IGCSE Data Transmission Encryption and error

IGCSE Data Transmission Encryption and error

9th - 12th Grade

27 Qs

quiz-placeholder

Similar activities

QUIZ DASAR-DASAR TJKT S01-02

QUIZ DASAR-DASAR TJKT S01-02

10th Grade

25 Qs

Cybersecurity Checkpoint 1

Cybersecurity Checkpoint 1

10th - 12th Grade

23 Qs

Sumative susulan dan remedial Grade 9

Sumative susulan dan remedial Grade 9

9th Grade

24 Qs

ASSESMEN TP 2,3

ASSESMEN TP 2,3

10th Grade

25 Qs

UH1_19-20_TLJ

UH1_19-20_TLJ

11th Grade

25 Qs

SHS Quiz 2 Grade X

SHS Quiz 2 Grade X

10th Grade

25 Qs

PTS Desain Multimedia Interaktif

PTS Desain Multimedia Interaktif

12th Grade

25 Qs

Penelusuran Informasi/Search Engine (Simdig KD 3.9)

Penelusuran Informasi/Search Engine (Simdig KD 3.9)

10th Grade

25 Qs

IGCSE Data Transmission Encryption and error

IGCSE Data Transmission Encryption and error

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Roberto Cistia

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by the term ciphertext when used in encryption?

an encryption or decryption algorithm

an encrypted message

a type of session key

another name for plaintext

text following an encryption algorithm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When carrying out asymmetric encryption, which of the following users would

keep the private key?

the sender

the receiver

both sender and receiver

all recipients of the message

none of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In encryption, which of the following is the term used to describe the message

before it is encrypted?

simpletext

plaintext

notext

ciphertext

firsttext

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the correct name for a form of encryption in which

both the sender and the recipient use the same key to encrypt and decrypt?

symmetric key encryption

asymmetric key encryption

public key encryption

same key encryption

block cipher encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the biggest disadvantage of using symmetric encryption?

it is very complex and time consuming

it is rarely used anymore

the value of the key reads the same in both directions

it only works on computers with older operating systems

there is a security risk when transmitting the encryption key

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What of the following is the final number in a code, which is calculated from all

the numbers in the code; its purpose is to find errors in data entry?

parity check

checksum

cyclic redundancy check

parity bit

check digit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a form of error detection that makes use of a system

of acknowledgements and timeouts?

automatic repeat request

echo check

check digit

parity bit

cyclic redundancy check

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?