Biometrics Are Not Better

Biometrics Are Not Better

6th - 8th Grade

12 Qs

quiz-placeholder

Similar activities

"The Grand Mosque of Paris"

"The Grand Mosque of Paris"

8th Grade

10 Qs

Relative Pronouns

Relative Pronouns

6th - 8th Grade

10 Qs

Unit 11 Test- 6th Grade

Unit 11 Test- 6th Grade

6th Grade

10 Qs

Biometrics Are Not Better

Biometrics Are Not Better

6th Grade

10 Qs

Unit 1 Vocabulary

Unit 1 Vocabulary

6th - 7th Grade

12 Qs

Investigate

Investigate

7th Grade

12 Qs

Ways to Know You Comprehension

Ways to Know You Comprehension

5th - 12th Grade

15 Qs

Trimestre 3 6to

Trimestre 3 6to

6th Grade

16 Qs

Biometrics Are Not Better

Biometrics Are Not Better

Assessment

Quiz

English

6th - 8th Grade

Medium

CCSS
RI.6.2, L.6.4A, RI.6.4

+7

Standards-aligned

Created by

Rachel Barnett

Used 18+ times

FREE Resource

12 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

True or False: The author focuses on the production of energy in "Biometrics Are Not Better"?

Tags

CCSS.RI.6.1

CCSS.RI.6.2

CCSS.RI.6.6

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

"Biometrics are easier to use as passwords" and "They use an individual's unique features" are TWO perceived advantages or biometrics": True or False?

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Biometrics can be unreliable because body measurements can _____.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"You can't replace your fingerprints, your eyes, or any of your biometric data" is an example of______.

the right to privacy

bypassed

breaches

serious security risk

5.

DRAG AND DROP QUESTION

1 min • 1 pt

Biometrics could cause an individual to lose the right to ​ (a)  

privacy
vote
free speech

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Holes left in window shattered by hailstones" would be an example of_____.

breaches

bypassed

passwords

free speech

Tags

CCSS.L.6.4A

CCSS.RI.6.4

7.

DRAG AND DROP QUESTION

1 min • 1 pt

"The trail ahead was muddy, so I turned back and chose another path" is an example of​ ​ ​ (a)  

bypassed
mistakes
vulnerabilities
breaches

Tags

CCSS.L.6.4A

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?