1.
Fill in the Blanks
a. ________________________ is when a fault with hardware or software stops a
network from working properly.
b. Encryption helps to exchange data between _________________ and browsers
safely.
c. Encrypted data is known as __________________.
d. ____________________ helps to protect the data you send, receive or store.
e. _____________________refers to the criminal activities carried out by the means
of computers on the internet.
f. An ________________________ is the secret that explains how a message is
coded.
g. A ciphertext can be decrypted by applying the same number of shift in the
________________direction.
h. The two types of cipher texts are __________________ and _______________.
i. ______________________ is also known as substitution cipher.
2. True and False
a. Network Failure may affect some services connected to the network.
b. The jobs of police officers can be affected if there is a network error.
c. Unencrypted data is called plain text.
d. Encryption stops people from intercepting a message.
e. Cybercriminals try to steal personal information for financial gain.
3. Answer the Following
a. Give two examples of how network failure affects hospitals.
________________________________________________________________________
________________________________________________________________________
b. What do you mean by encryption?
________________________________________________________________________
________________________________________________________________________
Why do applications need to use encryption?
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
c. What is a Caesar cipher?
________________________________________________________________________
________________________________________________________________________
d. Encrypt the word “Happy” using Caesar Cipher with a key of 4.
________________________________________________________________________
e. Decode “ZHOO GRQH” with a key of 3.
________________________________________________________________________
f. Draw the Pigpen cipher key.
g. Explain the difference between Pigpen cipher and Caesar cipher.
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________