
Unit 4 Lessons 1-3, 5-10 (APCSP Code.org)
Authored by Cindy Rhodes
Computers
9th - 12th Grade
Used 13+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
44 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
This type of encryption uses one key for both encryption and decryption.
symmetric
asymmetric
private
public
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
If your message is encrypted using public key encryption it is _________________ to crack.
impossible
relatively easy
computationally hard
relatively hard
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
What type of key can be freely shared with anyone so that they can encrypt a message?
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The key for a random substitution cipher is
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
This type of cyber attack involves overwhelming web servers with more requests for data than they can handle.
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
When criminals attempt to obtain personal data by sending email impersonating legitimate companies, it is called
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Historically it has been observed that computer processing speeds tend to double every two years. This is known as:
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?