ICT g8 - encryption & decryption

ICT g8 - encryption & decryption

8th Grade

13 Qs

quiz-placeholder

Similar activities

Cryptography (Y8)

Cryptography (Y8)

7th - 9th Grade

17 Qs

IBA Chapter 8B

IBA Chapter 8B

8th - 12th Grade

16 Qs

Quiz 4: Internet safety, cyber security and encryption

Quiz 4: Internet safety, cyber security and encryption

7th - 8th Grade

13 Qs

Encryption and Data Security Quiz

Encryption and Data Security Quiz

6th - 8th Grade

9 Qs

1.3 Understanding encryption and decryption

1.3 Understanding encryption and decryption

8th Grade

10 Qs

Encryption 2

Encryption 2

8th - 10th Grade

10 Qs

Cryptography 1

Cryptography 1

8th Grade

16 Qs

Encryption

Encryption

8th Grade

10 Qs

ICT g8 - encryption & decryption

ICT g8 - encryption & decryption

Assessment

Quiz

Computers

8th Grade

Medium

Created by

Christina Septi

Used 10+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

There are private data that people still exchange in the open system such as credit card number, bank information, password, and emails.

true

false

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Scrambling or changing a message to hide the original text it is called...

encryption

decryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

the process of uncrambling a message to make the text readable is called...

encryption

decryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

One of the first well-known method of encryption was called caesar's cypher.

false

true

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Caesar's cypher is an algorithm that substitute each letter in the original message with a letter a certain number of steps down the alphabet. The number that only the sender and the receiver know is called...

key

letter

password

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Encryption is the way we keep private information safe on the internet.

TRUE

FALSE

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Caesar's Cipher is a secure way of encrypting data.

true

false

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?