UTeach Questions & Answers
Algorithm - ANSWERSA set of steps that completes a task
Flowchart - ANSWERSVisual representation of the structure and organization of an
algorithm
Sequence - ANSWERSEach step of an algorithm follows the previous step
Selection - ANSWERSConditional situation where an algorithm decides which
sequence of instructions to execute
Iteration - ANSWERSCompletion and repetition of a sequence
Encryption/Encode and Decryption/Decode - ANSWERSprotect and secure information
by rendering the information unreadable and then readable again using a strategy
Caesar cipher - ANSWERSOffsetting the alphabet by a certain number to scramble the
letters of a communication
Symmetric (single key) encryption - ANSWERSUse of the same key for encryption and
decryption
Asymmetric (public key) encryption - ANSWERSUse of pairs of keys, public to many
users and private to the owner, for encryption and decryption
Cybersecurity - ANSWERSMeasures taken to protect a computer or computer system
against unauthorized access or attack
Vigenere cipher - ANSWERSRotates the Caesar cipher offset used to encrypt each new
letter in a text
Confidentiality - ANSWERSAbility to limit access to information to a certain set of users
Secure Sockets Layer(SSL) - ANSWERSProcess where secure information is sent with
a lock; the lock is then used by the receiver of the information and sent back to the
sender; the lock is then opened by the original sender
Integrity - ANSWERSCertainty that information is correct
Availability - ANSWERSReliability of access to information