Biometrics Are Not Better

Biometrics Are Not Better

6th - 8th Grade

12 Qs

quiz-placeholder

Similar activities

The Biometric Body

The Biometric Body

6th - 8th Grade

11 Qs

Biometrics Are Not Better

Biometrics Are Not Better

6th Grade

12 Qs

Biometrics Are Not Better

Biometrics Are Not Better

8th Grade

12 Qs

Biometrics Are Not Better

Biometrics Are Not Better

6th Grade

12 Qs

Biometrics

Biometrics

6th Grade

14 Qs

Biometric Body and Biometrics are not Better

Biometric Body and Biometrics are not Better

6th Grade

12 Qs

Biometrics Are Not Better

Biometrics Are Not Better

6th Grade

10 Qs

Biometrics

Biometrics

6th Grade

8 Qs

Biometrics Are Not Better

Biometrics Are Not Better

Assessment

Quiz

English

6th - 8th Grade

Medium

CCSS
RI.6.2, L.6.4A, RI.6.4

+7

Standards-aligned

Created by

Rachel Barnett

Used 17+ times

FREE Resource

12 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

True or False: The author focuses on the production of energy in "Biometrics Are Not Better"?

Tags

CCSS.RI.6.1

CCSS.RI.6.2

CCSS.RI.6.6

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

"Biometrics are easier to use as passwords" and "They use an individual's unique features" are TWO perceived advantages or biometrics": True or False?

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Biometrics can be unreliable because body measurements can _____.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"You can't replace your fingerprints, your eyes, or any of your biometric data" is an example of______.

the right to privacy

bypassed

breaches

serious security risk

5.

DRAG AND DROP QUESTION

1 min • 1 pt

Biometrics could cause an individual to lose the right to ​ (a)  

privacy
vote
free speech

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Holes left in window shattered by hailstones" would be an example of_____.

breaches

bypassed

passwords

free speech

Tags

CCSS.L.6.4A

CCSS.RI.6.4

7.

DRAG AND DROP QUESTION

1 min • 1 pt

"The trail ahead was muddy, so I turned back and chose another path" is an example of​ ​ ​ (a)  

bypassed
mistakes
vulnerabilities
breaches

Tags

CCSS.L.6.4A

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?