
Workplace Readiness Skills (H)
Authored by Carrington Faulk
Professional Development
9th - 12th Grade
Used 36+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
71) Which of the following is the MOST credible Internet source for research?
A. a web discussion forum
B. a political advertisement video
C. a peer-reviewed blog
D. a private social network page
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
72) How can you BEST reflect expert opinions in your research that support your opinions on a topic?
A. Accurately describe your opinions based on your influences.
B. Provide a list of documents that helped create your beliefs.
C. Use a quotation as the main thesis or idea of your argument.
D. Quote directly from the expert's words, citing the source.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
73) Which is TRUE about beliefs versus facts?
A. Beliefs are personal truths but unproven.
B. Beliefs are used to make scientific decisions.
C. Beliefs are evidence-based.
D. Beliefs have no place in making purchase decisions.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
74) Social networking websites can reveal a great deal about an individual. What types of items should you avoid putting on your social networking site?
A. photos of your family
B. sensitive comments about your workplace
C. photos of your pets
D. favorite movies
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
75) Nicholas needs to create a strong password for his online banking account. Which of the following would be considered the strongest password?
A. 12898Nicholas
B. Nich0laS
C. pq98#3!4dn
D. 33ElmStreet
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
76) Software intended to damage or disable other computer systems is:
A. malware.
B. firewall.
C. subscriber line.
D. Wi-Fi.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
77) Which of the following is the BEST description of SPAM?
A. an application for smart phones
B. an unsolicited e-mail message or advertisement
C. an unsecured URL address
D. a secure protocol application for websites
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?