Secure Your Secrets Vocabulary

Secure Your Secrets Vocabulary

7th - 12th Grade

7 Qs

quiz-placeholder

Similar activities

conditional constructs in Java

conditional constructs in Java

10th Grade

10 Qs

Aspek Legal TIK

Aspek Legal TIK

12th Grade

10 Qs

Quick Revision Term3

Quick Revision Term3

7th Grade

10 Qs

conditional and iterative statements

conditional and iterative statements

11th Grade

10 Qs

Micro:bit assessment 1

Micro:bit assessment 1

7th - 8th Grade

10 Qs

BTEC Level 3 Nat Ext Dip in Computing - Unit 2.1 Hardware and Software

BTEC Level 3 Nat Ext Dip in Computing - Unit 2.1 Hardware and Software

11th - 12th Grade

10 Qs

Xcode and Playgrounds

Xcode and Playgrounds

9th - 11th Grade

9 Qs

Quiz 3-  Life Cycle of Program

Quiz 3- Life Cycle of Program

10th Grade

10 Qs

Secure Your Secrets Vocabulary

Secure Your Secrets Vocabulary

Assessment

Quiz

Computers

7th - 12th Grade

Medium

Created by

Pamela Glasener

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Protecting people’s data and personal information (also called sensitive information).

Privacy

Security

Two-step verification

Password

Encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Protecting people’s devices and the software on them.

Privacy

Security

Two-step verification

Password

Encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security process where logging in to a service requires two separate steps or two “factors,” such as a password and a one-time code. For example, you may have to enter your password and then enter a code that was texted to your phone or a code from an app.

Privacy

Security

Two-step verification

Password

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A secret combination used to access something. It may take different forms; for example, you may have a four-digit number-only code that you use for your phone lock and a much more complex password for your email account. In general, you should make your passwordsx as long and complex as you can while still being able to remember them.

Privacy

Complexity

Two-step verification

Password

Encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of converting information or data into a code that makes it unreadable and inaccessible.

Privacy

Complexity

Two-step verification

Password

Encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The goal when creating a secure password. For example, a password is complex when it has a mix of numbers, special characters (like $ or &), and both lowercase and uppercase letters.

Privacy

Complexity

Hacker

Password

Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A person who uses computers to gain unauthorized access to other people’s or organizations’ devices and data.

Privacy

Complexity

Hacker

Password

Encryption