Unit 4 Review

Unit 4 Review

11th - 12th Grade

17 Qs

quiz-placeholder

Similar activities

Midterm Exam Practice Quiz (February Online Day)

Midterm Exam Practice Quiz (February Online Day)

Internet Encryption Quiz

Internet Encryption Quiz

Cyber II | M6 L1 States of Data by Mr. B

Cyber II | M6 L1 States of Data by Mr. B

Big Data and Privacy

Big Data and Privacy

Encryption and Public Keys (How the internet works)

Encryption and Public Keys (How the internet works)

AP CSP Unit 4 Assessment Review

AP CSP Unit 4 Assessment Review

Semester 1 Review

Semester 1 Review

Unit 4 #8

Unit 4 #8

Unit 4 Review

Unit 4 Review

Assessment

Quiz

Computers

11th - 12th Grade

Practice Problem

Medium

Created by

Ms Seccafico

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is one use of public key encryption (or public key cryptography)?

It prevents people from hacking into your computer or intercepting your on­line conversation.

It allows data to be sent securely—decodable only by the intended recipient—as long as nobody is hacking the line or "listening in."

It allows data to be sent securely—decodable only by the intended recipient—even along insecure lines.

It prevents people from sending you unwanted emails or other spam.

It is free for the public to use, unlike private systems that must be paid for.

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

How does public key encryption (public key cryptography) differ from symmetric encryption?

Public key encryption shares all necessary encryption information with everyone: it is public. Symmetric encryption shares decryption information only between the sender and receiver.

Symmetric and public key encryption both use mathematics to encode messages, but symmetric encryption uses numbers that have symmetry, like 137731 or 82328.

They are not different. Symmetric and public key encryption both require each party to share all encryption/decryption information with the other.

Public key encryption makes the encryption key public, and does not require the sender to know any private information about how to decrypt the message.

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The terms "bandwidth" and "latency" are both used in talking about the amount of time it takes to transmit information. What is the difference between them?

There is no difference; they are synonyms. Both describe the total TIME it takes to move one megabyte of information.

There is no difference; they are synonyms. Both describe the total AMOUNT of information that can be moved in one second.

Bandwidth is a measure of the rate at which the information moves through the system, the amount of data in a fixed time. Latency refers primarily to the wait time before the system can move the data.

They are roughly opposites. Low bandwidth is caused by high latency.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

People sometimes treat "the cloud" and "the Internet" as if they mean the same thing. They don't. Which of these explains the difference?

The Internet is a network of computers. The cloud means all the servers on the Internet, thought of as one big server because you don't know exactly what computer has your data on it.

The Internet is the path you follow to reach the cloud. The cloud refers to all of the computers on the Internet.

The Internet is a cloud service provider. The cloud is the storage place for all data.

The cloud is bigger than the Internet.

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Choose the best way to complete this sentence: Redundancy improves reliability because...

...repeating instructions in a program helps in case an instruction is not executed properly.

...having multiple parallel systems capable of doing a task, and a way to monitor success, allows a backup system to be chosen if the originally chosen system fails.

...having more equipment on the job makes the job faster and cheaper.

...repeating a task several times assures that at least one of those times will work.

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

In computer science, a router is not something you stick down a blocked drainpipe. What is it?

A computer router opens up a path for Internet communication, from beginning to end, carving it out just as a woodworking router hollows out a shape in wood.

A router operates like an air traffic controller, making sure that two transmissions on the Internet are safely spaced and don't "crash" into each other.

A router chooses an open route for the next step in the transmission of data sent over the Internet.

A router is the device that encrypts your computer's data so that it can be sent over some Internet route.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is an advantage of a lossless compression algorithm over a lossy compression algorithm?

A lossless compression algorithm can guarantee that compressed information is kept secure, while a lossy compression algorithm cannot.

A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.

A lossless compression algorithm typically allows for faster transmission speeds than does a lossy compression algorithm.

A lossless compression algorithm typically provides a greater reduction in the number of bits stored or transmitted than does a lossy compression algorithm.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?