Cryptography

Cryptography

8th - 10th Grade

20 Qs

quiz-placeholder

Similar activities

Cryptography

Cryptography

6th Grade - University

15 Qs

Unit 2: Data encryption

Unit 2: Data encryption

9th - 12th Grade

18 Qs

Internet_cryptography_Cybersecurity

Internet_cryptography_Cybersecurity

10th - 11th Grade

25 Qs

Cryptography Chap-1

Cryptography Chap-1

9th Grade - Professional Development

15 Qs

Cryptography 1

Cryptography 1

8th Grade

16 Qs

Cryptography Basics

Cryptography Basics

6th - 8th Grade

15 Qs

Cryptology

Cryptology

9th Grade - University

15 Qs

Online Quiz

Online Quiz

8th Grade

21 Qs

Cryptography

Cryptography

Assessment

Quiz

Computers

8th - 10th Grade

Hard

Created by

K WillTeachYou

Used 474+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who was the first know user of the Caesar Cipher?

Caesar Romanus

Julius Caesar

Alan Turing

There isn't one

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What machine was used during WWII to encrypt and decrypt German messages?
Enigma
Atbash
Secret
Puzzler

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the name of the man who led the team that cracked the German's "Enigma Code" in WW2?

Tim Berners-Lee

Alan Turing

Stephen Hawking

Bill Gates

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following statements is FALSE?

Cracking the Enigma Code shortened WW2 by at least two years and saved millions of lives

Alan Turing was the first person to come up with the idea of a programmable machine

Alan Turing was one of the pioneers of modern computing

Polish mathematicians were the first ones to crack the Enigma Code

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In Cryptography, original message, before being transformed, is called

Simple Text

Plain Text

Cipher Text

Filled Text

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An encryption algorithm transforms plain text into:

Cipher text

Simple Text

Empty Text

Plain Text

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

_______ is the science and art of transforming messages to make them secure and immune to attacks.

Cryptography

Cryptoanalysis

neither Cryptography nor Cryptoanalysis

either Cryptography or Cryptoanalysis

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?