ITGS Strand 1

ITGS Strand 1

11th Grade

10 Qs

quiz-placeholder

Similar activities

CSP Unit 1 Chapter 2 Review

CSP Unit 1 Chapter 2 Review

9th - 12th Grade

10 Qs

CSP Chapter 1 Vocabulary

CSP Chapter 1 Vocabulary

9th - 12th Grade

13 Qs

Networks Quiz

Networks Quiz

11th Grade

15 Qs

1.1 Network Topologies

1.1 Network Topologies

KG - University

10 Qs

Code.org Unit 2 - The Internet Review

Code.org Unit 2 - The Internet Review

9th - 12th Grade

15 Qs

ITGS: Introduction - What is ITGS

ITGS: Introduction - What is ITGS

9th - 12th Grade

12 Qs

AP CSP Unit 1 Ch 2 vocab

AP CSP Unit 1 Ch 2 vocab

9th - 12th Grade

12 Qs

ITGS Strand 1

ITGS Strand 1

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Sasikala Saravanan

Used 13+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Involves a user providing their identity to gain access to a computer system.

Anonymity

Authenticity

Security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The diminishing importance of geographical, political, economic, and cultural boundaries.

Digital citizenship

Globalization and Cultural Diversity

Authenticity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using information technology ethically and in a way that does not harm other users or their hardware and software.

Standards and Protocols

Incorrect

Authenticity

Intellectual Property

Correct

Digital citizenship

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How well a computer system works and the correctness of data.

Reliability and Integrity

Authenticity

Standards and Protocols

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The way humans interact with IT, including physical interaction through user interfaces and or psychological responses to IT.

Authenticity

Standards and Protocols

People and Machines

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rules designed to control the way people use IT.

Reliability and Integrity

Authenticity

Policies

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Protecting IT systems from unauthorized users

Security

Authenticity

Standards and Protocols

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?