Computer Science Unit 8 Quiz

Computer Science Unit 8 Quiz

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

Cybersecurity and Global Impacts _code.org U8

Cybersecurity and Global Impacts _code.org U8

9th Grade

12 Qs

CSP 2.1.5 Secure Protocols

CSP 2.1.5 Secure Protocols

9th - 12th Grade

13 Qs

J277 - Wireless Networks

J277 - Wireless Networks

8th - 11th Grade

11 Qs

35. TAHS Y9 Encryption review

35. TAHS Y9 Encryption review

9th Grade

11 Qs

Crypto Vocab

Crypto Vocab

9th - 12th Grade

12 Qs

Encryption - AQA A Level Computer Science

Encryption - AQA A Level Computer Science

11th - 12th Grade

10 Qs

Cyber Security

Cyber Security

9th - 12th Grade

10 Qs

AP CSP Unit 8 Review

AP CSP Unit 8 Review

11th Grade

12 Qs

Computer Science Unit 8 Quiz

Computer Science Unit 8 Quiz

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Latisha Whitehead

Used 6+ times

FREE Resource

8 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

_________ is a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources.

2.

DRAG AND DROP QUESTION

1 min • 1 pt

A wireless access point that gives unauthorized access to secure networks.​ (a)  

Rogue Access Point
Computing Innovation
Keylogging

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a process that reverses encryption, taking a secret message and reproducing the original plain text?

Decryption

trojan horse

Multi-Factor Authentication

iCloud

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

_____________ is a process of encoding messages to keep them secret, so only "authorized" parties can read it.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

_______ is information about an individual that identifies, links, relates, or describes them.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Use your Caesar Cipher Wheel (SHIFT 3) to decode the following: JR FDUGV

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Use your Caesar Cipher Wheel (SHIFT 2) to decode the following: EQORWVGT UEKGPEG

8.

MATCH QUESTION

1 min • 1 pt

Match the following words with the correct definition.

Keylogging

A system that requires at least two steps to unlock protected information.

Symmetric Key Encryption

Includes one key for both encryption and decryption.

Multi-factor Authentication

Software intended to damage a computer system.

Malware

Includes a program as an integral part of its function.

Computing Innovation

The use of a program to record every keystroke made by a computer user.