
ICT g8 - encryption & decryption
Authored by Christina Septi
Computers
8th Grade
Used 10+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
There are private data that people still exchange in the open system such as credit card number, bank information, password, and emails.
true
false
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Scrambling or changing a message to hide the original text it is called...
encryption
decryption
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
the process of uncrambling a message to make the text readable is called...
encryption
decryption
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
One of the first well-known method of encryption was called caesar's cypher.
false
true
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Caesar's cypher is an algorithm that substitute each letter in the original message with a letter a certain number of steps down the alphabet. The number that only the sender and the receiver know is called...
key
letter
password
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Encryption is the way we keep private information safe on the internet.
TRUE
FALSE
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Caesar's Cipher is a secure way of encrypting data.
true
false
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?