Metadata
Technology & Computer Science Adult Learning Remember Medium
Metadata
  • Subject

    Technology & Computer Science

  • Education level

    Adult Learning

  • Cognitive goals

    Remember

  • Difficulty estimate

    Medium

  • Tags

    cryptography, encryption, hashing, digital signatures, key exchange, algorithms

  • Number of questions

    5

  • Created on

  • Generation source

  • License

    CC0 Public domain

  • Prompt

    Assess learners' ability to identify and classify common cryptographic algorithms (symmetric, asymmetric, hashing, MACs, stream/hybrid) and recall their primary uses—confidentiality, integrity, authentication, digital signatures, and key exchange—with representative examples such as AES, RSA, ECC, SHA-2, HMAC, and ChaCha20.
Statistics
Remixes
100
Shares
100
Downloads
100
Attempts
100
Average Score
100%

Mock data used for demo purposes.