
Multiple Choice
What is the term used to refer to the original message before encryption?
Ciphertext
Plaintext
Keyword
Encryption
46
Multiple Choice
What is the purpose of the keyword in developing a keystream?
To encrypt the plaintext
To generate the keystream
To decode the message
To create a cipher
47
Multiple Choice
What is the ciphertext for the plaintext 'this is a message' using the keystream 'code'?
VVLW KW D QGGVEIS
VVLW KW D QGGVEIS
VVLW KW D QGGVEIS
VVLW KW D QGGVEIS
48
49
50
51
Multiple Choice
What is the process of changing plain text into a cipher for the purpose of security or privacy?
Denial of Service
Encryption
Endpoint Protection Platform
Digital Signature
52
53
54
55
56
Multiple Choice
What is the encrypted ciphertext when using the rail fence cipher with a key of 4?
taghsmaeiiesss
tieghsssmsaeias
taghsmaeisss
tieghsssmseaias
57
Multiple Choice
What is the key used to encrypt the message in the rail fence cipher?
2
3
4
5
58
Multiple Choice
What are the stages of filling in the letters of the ciphertext to decrypt the message?
Stage 1
Stage 2
Stage 3
Stage 4
59
60
Multiple Choice
61
Multiple Choice
62
Multiple Choice
Explain the difference between encryption and decryption.
Encryption converts plaintext to ciphertext, while decryption converts ciphertext to plaintext.
Encryption is used for compressing data, while decryption is used for decompressing data.
Encryption converts ciphertext to plaintext, while decryption converts plaintext to ciphertext.
Encryption and decryption are the same process.
63
64
65
66
Poll
How confident do you feel about this topic now?
Show answer
Auto Play
Slide 1 / 66
SLIDE
Similar Resources on Wayground
63 questions
Chapter 8 Cybersecurity III
Presentation
•
11th Grade
62 questions
10-7 Day 3
Presentation
•
10th Grade
61 questions
FTCE 5-9 Math TEST- Foundations of Algebra Day 2
Presentation
•
10th Grade
61 questions
Sec 4 SS CH10 - Cultural Impacts of Globalisation
Presentation
•
10th Grade
58 questions
Chapter 29: Nervous and Endocrine system
Presentation
•
10th Grade
59 questions
revolutions
Presentation
•
10th Grade
60 questions
Surface Area of Geometric Shapes
Presentation
•
10th Grade
62 questions
Review
Presentation
•
10th Grade
Popular Resources on Wayground
20 questions
"What is the question asking??" Grades 3-5
Quiz
•
1st - 5th Grade
20 questions
“What is the question asking??” Grades 6-8
Quiz
•
6th - 8th Grade
10 questions
Fire Safety Quiz
Quiz
•
12th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
34 questions
STAAR Review 6th - 8th grade Reading Part 1
Quiz
•
6th - 8th Grade
20 questions
“What is the question asking??” English I-II
Quiz
•
9th - 12th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
47 questions
8th Grade Reading STAAR Ultimate Review!
Quiz
•
8th Grade
Discover more resources for Computers
20 questions
“What is the question asking??” English I-II
Quiz
•
9th - 12th Grade
10 questions
Fire Prevention
Quiz
•
9th - 12th Grade
50 questions
STAAR English 2 Review
Quiz
•
10th Grade
20 questions
Figurative Language Review
Quiz
•
10th Grade
20 questions
Grammar
Quiz
•
9th - 12th Grade
16 questions
AP Biology: Unit 1 Review (CED)
Quiz
•
9th - 12th Grade
20 questions
verbos reflexivos en español
Quiz
•
9th - 12th Grade
11 questions
Expectations Review
Quiz
•
9th - 12th Grade