Cyber II | M6 L1 States of Data by Mr. B

Cyber II | M6 L1 States of Data by Mr. B

12th Grade

56 Qs

quiz-placeholder

Similar activities

CBT

CBT

11th - 12th Grade

60 Qs

แนวข้อสอบ 2567

แนวข้อสอบ 2567

6th Grade - University

60 Qs

Week 7 - User Functions

Week 7 - User Functions

9th - 12th Grade

54 Qs

KK Masyarakat Digital - Informatika VII

KK Masyarakat Digital - Informatika VII

7th - 12th Grade

51 Qs

PTS Web

PTS Web

10th - 12th Grade

55 Qs

Excel Lessons 4-6

Excel Lessons 4-6

9th - 12th Grade

53 Qs

Quiz ~ Dampak Sosial Informatika

Quiz ~ Dampak Sosial Informatika

9th - 12th Grade

60 Qs

Digital Marketing Revision 3

Digital Marketing Revision 3

12th Grade

60 Qs

Cyber II | M6 L1 States of Data by Mr. B

Cyber II | M6 L1 States of Data by Mr. B

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Cyber Professor - Mr. B

Used 2+ times

FREE Resource

56 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following best explains how symmetric encryption algorithms are typically used?

Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

Symmetric encryption uses a single key that should be made public. The same key is used for both encryption and decryption of data.

Symmetric encryption uses two keys that should both be kept secret. One key is used for encryption, and the other is used for decryption.

Symmetric encryption uses two keys. The key used for encryption should be made public, but the key used for decryption should be kept secret.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An Internet user has a need to send private data to another user. Which of the following provides the most security when transmitting private data?

Certifying the data with a Creative Commons license before sending it

Sending the data using a high-bandwidth connection

Sending the data using public-key encryption

Sending the data using redundant routing

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a true statement about the use of public key encryption in transmitting messages?

Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers.

Public key encryption is not considered a secure method of communication because a public key can be intercepted.

Public key encryption only allows the encryption of documents containing text; documents containing audio and video must use a different encryption method.

Public key encryption uses a single key that should be kept secure because it is used for both encryption and decryption.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Biologists often attach tracking collars to wild animals. For each animal, the following geolocation data is collected at frequent intervals.

1. The time

2. The date

3. The location of the animal

Which of the following questions about a particular animal could NOT be answered using only the data collected from the tracking collars?

Approximately how many miles did the animal travel in one week?

Does the animal travel in groups with other tracked animals?

Do the movement patterns of the animal vary according to the weather?

In what geographic locations does the animal typically travel?

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Participants in a survey were asked how many hours per day they spend reading, how many hours per day they spend using a smartphone, and whether or not they would be interested in a smartphone application that lets users share book reviews.

The data from the survey are represented in the graph below. Each "X" represents a survey participant who said he or she was interested in the  application, and each "O" represents a participant who said he or she was not interested.

Participants who read more were generally less likely to say they are interested in the application.

Participants who use a smartphone more were generally more likely to say they read more.

Participants who read more were generally more likely to say they are interested in the application.

Participants who use a smartphone more were generally less likely to say they read more.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A certain social media Web site allows users to post messages and to comment on other messages that have been posted. When a user posts a message, the message itself is considered data. In addition to the data, the site stores the following metadata.

1. The time the message was posted

2. The name of the user who posted the message

3. The names of any users who comment on the message and the times the comments were made

For which of the following goals would it be more useful to analyze the data instead of the metadata?

To determine which posts from a particular user have received the greatest number of comments

To determine the users who post messages most frequently

To determine the time of day that the site is most active

To determine the topics that many users are posting about

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A large data set contains information about all students majoring in computer science in colleges across the United States. The data set contains the following information about each student.

1. The student’s gender

2. The state in which the student attends college

3 .The student’s grade point average on a 4.0 scale

Which of the following questions could be answered by analyzing only information in the data set?

Do students majoring in computer science tend to have higher grade point averages than students majoring in other subjects?

How many states have a higher percentage of female computer science majors than male computer science majors attending college in that state?

What percent of students attending college in a certain state are majoring in computer science?

Which college has the highest number of students majoring in computer science?

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?