Vocab quiz 6

Vocab quiz 6

11th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Examen de Programacion

Examen de Programacion

12th Grade

13 Qs

ECONOMICS CHAPTER 3

ECONOMICS CHAPTER 3

11th Grade

10 Qs

Article 8

Article 8

12th Grade

11 Qs

 Case study on Imperialism

Case study on Imperialism

11th Grade

10 Qs

Hálózat_2023_05_23

Hálózat_2023_05_23

11th Grade

10 Qs

TEST -4 CH-2 INDIAN ECONOMY 1950-90

TEST -4 CH-2 INDIAN ECONOMY 1950-90

12th Grade

10 Qs

EmTech Q2 Post Test 2

EmTech Q2 Post Test 2

11th Grade

15 Qs

Research Project Quiz no. 4 Interpreting data

Research Project Quiz no. 4 Interpreting data

12th Grade

10 Qs

Vocab quiz 6

Vocab quiz 6

Assessment

Quiz

Other

11th - 12th Grade

Easy

Created by

Kevin Murphy

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

a broad term for datasets so large or complex that traditional data processing applications are inadequate.

Big Data

Moore's Law

Encryption

Cipher

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

computing power will double every 1.5-2 years, it has remained more or less true ever since.

Private Key

Moore's Law

Decryption

Asymmetric Encyption

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A process of encoding messages to keep them secret, so only "authorized" parties can read it.

Decyption

Cipher

Pivate Key

Encryption

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

a mathematical operation that returns the remainder after integer division.

Public Key

Modulo

Private Key

Random Substitution Cipher

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.

Asymmetric Encryption

Public Key Encryption

Antivirus Software

Private Key

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

Private Key

Public Key Encryption

Vius

DDoS Attack

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

software that runs on servers (often routers) that only allows traffic through according to some set of security rules.

Virus

Phishing Scam

Firewall

Antivirus Software

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?