Search Header Logo

Ciphers

Authored by L Hobson

Computers

7th Grade

CCSS covered

Used 698+ times

Ciphers
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An encryption key is used to help decrypt messages

True
False

Tags

CCSS.RI.9-10.4

CCSS.RI.6.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.5.10

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TRUE or FALSE


Encrypted passwords will provide guaranteed protection from hacking

TRUE

FALSE

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Encryption is a way of 

Securing Information on a network
Securing Viruses
Deleting applications
Hacking Passwords

Tags

CCSS.RI.9-10.4

CCSS.RI.9-10.4

CCSS.RI.6.4

CCSS.RI.7.4

CCSS.RI.8.4

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you were to use a caeser cipher with a key of 3 shifts to the left, how would you encrypt the word: Cipher?

ZAMEBO
ZOMEBO
ZFMEBO
ZFMEBA

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Taking a secret message and reproducing the original plain text is known as?

Caesar Cipher

Encryption

Cipher Text

Decryption

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The process of converting plaintext to ciphertext.

cryptography

cyphertext

decryption

encryption

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The process of converting a ciphertext into plaintext.

encryption

decryption

plaintext

cryptography

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?