Unit 3 Review - Careers & Security

Unit 3 Review - Careers & Security

6th Grade

20 Qs

quiz-placeholder

Similar activities

Revamped New Hire Induction

Revamped New Hire Induction

KG - 12th Grade

15 Qs

Barter, Money and Instruments of Exchange Intro Quiz

Barter, Money and Instruments of Exchange Intro Quiz

6th Grade - University

20 Qs

Roles of a Buyer

Roles of a Buyer

6th Grade

15 Qs

communication skill

communication skill

1st - 10th Grade

15 Qs

Marketing

Marketing

3rd - 8th Grade

15 Qs

Brand _ Trivia _ Logos

Brand _ Trivia _ Logos

KG - Professional Development

20 Qs

QUIZ 2 : TOPIC 8 [ACCOUNTING FOR INVENTORIES]

QUIZ 2 : TOPIC 8 [ACCOUNTING FOR INVENTORIES]

1st Grade - University

20 Qs

Economics and Business

Economics and Business

6th Grade

20 Qs

Unit 3 Review - Careers & Security

Unit 3 Review - Careers & Security

Assessment

Quiz

Business

6th Grade

Medium

CCSS
RI.11-12.10, RI.6.10, RI.7.10

+2

Standards-aligned

Created by

Manuel Alvarez

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In order to use someones copyrighted work you must?

Do nothing
Cite Google as a source
Ask owner for permission
Ask teacher for permission

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Suppose you are downloading an image from the Internet to add to a report for school. What should you include in your bibliography?

A header
 A citation 
A side note 
 An e-mail notification

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is protected by copyright laws?

Plagiarism

Original Works

Facts

Ideas

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the dangers or using school and work emails for personal reasons?

Privacy Issues

Copyright Infringement

Server Shut Downs

ISP Connectivity Issues

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following definitions defines malware?

the attempt to obtain sensitive information such as usernames, passwords by disguising as a trustworthy entity in an electronic communication.

software that is intended to damage or disable computers and computer systems

the deliberate use of someone else's identity, usually as a method to gain a financial advantage

The collected info about an individual across multiply websites

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware is intended to _________ or ________ computers using various harmful programs. 

Fix, Restore
Damage, Disable
Damage, Fix
Disable, Recover

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Spam?

known as junk mail
spam is used as a method of helping people
spam can be used to send usefull links
nice website 

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?