Search Header Logo

data transmission

Authored by Roberta Fabian

Computers

9th - 12th Grade

Used 1+ times

data transmission
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The text following an encryption algorithm is called:

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Select the true statement about asymmetric encryption:

uses a public key only

uses both a public key and a private key

uses private key only

always uses 64-bit encryption

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The message before it is encrypted is called:

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Which type of encryption is used when both the sender and the recipient use the same key to encrypt and decrypt?

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The final number in a code, calculated from all the numbers in the code, whose purpose is to find errors in data entry:

parity check

checksum

check digit

cyclic redundancy check

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Form of error detection that makes use of a system of acknowledgements and timeouts:

Automatic Repeat Request

Echo check

check digit

Cyclic redundancy check

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Uses a calculated value that is sent after a block of data; the receiving computer also calculates the value from the block of data and compares the values.

parity check

check digit

packet switching

checksum

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?