Understanding Encryption and Quantum Cryptography

Understanding Encryption and Quantum Cryptography

Assessment

Interactive Video

Physics

9th - 10th Grade

Practice Problem

Hard

Created by

Nancy Jackson

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why was encryption once considered a weapon by the United States?

It was used in military operations.

It was developed by the military.

It was used to create bombs.

It was seen as a threat to national security.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a simple substitution code?

A code that uses colors to represent letters.

A code that uses symbols to represent words.

A code that swaps each letter for another letter.

A code that uses numbers to represent letters.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a one-way function in encryption?

A function that is easy to reverse.

A function that is impossible to compute.

A function that is easy to compute but hard to reverse.

A function that uses colors to encode messages.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are prime numbers used in encryption?

They are easy to multiply but hard to factor.

They are easy to find and use.

They are the largest numbers available.

They are the smallest numbers available.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a major limitation of traditional encryption methods?

They are too expensive to implement.

They are not secure enough for military use.

They are easily broken by modern computers.

They require too much energy to use.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does quantum cryptography ensure secure communication?

By using traditional encryption methods.

By using polarized photons to create random keys.

By using large prime numbers.

By using complex mathematical equations.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens if an eavesdropper tries to intercept a quantum key?

The key remains unchanged.

The key becomes stronger.

The key changes, alerting the sender and receiver.

The key is destroyed.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?