3rd Qtr ETECH Review Part 1

3rd Qtr ETECH Review Part 1

11th Grade

35 Qs

quiz-placeholder

Similar activities

Principles of Computer Programming

Principles of Computer Programming

9th - 12th Grade

30 Qs

Administras Infrastrktur Jaringan - Kelas XII TKJ - SMK Peristek

Administras Infrastrktur Jaringan - Kelas XII TKJ - SMK Peristek

9th - 12th Grade

40 Qs

MOTHERBOARD

MOTHERBOARD

11th - 12th Grade

40 Qs

Python Basics-01

Python Basics-01

9th - 12th Grade

32 Qs

Adobe Premiere Pre-Test

Adobe Premiere Pre-Test

9th - 12th Grade

31 Qs

ICT 10 - JAVA

ICT 10 - JAVA

9th - 12th Grade

30 Qs

Business Letters and MS Word

Business Letters and MS Word

6th - 12th Grade

30 Qs

Битва умов

Битва умов

7th - 11th Grade

30 Qs

3rd Qtr ETECH Review Part 1

3rd Qtr ETECH Review Part 1

Assessment

Quiz

Computers

11th Grade

Practice Problem

Hard

Created by

Mizpha Aclon

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the most important reason for using strong passwords when accessing online accounts?

To show off to friends and family.

To increase internet speed and connection.

To make it easier to remember the password.

To make it harder for hackers to guess or crack the password.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a phishing attack?

A method of encrypting data to keep it secure.

A way to report inappropriate content on social media.

A tool used by hackers to scan for vulnerabilities in a website's code.

An attempt to get someone to reveal sensitive information or login credentials through an email or message that appears to be from a legitimate source.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Below are the different domain types reliable for information seeking, EXCEPT:

.com

.edu

.gov

.org

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is netiquette?

A type of computer virus.

A tool used to secure passwords.

A method of accessing the internet.

A set of rules for how to behave properly online.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following are Boolean Operators that you can use to narrow your key phrase when searching online, EXCEPT:

AND

BUT

NOT

OR

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of cyberbullying?

Sharing a photo of a friend's pet.

Posting a funny meme about a celebrity.

Sending a mean message to someone online.

Sending a friendly message to someone online.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What should Rizza do to ensure she uses credible sites for her research?

Check the domain type of the website.

Use searching tips and techniques in searching online.

Use Wikipedia site to make sure information is credible.

Compare information found online to the books from the library.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?