FREE! Click here to Join FunTrivia. Thousands of games, quizzes, and lots more!
Quiz about Code
Quiz about Code

Code Trivia Quiz


Let us take a look at some codes and ciphers used by spies and those who want to keep a secret.

A photo quiz by ClaudiaCat. Estimated time: 4 mins.
  1. Home
  2. »
  3. Quizzes
  4. »
  5. World Trivia
  6. »
  7. Global Trivia
  8. »
  9. Espionage & Codebreaking

Author
ClaudiaCat
Time
4 mins
Type
Photo Quiz
Quiz #
388,158
Updated
Dec 03 21
# Qns
10
Difficulty
Average
Avg Score
8 / 10
Plays
376
Awards
Top 35% Quiz
Last 3 plays: Guest 115 (9/10), Guest 46 (7/10), Guest 114 (6/10).
-
Question 1 of 10
1. During WWII one of the most famous codes was broken at Bletchley Park. What code was it? Hint


Question 2 of 10
2. A well-known code or cipher was named after a Roman Emperor. Which one? Hint


Question 3 of 10
3. The name of this cipher makes me think about bringing something home. What is it?

Answer: (Five letters)
Question 4 of 10
4. The "wind talkers" code during WWII was based on the language of what American native people? Hint


Question 5 of 10
5. Who was the inventor of the telegraph, and this code which bears his name? Hint


Question 6 of 10
6. This code or cipher, that uses a combination of a "x" and a "grid", is given what name? Hint


Question 7 of 10
7. Which of the following codes in particular was used extensively by prison inmates? Hint


Question 8 of 10
8. This is a substitution cipher that replaces each letter with one 13 places further on. What is it called? Hint


Question 9 of 10
9. This code takes the form of a wheel and has links to flags. What is its name? Hint


Question 10 of 10
10. An encoding that represents text in computers, telecommunications equipment, and other devices is called what? Hint



(Optional) Create a Free FunTrivia ID to save the points you are about to earn:

arrow Select a User ID:
arrow Choose a Password:
arrow Your Email:




View Image Attributions for This Quiz

Most Recent Scores
Apr 09 2024 : Guest 115: 9/10
Mar 22 2024 : Guest 46: 7/10
Mar 15 2024 : Guest 114: 6/10
Feb 28 2024 : Bonnagl: 2/10
Feb 26 2024 : Guest 1: 7/10

Score Distribution

quiz
Quiz Answer Key and Fun Facts
1. During WWII one of the most famous codes was broken at Bletchley Park. What code was it?

Answer: Enigma Code

The Enigma Machine was a cipher machine used by the Germans in WWII. The code was considered unbreakable by the Germans and when the British broke the code they wanted the Germans to believe that it had not been broken. Alan Turing was the mastermind behind the decoding of the machine.

The Enigma machine worked on a rotor system consisting of a keyboard, disks, spindle and a key press.
2. A well-known code or cipher was named after a Roman Emperor. Which one?

Answer: Caesar

The Caesar cipher or code, also known as the Caesar Shift Code or simply the Shift Code, is considered a simple encryption. The original letters of the word are either shifted up or down by a certain number. The most common shift is three letters up or down, for example "a" becomes "d" or "x".
3. The name of this cipher makes me think about bringing something home. What is it?

Answer: Bacon

Francis Bacon was an Englishman of many talents including being a statesman, scientist, author and philosopher. The cipher attributed to Bacon requires replacing each letter with either five letters or a binary number.
4. The "wind talkers" code during WWII was based on the language of what American native people?

Answer: Navajo

Although the Navajo Indians were not the first nor the only Native American code talkers, they were the most successful. Utilised extensively and successfully in WWII by the American Marines in the Pacific, the success of the Navajo Code was portrayed in the film "Windtalkers" starring Nicholas Cage.
5. Who was the inventor of the telegraph, and this code which bears his name?

Answer: Morse

Samuel Morse came up with this code by transmitting text using a series of recognisable tones that the receiver could translate. Based on the Latin alphabet and Arabian numerals Morse utilised a series of short and long tones for his code. Of course the most common Morse Code message for everyone is the call sign for "SOS".
6. This code or cipher, that uses a combination of a "x" and a "grid", is given what name?

Answer: Pigpen Code

A common cipher is the pigpen cipher which also has an association with the Masons and Freemasons, as well as Napoleon. The code is based on exchanging letters for symbols through a grid basis. The grid uses different symbols to represent a letter and each grid represents one letter which spells out the word.
7. Which of the following codes in particular was used extensively by prison inmates?

Answer: Tap Code

The Tap Code was especially used by prisoners, and involved tapping a bar or other surface so the other prisoners could receive the message. The code is based on a grid of five by five grid. The grid consists of five rows and five columns. Each letter has two taps associated with it, the first tap indicates the row and the second tap indicates the column.
8. This is a substitution cipher that replaces each letter with one 13 places further on. What is it called?

Answer: ROT 13

There are a number of "ROT" ciphers with the most commonly used one is "ROT 13". Simply put the letter is represented by the letter that is 13 letters after it. For example, "a" becomes "n".
9. This code takes the form of a wheel and has links to flags. What is its name?

Answer: Wig Wag Cipher

The Wig Wag code was used extensively in the America and is based on a flag system utilised in its Civil War. The system was considered easier due to one flag being used that was simply moved from the left or the right. At night the flag was replaced by a lantern, where the same principles of signalling was used.
10. An encoding that represents text in computers, telecommunications equipment, and other devices is called what?

Answer: ASCII

As computers can only understand numbers a system was developed that converted letters and symbols to numbers. The American Standard Code for Information Interchange is used to do it, it converts things such as "@", "%" and "a" etc into numbers that can be read by the computer.
Source: Author ClaudiaCat

This quiz was reviewed by FunTrivia editor stedman before going online.
Any errors found in FunTrivia content are routinely corrected through our feedback system.
4/25/2024, Copyright 2024 FunTrivia, Inc. - Report an Error / Contact Us