Search Header Logo

codeHS Unit 2

Authored by Fabian Avalos

Computers

9th - 12th Grade

Used 24+ times

codeHS Unit 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you NOT do if you're a victim of cyberbullying?

respond to the bully

print and take screenshots of the messages

reach out to a trusted adult

block the bully

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A .edu or .gov website is a characteristic of a credible source.

True

False

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

After entering my password for Gmail, I receive a notification on my phone asking me if it's me logging in to my account.

This is an example of two _ authentication.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a bystander that witnesses bullying do?

reports the bullying to the website admin

tells a trusted adult

nothing

reach out the the victim

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A person's digital footprint is ___ and permanent to anyone.

etched

invisible

public

private

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Family, friends, and teachers can all access your digital footprint. Potential employers cannot.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

My username should not include...

dream vacation location

birth year

favorite sport

random lucky number

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?