
CSA Unit 2
Authored by Ms B
Computers
9th - 12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following people can access your digital footprint?
I. Teachers, colleges, and scholarship committees II. Potential employers III. Family, friends, and acquaintances
A I only
B I and II only
C III only
D I-III All
A
B
C
D
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following people can access your digital footprint?
A person’s digital footprint is:
A Public, but not usually permanent
B Only public to people whom a person shares things with, but what’s there is permanent
C Public and permanent to anyone
A
B
C
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following people can access your digital footprint?
What should you do if you are a victim of cyberbullying?
I. Respond to the bully II. Keep a record of messages received (print or take screenshots) III. Reach out to parents, teachers, counselors, and school administrators IV. Block communication from the bully (if possible)
A I only
B I - IV all
C II, III, and IV
D II and III
A
B
C
D
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
How can you be an upstander if you witness cyberbullying?
A Reach out to the victim–let them know that you care and encourage them to seek help
B Tell a teacher, parent, or counselor about the bullying
C Report bullying to the website admin
D All of the above
A
B
C
D
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, even if you change your settings.
A True. This is always the case.
B True. Changing your settings does not affect the privacy policy.
C False. It depends if the privacy policy allows you to opt in or out of sharing data.
D False. Companies do not give you the option to update your settings.
A
B
C
D
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following is an example of two factor authentication?
A You are asked to factor a large prime number in order to gain access to sensitive data.
B You are asked to reset your password every other time you enter a secure website.
C After inputting your password, you are asked to enter it again.
D After inputting your password, you receive a text message with a unique pin.
A
B
C
D
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following pieces of information would be safe to include in an online username?
A School mascot
B Favorite sport
C Year of birth
D City of residence
A
B
C
D
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Word 2016
Quiz
•
10th Grade
10 questions
C# lesson10
Quiz
•
1st - 10th Grade
15 questions
Excel - basic
Quiz
•
9th Grade
10 questions
HTML & Google Site Seatwork
Quiz
•
12th Grade
10 questions
Konsep Routing
Quiz
•
1st - 10th Grade
15 questions
Cyber Security Homework 1
Quiz
•
7th - 9th Grade
15 questions
Identidad Corporativa
Quiz
•
10th Grade
10 questions
ICT as Social Change
Quiz
•
12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade