ch. 8 review

ch. 8 review

6th - 8th Grade

10 Qs

quiz-placeholder

Similar activities

Herramientas de Internet

Herramientas de Internet

6th Grade

10 Qs

ความปลอดภัยเทคโนโลยีสารสนเทศ

ความปลอดภัยเทคโนโลยีสารสนเทศ

7th Grade

10 Qs

Technology trends

Technology trends

7th - 12th Grade

15 Qs

Kuis 2.4 Informatika (Teknologi Informatika ubah Kehidupan)

Kuis 2.4 Informatika (Teknologi Informatika ubah Kehidupan)

8th Grade

15 Qs

Algorithms

Algorithms

7th - 10th Grade

15 Qs

DISPOSITIVOS DE ENTRADA Y DE SALIDA

DISPOSITIVOS DE ENTRADA Y DE SALIDA

6th - 9th Grade

12 Qs

Grade 6 exam practice

Grade 6 exam practice

6th Grade

15 Qs

Interfaz de Metaverse

Interfaz de Metaverse

6th Grade

10 Qs

ch. 8 review

ch. 8 review

Assessment

Quiz

Computers

6th - 8th Grade

Hard

Created by

Jarrad Scott

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

An RSI that affects the wrist, hand, and arm is called  syndrome.

DOWN SYNDRONE

carpal tunnel

DOING TO MUCH

THE RODERICK EFFECT

2.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

includes excessive use of online games, web surfing, texting, blogging, and shopping.

INTERNET ADDICTION

DRUG ADDICTION

SHOPPING ADDITION

WORKING TO HARD

3.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

creates a safe, healthy, and efficient working environment.

  1. Phishing

  1. Cybervision

  1. Pharming

  1. Ergonomics

4.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

hard drives are more stable than magnetic hard drives, which can crash, resulting in lost data.

  1. Solid state

  1. Optical

  1. Flash

  1. Digital

5.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

People who break into computers and computer networks—often by exploiting weaknesses and preventable flaws—are called .

  1. cybers

  1. white hats

  1. hackers

  1. spammers

6.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

is the premeditated disruption of computers and networks.

  1. E-commerce

  1. Cyberterrorism

  1. Cyberbullying

  1. Social networking

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Some cyberterrorists use ___________ to demand money to restore a system, blocking access to a computer system until a sum of money is paid.

  1. cloud storage

  1. digital certificates

  1. ransomware

  1. Trojan horses

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?