Search Header Logo

AP CSP Unit 4 code.org

Authored by Ali Shameem

Computers

10th - 12th Grade

Used 1+ times

AP CSP Unit 4 code.org
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Fill in the blank of the following statement: "______ encryption is a method of encryption involving one key for both encryption and decryption."

Symmetric
Asymmetric 
Public key 
SSL 

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption to encrypt their customers' credit card information. Is this a secure form of payment?

No, public key encryption allows the credit card information to be read by the public. 
No, the internet protocols are open standards and thus everything sent over the internet is sent "in the clear". 
Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve. 
Yes, public key encryption is secure because it transmits credit card information in binary. 

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following statements best describes the properties of public key encryption?

Public key encryption is an encryption method which relies on separate keys for encrypting and decrypting information. 
 Public key encryption is a highly secure encryption scheme that in which a single shared key is used by both the sender and receiver of the message. 
Public key encryption makes use of certain types of problems which are easier for humans to solve than computers. 
Public key encryption makes use of mathematical problems which no algorithm can be used to solve. 

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

the generic term for a technique (or algorithm) that performs encryption

Cipher
Cracking encryption
Caesar Cipher
Caesar Cipher

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a process that reverses encryption, taking a secret message and reproducing the original plain text

Decryption
Encryption
Cracking encryption
Cipher

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

Decryption
Encryption
Cracking encryption
Random Substitution Cipher

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.

Random Substitution Cipher
Encryption
Cracking encryption
Cipher

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?