
Ciphers
Authored by L Hobson
Computers
7th Grade
CCSS covered
Used 703+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An encryption key is used to help decrypt messages
Tags
CCSS.RI.9-10.4
CCSS.RI.6.4
CCSS.RI.7.4
CCSS.RI.8.4
CCSS.RI.5.10
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
TRUE or FALSE
Encrypted passwords will provide guaranteed protection from hacking
TRUE
FALSE
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Encryption is a way of
Tags
CCSS.RI.9-10.4
CCSS.RI.9-10.4
CCSS.RI.6.4
CCSS.RI.7.4
CCSS.RI.8.4
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If you were to use a caeser cipher with a key of 3 shifts to the left, how would you encrypt the word: Cipher?
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Taking a secret message and reproducing the original plain text is known as?
Caesar Cipher
Encryption
Cipher Text
Decryption
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
The process of converting plaintext to ciphertext.
cryptography
cyphertext
decryption
encryption
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
The process of converting a ciphertext into plaintext.
encryption
decryption
plaintext
cryptography
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?