Ciphers

Ciphers

7th Grade

10 Qs

quiz-placeholder

Similar activities

Cryptography

Cryptography

6th - 8th Grade

8 Qs

Cryptography

Cryptography

7th - 9th Grade

13 Qs

Ciphers

Ciphers

7th Grade

10 Qs

8.3.7 Plenary Quiz

8.3.7 Plenary Quiz

7th Grade

15 Qs

Encryption! for CCMS

Encryption! for CCMS

7th - 8th Grade

9 Qs

Quiz 4: Internet safety, cyber security and encryption

Quiz 4: Internet safety, cyber security and encryption

7th - 8th Grade

13 Qs

Cipher Encryption

Cipher Encryption

6th - 8th Grade

7 Qs

Encryption and Data Security Quiz

Encryption and Data Security Quiz

6th - 8th Grade

9 Qs

Ciphers

Ciphers

Assessment

Quiz

Computers

7th Grade

Easy

Created by

Quizizz Content

Used 14+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The process of converting a ciphertext into plaintext.

encryption

decryption

hashing

encoding

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you were to use a caeser cipher with a key of 3 shifts to the left, how would you encrypt the word: Cipher?

ZFMEBO

WDCIBL

ZBMEHO

YBLAEN

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The process of converting plaintext to ciphertext.

decryption

encryption

hashing

encoding

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A specific encryption code

Cipher

Key

Algorithm

Hash

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the algorithm of ceasar's cipher?

Each letter is replaced with a letter a certain number of steps down the alphabet.

Each letter is replaced with the next letter in the alphabet.

Each letter is replaced with a random letter.

Each letter is replaced with the letter two steps back in the alphabet.

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Encryption is a way of

Securing Information on a network

Transmitting data without protection

Storing data in plain text

Accessing unauthorized information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encrypted passwords will provide guaranteed protection from hacking

TRUE

FALSE

Partially true

Depends on the encryption method

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?