Search Header Logo

4th form IT Q1 Final Exam Review

Authored by miguel Salazar

Information Technology (IT)

12th Grade

Used 3+ times

4th form IT Q1 Final Exam Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

41 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

What is the primary purpose of encryption?

To make files smaller

To hide the original message from unauthorized people

To speed up internet connections

To create new cryptocurrencies

Answer explanation

The primary purpose of encryption is to hide the original message from unauthorized people, ensuring that only intended recipients can access the information.

2.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A Caesar Cipher is an encryption technique that:

Uses two different keys

Shifts the alphabet by a fixed number of characters

Maps each letter to a random other letter

Creates a digital signature

Answer explanation

A Caesar Cipher shifts the alphabet by a fixed number of characters, making it a simple substitution cipher. The other options do not accurately describe this technique.

3.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

What is a "key" in cryptography?

A button on a keyboard

A physical key for a lock

A secret password for locking and unlocking a message

A type of computer virus

Answer explanation

In cryptography, a "key" refers to a secret password used for locking and unlocking messages, ensuring that only authorized parties can access the information. This distinguishes it from physical keys or unrelated terms.

4.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

The process of unscrambling a message is called:

Encryption

Hashing

Decryption

Mining

Answer explanation

The process of unscrambling a message is known as decryption. It involves converting encoded or encrypted data back into its original form, making it readable again.

5.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

When the same key is used to encrypt and decrypt a message:

Asymmetric Encryption

Public Key Encryption

Symmetric Encryption

Blockchain

Answer explanation

Symmetric Encryption uses the same key for both encryption and decryption, making it distinct from Asymmetric and Public Key Encryption, which utilize a pair of keys. Blockchain is unrelated to encryption methods.

6.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

The key that is shared with everybody is called a:

Private Key

Public Key

Master Key

Secret Key

Answer explanation

The key that is shared with everyone is known as a Public Key. It allows secure communication and encryption, contrasting with a Private Key, which is kept secret and used for decryption.

7.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A unique representation of a message is called a:

Nonce

Message Signature

Message Hash

Ledger

Answer explanation

A message hash is a unique representation of a message, created by applying a hash function. It ensures data integrity and is used in various applications, including digital signatures and blockchain technology.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?