Unit 4 Review

Unit 4 Review

11th - 12th Grade

17 Qs

quiz-placeholder

Similar activities

Computer IOT

Computer IOT

11th - 12th Grade

12 Qs

J277 1.5.2 - Utility Software

J277 1.5.2 - Utility Software

9th - 11th Grade

16 Qs

OCR ALevel CS: 1.3.2 Networks

OCR ALevel CS: 1.3.2 Networks

10th - 12th Grade

13 Qs

Unit 6: Software Review

Unit 6: Software Review

8th - 12th Grade

15 Qs

Cybersecurity - Review for Exam

Cybersecurity - Review for Exam

9th - 12th Grade

20 Qs

6.1 Data Security Cambridge iAS 9618

6.1 Data Security Cambridge iAS 9618

11th Grade

20 Qs

L8 - Defense in Dept & VPN | ICSS Lesson Quiz

L8 - Defense in Dept & VPN | ICSS Lesson Quiz

12th Grade

14 Qs

Yr 11 ICT quiz 1 Networks & Security

Yr 11 ICT quiz 1 Networks & Security

10th - 11th Grade

20 Qs

Unit 4 Review

Unit 4 Review

Assessment

Quiz

Computers

11th - 12th Grade

Medium

Created by

Ms Seccafico

Used 8+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is one use of public key encryption (or public key cryptography)?

It prevents people from hacking into your computer or intercepting your on­line conversation.

It allows data to be sent securely—decodable only by the intended recipient—as long as nobody is hacking the line or "listening in."

It allows data to be sent securely—decodable only by the intended recipient—even along insecure lines.

It prevents people from sending you unwanted emails or other spam.

It is free for the public to use, unlike private systems that must be paid for.

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

How does public key encryption (public key cryptography) differ from symmetric encryption?

Public key encryption shares all necessary encryption information with everyone: it is public. Symmetric encryption shares decryption information only between the sender and receiver.

Symmetric and public key encryption both use mathematics to encode messages, but symmetric encryption uses numbers that have symmetry, like 137731 or 82328.

They are not different. Symmetric and public key encryption both require each party to share all encryption/decryption information with the other.

Public key encryption makes the encryption key public, and does not require the sender to know any private information about how to decrypt the message.

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The terms "bandwidth" and "latency" are both used in talking about the amount of time it takes to transmit information. What is the difference between them?

There is no difference; they are synonyms. Both describe the total TIME it takes to move one megabyte of information.

There is no difference; they are synonyms. Both describe the total AMOUNT of information that can be moved in one second.

Bandwidth is a measure of the rate at which the information moves through the system, the amount of data in a fixed time. Latency refers primarily to the wait time before the system can move the data.

They are roughly opposites. Low bandwidth is caused by high latency.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

People sometimes treat "the cloud" and "the Internet" as if they mean the same thing. They don't. Which of these explains the difference?

The Internet is a network of computers. The cloud means all the servers on the Internet, thought of as one big server because you don't know exactly what computer has your data on it.

The Internet is the path you follow to reach the cloud. The cloud refers to all of the computers on the Internet.

The Internet is a cloud service provider. The cloud is the storage place for all data.

The cloud is bigger than the Internet.

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Choose the best way to complete this sentence: Redundancy improves reliability because...

...repeating instructions in a program helps in case an instruction is not executed properly.

...having multiple parallel systems capable of doing a task, and a way to monitor success, allows a backup system to be chosen if the originally chosen system fails.

...having more equipment on the job makes the job faster and cheaper.

...repeating a task several times assures that at least one of those times will work.

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

In computer science, a router is not something you stick down a blocked drainpipe. What is it?

A computer router opens up a path for Internet communication, from beginning to end, carving it out just as a woodworking router hollows out a shape in wood.

A router operates like an air traffic controller, making sure that two transmissions on the Internet are safely spaced and don't "crash" into each other.

A router chooses an open route for the next step in the transmission of data sent over the Internet.

A router is the device that encrypts your computer's data so that it can be sent over some Internet route.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is an advantage of a lossless compression algorithm over a lossy compression algorithm?

A lossless compression algorithm can guarantee that compressed information is kept secure, while a lossy compression algorithm cannot.

A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.

A lossless compression algorithm typically allows for faster transmission speeds than does a lossy compression algorithm.

A lossless compression algorithm typically provides a greater reduction in the number of bits stored or transmitted than does a lossy compression algorithm.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?