Chapter 2 QUIZ

Chapter 2 QUIZ

10th Grade

10 Qs

quiz-placeholder

Similar activities

Blockchain vidhi and swetha

Blockchain vidhi and swetha

10th Grade

10 Qs

Y10M2A2 - Selection

Y10M2A2 - Selection

6th - 10th Grade

15 Qs

Technology in medicine

Technology in medicine

10th Grade

15 Qs

Fashion Merchandising 1.01

Fashion Merchandising 1.01

9th - 12th Grade

10 Qs

Fun Games :) Fastest Fingers First.

Fun Games :) Fastest Fingers First.

10th Grade - Professional Development

13 Qs

2.GRADE STORY 5

2.GRADE STORY 5

2nd Grade - University

15 Qs

G10 Mod3 Summative Test: ICCS

G10 Mod3 Summative Test: ICCS

10th Grade

15 Qs

Chapter 2 QUIZ

Chapter 2 QUIZ

Assessment

Quiz

Computers

10th Grade

Medium

Created by

shaloof khalid

Used 14+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

When carrying out asymmetric encryption , which of the following users would keep the private key.

sender

receiver

all members

none of above

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is the final number in the code , which is calculated from rest of the numbers in the code.

Parity Check

CheckSum

Checkdigit

EchoCheck

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following statements about asymmetric encryption is true? Circle the correct answer.

uses a public key only

uses both public and private key

always uses 64 bit encryption

none of above

4.

MULTIPLE CHOICE QUESTION

10 mins • 5 pts

Media Image

Using an algorithm for ISBN- 13, calculate the CheckDigit for:

978151045759

2

3

1

5

5.

MULTIPLE CHOICE QUESTION

10 mins • 5 pts

Media Image

Find the Check Digit using Modulo 11 method.

213111000428

(note that step of weights assigning, will change as per length of the number)

5

6

7

10

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

In encryption, which of the following is the term used to describe the message before it is encrypted. Choose correct answer.

Simpletext

plaintext

notext

ciphertext

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following methods uses an extra bit , added to a byte to ensure it contains an even number of 1's or odd number of 1's ? Choose correct answer.

CRC

ECHO

PARITY

ARQ

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?