Search Header Logo

Big Idea 5 Extra Questions

Authored by Keneshia Jackson

Computers

9th - 12th Grade

Used 4+ times

Big Idea 5 Extra Questions
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which of the following can be described as a cyber attack? Select two answer choices.

Operating System Failure

Hard disk crash

Distributed Denial of Service

Ransomware

Answer explanation

Answers A and B are examples of computer hardware failures. Answer choices C and D are examples of cyber attacks.

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Computing innovation is not always met with approval from the lawmakers in society. The reason is because

all computing innovations cause problems

computing innovations once deployed can sometimes cause unexpected problems

all computing innovations have predictable behavior

the impact a computing innovation has on society does not last forever

Answer explanation

Answers A and C are not correct. Answer D is true, however it is not a good reason to not approve a computing innovation.

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Intellectual property is defined as

something that a person owns (this means they have paid to use the product)

something that while free cannot be distributed

something that, because it is created by a person, cannot be sold or distributed

something that a person has created like a story, song, movie, and can be distributed or sold with permission

Answer explanation

The most important aspect of intellectual property is that the users have to ask for permission or they need to understand how to acknowledge the contributions of the creator of the work (i.e. song, story, etc.). The other answer choices may or may not be correct in all cases.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

One of the most important technologies needed for crowdsourcing is

knowing how to write computer programs

access to the Internet

the ability to attend online classes

having a microphone, webcam, and speaker

Answer explanation

All the other answers will assist with crowdsourcing but are not necessary for the process to be successful.

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Information about a person such as their name, email, or age is called

personalized data

metadata

cookie data

Personally Identifiable Information

Answer explanation

Personally Identifiable Information is the data that can be used to identify an individual uniquely. Having their name, email, and age will assist with providing this information.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?