Chapter 3.1

Chapter 3.1

12th Grade

15 Qs

quiz-placeholder

Similar activities

Ceaser Cipher, Atbash Cipher, and Rot13 cipher

Ceaser Cipher, Atbash Cipher, and Rot13 cipher

12th Grade - University

15 Qs

Garden State Cybersecurity - Unit 4.1 - 4.2

Garden State Cybersecurity - Unit 4.1 - 4.2

9th - 12th Grade

14 Qs

APCSP Vocabulary

APCSP Vocabulary

10th - 12th Grade

18 Qs

H466 - 1.3.1 - Understanding Encryption Methods

H466 - 1.3.1 - Understanding Encryption Methods

12th Grade - University

15 Qs

Malware and Encryption Quiz

Malware and Encryption Quiz

12th Grade

20 Qs

Error Detection Methods of Data Tranmission

Error Detection Methods of Data Tranmission

9th - 12th Grade

10 Qs

1.3.1 - Encryption & Hashing

1.3.1 - Encryption & Hashing

8th - 12th Grade

13 Qs

Encryption, Compression & Hashing

Encryption, Compression & Hashing

12th Grade

19 Qs

Chapter 3.1

Chapter 3.1

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Wendy Gardner

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is an entity that can interact with the software solution as shown in a use case diagram?

Actor

Data store

Event

Context diagram

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which stage of the problem-solving methodology involves determining solution requirements, constraints, and scope?

Design stage

Analysis stage

Evaluation stage

Implementation stage

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a relationship between two elements in a use case diagram?

Association

Context diagram

Data flow

Event

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of encryption is referred to as public key encryption?

Symmetric key encryption

Asymmetric key encryption

Cipher text encryption

Biometric encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of data includes fingerprints, iris scanning, and facial recognition?

Cipher text data

Biometric data

Data flow

Data store

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for data that has been encoded so that it is unreadable by unauthorized applications or people?

Data flow

Data store

Cipher text data

Raw data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of questions can be answered with a finite set of responses?

Open-ended questions

Close-ended questions

Analytical questions

Descriptive questions

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?