CS_Activity2.9

CS_Activity2.9

10th Grade

10 Qs

quiz-placeholder

Similar activities

Kuis Dadakan ;)

Kuis Dadakan ;)

10th Grade - University

15 Qs

analisis data dan visualisasi data

analisis data dan visualisasi data

10th Grade

10 Qs

Паскаль. Основные команды

Паскаль. Основные команды

8th - 11th Grade

10 Qs

Quiz 1.2 Operating system

Quiz 1.2 Operating system

10th Grade

10 Qs

Coding helps to Understand

Coding helps to Understand

6th - 10th Grade

10 Qs

ASJ_XII_UH1

ASJ_XII_UH1

1st - 12th Grade

15 Qs

ICT Computer Basics pt1

ICT Computer Basics pt1

10th - 12th Grade

12 Qs

J808 LO1 and LO2 planning project keywords / terms

J808 LO1 and LO2 planning project keywords / terms

9th - 11th Grade

15 Qs

CS_Activity2.9

CS_Activity2.9

Assessment

Quiz

Computers

10th Grade

Practice Problem

Hard

Created by

Huma Deshmukh

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by the term ciphertext when used in encryption?

an encryption or decryption algorithm

an encrypted message

a type of session key

another name for plaintext

text following an encryption algorithm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When carrying out asymmetric encryption, which of the following users would keep the private key?

the sender

the receiver

both sender and receiver

all recipients of the message

none of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In encryption, which of the following is the term used to describe the message before it is encrypted?

simpletext

plaintext

notext

ciphertext

firsttext

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is the biggest disadvantage of using symmetric encryption?

it is very complex and time consuming

it is rarely used anymore

the value of the key reads the same in both directions

it only works on computers with older operating systems

there is a security problem when transmitting the encryption key

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is the correct name for a form of encryption in which both the sender and the recipient use the same key to encrypt and decrypt?

symmetric key encryption

asymmetric key encryption

public key encryption

parity bit

parity bit

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What of the following is the final number in a code, which is calculated from all the numbers in the code; its purpose is to find errors in data entry?

parity check

checksum

cyclic redundancy check

parity bit

check digit

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a form of error detection that makes use of a system of acknowledgements and timeouts?

automatic repeat request

echo check

check digit

parity bit

cyclic redundancy check

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?