Understanding Encryption and Quantum Cryptography

Understanding Encryption and Quantum Cryptography

Assessment

Interactive Video

Physics

9th - 10th Grade

Hard

Created by

Nancy Jackson

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why was encryption once considered a weapon by the United States?

It was used in military operations.

It was developed by the military.

It was used to create bombs.

It was seen as a threat to national security.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a simple substitution code?

A code that uses colors to represent letters.

A code that uses symbols to represent words.

A code that swaps each letter for another letter.

A code that uses numbers to represent letters.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a one-way function in encryption?

A function that is easy to reverse.

A function that is impossible to compute.

A function that is easy to compute but hard to reverse.

A function that uses colors to encode messages.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are prime numbers used in encryption?

They are easy to multiply but hard to factor.

They are easy to find and use.

They are the largest numbers available.

They are the smallest numbers available.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a major limitation of traditional encryption methods?

They are too expensive to implement.

They are not secure enough for military use.

They are easily broken by modern computers.

They require too much energy to use.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does quantum cryptography ensure secure communication?

By using traditional encryption methods.

By using polarized photons to create random keys.

By using large prime numbers.

By using complex mathematical equations.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens if an eavesdropper tries to intercept a quantum key?

The key remains unchanged.

The key becomes stronger.

The key changes, alerting the sender and receiver.

The key is destroyed.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?