Unit 2 Learning Aim A Revision quiz

Unit 2 Learning Aim A Revision quiz

11th Grade

53 Qs

quiz-placeholder

Similar activities

CSP Final Review

CSP Final Review

9th - 12th Grade

50 Qs

2.1 External Ports and Cables

2.1 External Ports and Cables

KG - Professional Development

54 Qs

Authentication/Access Control/Enterprise Architecture

Authentication/Access Control/Enterprise Architecture

9th Grade - University

50 Qs

AP CSP Quizizz 1-6 - MONDAY U4L5 Conditionals

AP CSP Quizizz 1-6 - MONDAY U4L5 Conditionals

9th - 12th Grade

54 Qs

Protocols and Hardware

Protocols and Hardware

11th - 12th Grade

58 Qs

CSS11_4TH_QTR_EXAM

CSS11_4TH_QTR_EXAM

11th Grade

50 Qs

Year 10 Big quiz so far

Year 10 Big quiz so far

9th - 11th Grade

55 Qs

CSS Quiz

CSS Quiz

11th - 12th Grade

50 Qs

Unit 2 Learning Aim A Revision quiz

Unit 2 Learning Aim A Revision quiz

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Ruth Lock

Used 14+ times

FREE Resource

53 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

Explain one way that the health sector uses technology to care for patients

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 1 pt

State one type of PoS (Point of Sale) technology

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

3 mins • 1 pt

Describe one benefit of PoS Technology for Customers

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

3 mins • 1 pt

Describe two benefits of PoS technology for Sellers

Evaluate responses using AI:

OFF

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which one of these terms means 'using resources to meet current needs without taking away resources for the future?

Sustainability

Carbon Footprint

Greenhouse effect

Renewable Energy

6.

OPEN ENDED QUESTION

3 mins • 1 pt

Malware is a threat to computer security, identify two examples of malware

Evaluate responses using AI:

OFF

7.

OPEN ENDED QUESTION

3 mins • 1 pt

All computer systems are at risk of attacks from unauthorised sources, describe two ways in which a user can use software to protect their system from these types of attacks.

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?