Effects of computer usage

Effects of computer usage

3rd Grade

8 Qs

quiz-placeholder

Similar activities

Tin học 3 - Tuần 10 - Bảo mật máy tính

Tin học 3 - Tuần 10 - Bảo mật máy tính

1st - 5th Grade

10 Qs

Memory

Memory

KG - University

5 Qs

BHP przy komputerach

BHP przy komputerach

KG - 5th Grade

12 Qs

G3 Understanding Media Balance and Safety

G3 Understanding Media Balance and Safety

3rd Grade

10 Qs

Form 1F Assessment 1

Form 1F Assessment 1

3rd Grade

11 Qs

Effects of computer usage

Effects of computer usage

Assessment

Quiz

Computers

3rd Grade

Medium

Created by

Shemella Griffiths

Used 4+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which of these are potential health risks due to prolonged ICT usage? (select all the correct answers)

Broken finger

eye strain

Broken neck

Repetitive Strain Injury

back ache

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

RSI usually causes injury on the

neck

toes

fingers

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

RSI stands for

Respiratory Statutory Injuries

Repetitive Strain Injury

Repeated strains and injuries

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which is a better way to prevent eye strain from prolonged use of the computer?

wash your face every 6 hours

walk away from computer and blink regularly

wear a sun glasses

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Inflammation of Tendons in the wrist causing pressure on the median nerve is known as

Cooperate Therapeutic Syndrome

Canary Therapeutic Symptoms

Carpal Tunnel Syndrome

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

When sitting in a chair your back should be straight at a 90 degree angle to your hips

True

False

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is phishing?

scams through text messages

scams through emails

scams through video calls

8.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

When someone wrongfully acquires and uses someone’s personal identification, credit or account information. What is it called?

Hacking

identity theft

hacking identity

Similar Resources on Wayground