
Computer Science, Unit 2
Authored by Joan Davis
Computers
6th - 8th Grade
Used 18+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
21 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What part of your digital identity can you keep safe by making it difficult and changing it often?
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which Cipher hides information by shifting letter of the alphabet by a certain number?
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a trade-off to posting a digital photo of yourself at a party? (good and bad tradeoffs)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of network is normally found in a home, a LAN or a WAN?
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which protocols work together to send and receive packets of information across the Internet?
Which protocols work together to send and receive packets of information across the Internet?
Technology Protocol and Instant Protocol (TC / IP)
Transmission Control Protocol and Internet Protocol (TCP / IP )
Telenet Protocol and Intermedial Protocol (TC / IP)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If you have a cable modem but there are no cable lines in your area, can you use the cable modem to access the Internet?
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does 'CONFIDENTIALITY' assure?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?