ETECH QUIZ

ETECH QUIZ

11th Grade

10 Qs

quiz-placeholder

Similar activities

Excel Intro

Excel Intro

7th - 12th Grade

10 Qs

ICT QUIZBEE

ICT QUIZBEE

11th - 12th Grade

15 Qs

Artistic Effects Word 2016

Artistic Effects Word 2016

10th - 12th Grade

10 Qs

Close Reading the Interent

Close Reading the Interent

KG - University

10 Qs

Excel

Excel

10th - 12th Grade

15 Qs

SciVis I Unit 3 C

SciVis I Unit 3 C

9th - 12th Grade

14 Qs

Latihan Teori Kelas 6 Semester 2

Latihan Teori Kelas 6 Semester 2

11th - 12th Grade

15 Qs

Audience-Copyright and Software Piracy-ICT

Audience-Copyright and Software Piracy-ICT

10th - 11th Grade

10 Qs

ETECH QUIZ

ETECH QUIZ

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Jose Patnugot

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 2 pts

Borrows phrases from a source without using quotation marks

Mosaic Plagiarism

Accidental Plagiarism

Direct Plagiarism

Self Plagiarism

2.

MULTIPLE CHOICE QUESTION

10 sec • 2 pts

neglects to cite their sources, or misquotes their sources.

Direct Plagiarism

Self Plagiarism

Accidental Plagiarism

Mosaic Plagiarism

3.

MULTIPLE CHOICE QUESTION

10 sec • 2 pts

Word-for-Word transcription of someone’s work without quotation or credit.

Self Plagiarism

Accidental Plagiarism

Direct Plagiarism

Mosaic Plagiarism

4.

MULTIPLE CHOICE QUESTION

10 sec • 2 pts

contains the current slide in your presentation. You can use the vertical scroll bar to view other slides in the presentation.

Ribbon

View Area

Slide Pane

Status Bar

5.

MULTIPLE CHOICE QUESTION

10 sec • 2 pts

indicates the software, the name of the presentation that is open, minimize, maximize, and close buttons.

View Area

Title Bar

Status Bar

Tabs

6.

FILL IN THE BLANK QUESTION

10 sec • 2 pts

Republic Act ______ or the Cybercrime Prevention Act of 2012

7.

FILL IN THE BLANK QUESTION

20 sec • 2 pts

__________ is an attack when a malicious party impersonates another device or user on a network in order to launch attack against network hosts.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?