phần còn lại

phần còn lại

Professional Development

44 Qs

quiz-placeholder

Similar activities

Domain 4: Web Applications

Domain 4: Web Applications

Professional Development

46 Qs

Đề 11

Đề 11

Professional Development

40 Qs

UJIAN RATING AF WAGG 2023

UJIAN RATING AF WAGG 2023

Professional Development

46 Qs

IS Security

IS Security

Professional Development

44 Qs

Đề 12

Đề 12

Professional Development

40 Qs

cryptography and network security

cryptography and network security

Professional Development

45 Qs

Competency Unit 2 - Revision Question

Competency Unit 2 - Revision Question

Professional Development

46 Qs

Python Initial Evaluation

Python Initial Evaluation

Professional Development

44 Qs

phần còn lại

phần còn lại

Assessment

Quiz

Other

Professional Development

Hard

Created by

Phuong Do

FREE Resource

44 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Find the Z10's reversible value set

1,3,5,7,9

3,7,9

1,3,7,9

5,7,9

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following numbers is equal to 9 when modulo is equal to 5

-12

-10

-11

-13

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following numbers is equal to -132 when modulo is equal to 5

-12

-13

-11

-10

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many reversible elements does episode Z13 have?

12

11

10

13

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Public key certificates are used for

Applications in the block code system

Provide a public key

Provide the secret key

Use a private public key

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In public-key cryptography, what is the public key used for?

decryption and signature generation

decryption and signature generation

decryption and signature generation

Encryption and signature generation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the following code systems, the public encryption system is the code system

Lock only people in the transmission group

The key is conventionally for the sender and the receiver

Keyless encrypted messages

The key is divided into 2 parts, 1 part is made public and the rest is kept secret

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?