Digital Security

Digital Security

5th - 8th Grade

12 Qs

quiz-placeholder

Similar activities

Phishing (Be Internet Awesome)

Phishing (Be Internet Awesome)

3rd - 8th Grade

9 Qs

Fake news

Fake news

8th Grade

12 Qs

CSE-2 Unit 1.5 Mid Unit Assessment

CSE-2 Unit 1.5 Mid Unit Assessment

6th - 8th Grade

10 Qs

Fake News

Fake News

5th - 8th Grade

10 Qs

tik tok

tik tok

6th Grade - University

10 Qs

Finding Balance In a Digital World

Finding Balance In a Digital World

6th Grade

10 Qs

Fake or Real Headlines Quiz!

Fake or Real Headlines Quiz!

6th - 8th Grade

16 Qs

Fun review Friday

Fun review Friday

5th Grade

16 Qs

Digital Security

Digital Security

Assessment

Quiz

Computers

5th - 8th Grade

Hard

Created by

Hayden Armistead

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This was taken from the article you read.


Lyu and his team at the University at Albany in New York introduced software last year that could spot deepfake videos. It looked at how often the faces blink.


HOW does this paragraph support the main idea of the article?

It shows that people in videos usually blink.

It shows that scientists are finding ways to spot deepfakes.

It shows that some scientists look at videos as a team.

It shows why lawmakers want to pass laws about deepfakes.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This was taken from the article you read.


The 2020 presidential election is coming up. The U.S. government is worried about fake videos fooling voters. Lawmakers and universities are developing software that can find and stop the videos. They are called deepfakes.


Which statement summarizes the paragraph?

Videos might fool voters when they go to vote in the 2020 presidential election.

The U.S. government wants to find and stop deepfakes from fooling voters in the 2020 election.

Lawmakers and universities think that deepfakes will fool voters about the 2020 election.

The U.S. government is working with universities to find videos about the 2020 election.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This article is mostly organized using problem and solution as the structure.


Why do you think the author chose to organize the information this way?

to explain the history of the development of fake videos and and why people make them

to compare the effectiveness of different methods scientists have developed to study fake videos

to describe the first fake video that was created and some of the different effects of that video

to explain why the U.S. government is worried about fake videos and what it is doing to stop them

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This was taken from the article's introduction [paragraphs 1-5] and the final section “Fake News Anchors On TV In China.”


What is one connection between these two sections?

The introduction states that fake videos used to take a lot of time and expertise to make, and the final section explains why.

The introduction explains how fake video can be used to commit crimes, and the final section gives some examples of this.

The introduction explains what AI is, and the final section gives some examples of AI being used to generate videos of newspeople.

The introduction states that there has been a rise in AI, and the final section explains the main cause of this rise.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Description of digital security

the protection of a computer's internet account and files from intrusion by an outside user

the management of change and development within a business or similar organization.

a monitor filtersthat decrease the viewing angle of a monitor, preventing it from being viewed from the side;

prejudice for or against one person or group, especially in a way considered to be unfair.

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

How much of the information that we post online can be 100% secure?

None

About half

Nearly all

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Why do students need to learn about digital security?

To learn how to protect themselves from online threats

Because it is required for them

To learn how to give personal information out to online users

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?