Search Header Logo

CIW IBA Lesson 8 Vocabulary

Authored by Zac Lewis

Computers

8th Grade - Professional Development

Used 16+ times

CIW IBA Lesson 8 Vocabulary
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that scans disks and programs for known viruses and eliminates them.

anti-virus software

asymmetric encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An encryption method in which two keys are used to encrypt and decrypt a message.

asymmetric encryption

symmetric encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data.

authentication

digital certificate

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of converting encrypted data back to its original form.

decryption

encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A password-protected, encrypted data file containing message encryption, user identification and message text.

digital certificate

asymmetric encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time

digital signature

digital certificate

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.

encryption

firewall

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?