Search Header Logo

Privacy Quiz

Authored by Vincent Williams

English

10th Grade

CCSS covered

Used 101+ times

Privacy Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which TWO statements identify the central ideas of the text?

As technology continues to develop, smartphone apps will become more advanced and privacy violations will not occur.

Software designers have developed tools to help protect users’ personal information from improper gathering.

The only way to ensure that private information is not secretly collected is to ban smartphones.

Smartphone sensors put the user’s private information at risk much more than they improve the user’s experience.

Smartphones are equipped with a variety of sensors that collect more information than a person may realize or be comfortable with.

Tags

CCSS.RI. 9-10.2

CCSS.RI.11-12.2

CCSS.RL.11-12.2

CCSS.RL.9-10.2

CCSS.RI.8.2

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the author’s overall purpose in the text

to discourage readers from using smartphones

to prove that smartphone sensors are not for the user’s benefit

to criticize technology companies for not adopting security measures

to promote awareness among readers about smartphones and apps

Tags

CCSS.RI. 9-10.6

CCSS.RI.11-12.6

CCSS.RI.8.6

CCSS.RL.11-12.6

CCSS.RL.9-10.6

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

How does the discussion of people’s reliance on smartphones in paragraphs 1-4 contribute to the text?

It suggests that smartphones only collect information that will improve its reliability as a tool for users.

It shows how people willingly give information so that their smartphone will act as a reliable tool.

It shows how people’s reliance on smartphones allows for data to be collected about them.

It suggests that invasive apps will not affect people’s reliance on their smartphones.

Tags

CCSS.RI. 9-10.2

CCSS.RI.11-12.2

CCSS.RL.11-12.2

CCSS.RL.9-10.2

CCSS.RI.8.2

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

How does paragraph 25 contribute to the development of ideas in the text?

It shows how information collected by sensors could be used in a way that negatively affects you.

It emphasizes how it is impossible to keep your smartphone from collecting information about you.

It stresses how unethical companies are and what they are willing to do to learn more about you.

It proves to readers why they should disable the sensors on their smartphones when not actively using an app.

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the meaning of “benign” in paragraph 30?

dangerous

harmless

healthy

private

Tags

CCSS.RI.11-12.4

CCSS.RI.9-10.4

CCSS.RL.11-12.4

CCSS.RL.9-10.4

CCSS.RL.8.4

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

According to paragraph 45, how are phone sensor attacks developing over time?

They are spreading from infected phones into nearby phones.

They are becoming easier for security teams to identify and stop.

They are becoming more advanced in how they collect and use data.

They are a starting to target younger generations who use technology more.

Tags

CCSS.RI. 9-10.2

CCSS.RI.11-12.2

CCSS.RL.11-12.2

CCSS.RL.9-10.2

CCSS.RL.8.2

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can smartphone security systems affect user experience?

They make smartphones more accessible for users

They block the sensors that make apps more user-friendly.

They do not let users access the apps that users rely on.

They risk introducing new apps that can be hacked by criminals.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?