Unit 2 Learning Aim A Revision quiz

Unit 2 Learning Aim A Revision quiz

11th Grade

53 Qs

quiz-placeholder

Similar activities

ICT in society

ICT in society

5th Grade - University

50 Qs

TEK LAYANAN JARINGAN

TEK LAYANAN JARINGAN

11th Grade

56 Qs

SOAL PAS SEMESTER GANJIL

SOAL PAS SEMESTER GANJIL

11th Grade

50 Qs

CSS11_4TH_QTR_EXAM

CSS11_4TH_QTR_EXAM

11th Grade

50 Qs

CSS Quiz

CSS Quiz

11th - 12th Grade

50 Qs

Advanced HTML5 & CSS3 Part IV

Advanced HTML5 & CSS3 Part IV

9th - 12th Grade

55 Qs

Blender 3D

Blender 3D

11th Grade

50 Qs

Av1 - Informática Básica - IFAL Coruripe

Av1 - Informática Básica - IFAL Coruripe

10th - 12th Grade

50 Qs

Unit 2 Learning Aim A Revision quiz

Unit 2 Learning Aim A Revision quiz

Assessment

Quiz

Computers

11th Grade

Practice Problem

Medium

Created by

Ruth Lock

Used 14+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

53 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

Explain one way that the health sector uses technology to care for patients

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 1 pt

State one type of PoS (Point of Sale) technology

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

3 mins • 1 pt

Describe one benefit of PoS Technology for Customers

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

3 mins • 1 pt

Describe two benefits of PoS technology for Sellers

Evaluate responses using AI:

OFF

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which one of these terms means 'using resources to meet current needs without taking away resources for the future?

Sustainability

Carbon Footprint

Greenhouse effect

Renewable Energy

6.

OPEN ENDED QUESTION

3 mins • 1 pt

Malware is a threat to computer security, identify two examples of malware

Evaluate responses using AI:

OFF

7.

OPEN ENDED QUESTION

3 mins • 1 pt

All computer systems are at risk of attacks from unauthorised sources, describe two ways in which a user can use software to protect their system from these types of attacks.

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?