Search Header Logo

Public Key Encryption

Authored by Janet Ryalls

Computers

7th - 12th Grade

CCSS covered

Used 58+ times

Public Key Encryption
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What Software are you using to present your information?

Sway
Powerpoint
Word
Publisher

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is the most secure way of data transfer?

HTTP
HTTPS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of key is not shared and computers cannot decrypt a message without it?

Free key
Private key
Public key
Personal key

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of key can be freely shared with anyone so that they can encrypt a message?

Personal key
Private key
Free key
Public key

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A specific encryption code

Code
Cipher
Scramble

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption is a way of 

Securing Information on a network
Securing Viruses
Deleting applications
Hacking Passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An encryption key is used to help decrypt messages

True
False

Tags

CCSS.RI.9-10.4

CCSS.RI.9-10.4

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?