Grade 8

Grade 8

8th Grade

19 Qs

quiz-placeholder

Similar activities

Cryptography 1

Cryptography 1

8th Grade

16 Qs

Cryptography Basics

Cryptography Basics

6th - 8th Grade

15 Qs

Cryptography Basics

Cryptography Basics

6th - 8th Grade

15 Qs

1.3 OCR Networks Lesson 8

1.3 OCR Networks Lesson 8

8th - 12th Grade

20 Qs

Cyber Security Nova labs

Cyber Security Nova labs

6th - 8th Grade

23 Qs

Rebel Rebel

Rebel Rebel

7th - 9th Grade

17 Qs

Year 7 - End of Unit

Year 7 - End of Unit

7th - 8th Grade

20 Qs

Cryptography (Y8)

Cryptography (Y8)

7th - 9th Grade

17 Qs

Grade 8

Grade 8

Assessment

Quiz

Computers

8th Grade

Medium

Created by

bb h

Used 21+ times

FREE Resource

19 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

_________________makes software and hardware less vulnerable to cyber-attacks and hacks.

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

_________________Is an effect of retrieving a previous version of a document.

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

A________________is used to decrypt or encrypt a message.

4.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

__________________is a type of scam where a criminal imitates a website's URL.

5.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Making the text unreadable is a process called ____________________.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is the process of converting a plain text (readable) message into a cipher text (unreadable) message is called:

Polymorphism

Decryption

Cryptography

Bug

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A method replaces each original letter with a different letter in the alphabet by shifting the alphabet position up or down is called:

Caesar Cipher

Social Engineering

Footprint

Cryptography

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?