Search Header Logo

икт 8

Authored by Dias Serdembaev

Computers

University

Used 1+ times

икт 8
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The conversion process in which the source text is replaced with ciphertext is…

encryption

decryption

decoding

coding

authorization

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the basis of the anti-virus program?

Waiting for the start of a virus attack.

Backup of all files .

Constant check of removable data carriers.

Deleting the infected files .

Comparison of program codes with codes of known viruses.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Polymorphic Virus  …

changes the contents of files and disk sectors.

substitutes instead of itself the non-infected sections of information.

encrypts and changes their coding so they are harder to detect.

can be quite easily detected and destroyed

it is activated when a certain trigger condition occurs.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The word  is encoded  using a substitution method and  looks  like  “946150556175”.

ONLINE

SECRET

CRYPTO

CIPHER

HACKER


5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a computer virus?*

A program that can self-replicate and attach itself to various objects or resources of computer systems, networks without user knowledge.

A program that contains promotional information and opens without user request.

A program that runs itself when you turn on your computer.

A code that prevents external devices from connecting to your computer.

A special microchip, which determines the correct operation of the computer.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A method of protecting information based to transform messages in ways that are hard to decipher.

Cryptography

Cryptology

Cryptanalysis

Authorization

Authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The cipher where some pseudo-random sequence generated from the key is superimposed on the source text.  

transposition

open

gamming

block

substitution

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers