Encryption

Encryption

6th Grade

13 Qs

quiz-placeholder

Similar activities

JAVA IDENTIFIERS

JAVA IDENTIFIERS

6th - 8th Grade

14 Qs

U26 Q7 - CIDR

U26 Q7 - CIDR

KG - University

12 Qs

Technology Basics

Technology Basics

6th - 8th Grade

10 Qs

[RB3-Ch7] Data Verification & Validation

[RB3-Ch7] Data Verification & Validation

6th - 8th Grade

15 Qs

Introduction to spreadsheet

Introduction to spreadsheet

6th Grade

10 Qs

RESPONSIBLE USE OF ICT

RESPONSIBLE USE OF ICT

4th - 6th Grade

10 Qs

Family Quizz

Family Quizz

5th Grade - Professional Development

15 Qs

Encryption

Encryption

Assessment

Quiz

Computers

6th Grade

Practice Problem

Medium

Created by

Elizabeth Pike

Used 160+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A word has been encrypted with a Caesar cipher to CBU. The key used was 1. What was the original word?

abc

3

Bat

one

2.

FILL IN THE BLANK QUESTION

0 sec • 1 pt

When I encrypt a message, I change plain text to

3.

MULTIPLE CHOICE QUESTION

0 sec • 1 pt

When we convert numbers to binary we use the digits____?

0 and 1

1, 10, 100, 1000 etc.

1, 2, 4, 8, 16

5, 10, 15, 20

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An encryption key is used to help decrypt messages

True
False

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the algorithm of ceasar's cipher?

Each letter is replaced with a particular symbol

Each letter is replaced with a letter a certain number of steps down the alphabet

Each letter is replaced with a particular number from 0 to 26, and numbers are replaced with letters.

Each letter is replaced with a completely random number

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What type of key is not shared and computers cannot decrypt a message without it?

Free key
Private key
Public key
Personal key

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What would the encryption look like using the key?

Media Image
Media Image
Media Image

None of them

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?