2ND TERM STEAM CAT 2025

2ND TERM STEAM CAT 2025

5th Grade

20 Qs

quiz-placeholder

Similar activities

Code Quiz

Code Quiz

KG - University

21 Qs

HTML

HTML

1st - 5th Grade

20 Qs

HTML and CSS Review

HTML and CSS Review

3rd Grade - Professional Development

17 Qs

การสร้างเว็บไซต์

การสร้างเว็บไซต์

KG - Professional Development

15 Qs

GR 5 SA1 preparationquiz

GR 5 SA1 preparationquiz

5th Grade

18 Qs

Html tags

Html tags

1st - 12th Grade

15 Qs

HTML Coding

HTML Coding

3rd - 6th Grade

25 Qs

Web Programming Intro Quiz

Web Programming Intro Quiz

5th - 8th Grade

18 Qs

2ND TERM STEAM CAT 2025

2ND TERM STEAM CAT 2025

Assessment

Quiz

Computers

5th Grade

Medium

Created by

Grade5 teacher

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital theft in Computer Security is described as ____________.

the legal acquisition of digital information
the unauthorized access and theft of digital information
the process of securing digital data
the sharing of digital information among users

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following options is a strong password?

password123
12345678
qwertyuiop
P@ssw0rd123!

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital theft can be prevented by using ____________ for different accounts.

the same password for all accounts
no password at all
passwords that are easy to guess
unique passwords

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is another name for an exhaustive search attack?

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Two-factor authentication adds an extra layer of _______.

security
authentication
encryption
verification

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Caesar cipher is explained as ________.

a type of transposition cipher
a substitution cipher that shifts letters by a fixed number of places
a method of encrypting images
a technique for encoding numbers

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the key in a Caesar Cipher?

The key is a random string of letters.
The key is the alphabet used in the cipher.
The key is the number of positions each letter is shifted.
The key is the original message itself.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?