2.1 Data, Information, Knowledge

2.1 Data, Information, Knowledge

12th Grade

10 Qs

quiz-placeholder

Similar activities

L3 Health and safety glossary of terms

L3 Health and safety glossary of terms

12th Grade

11 Qs

Unit 1: Computing and Society (CAS) Mid-Unit Assessment Review

Unit 1: Computing and Society (CAS) Mid-Unit Assessment Review

9th - 12th Grade

10 Qs

Communication: using Infinitive

Communication: using Infinitive

12th Grade

10 Qs

Practical Research 1 Review

Practical Research 1 Review

12th Grade

15 Qs

Peer Review

Peer Review

12th Grade

10 Qs

Rigor in Your Classroom: Chapter 3

Rigor in Your Classroom: Chapter 3

KG - 12th Grade

10 Qs

CO - Abstraction (Formative)

CO - Abstraction (Formative)

11th Grade - University

10 Qs

Research Project Quiz no. 3 Interpretation of data

Research Project Quiz no. 3 Interpretation of data

12th Grade

11 Qs

2.1 Data, Information, Knowledge

2.1 Data, Information, Knowledge

Assessment

Quiz

Other

12th Grade

Medium

Created by

maltby cab

Used 9+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data is changed into information by applying what to the data?

Review

Metadata

Meaning

Knowledge

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A file's properties shows data about data which is also known as what?

Review

Metadata

Meaning

Knowledge

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of compression means the files can be restored back to its original quality?

Lossless

Lossy

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Raw facts and figures is an example of what?

knowledge
statistics
data
information

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The quality of data is judged by how many different characteristics?

8

5

2

10

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The biggest disadvantage of storing data using ICT, is data theft, use of malware and what?

Hacking

Access Levels

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ensuring certain files can only be used by specific people, involves the use of what?

Hacking

Access Levels

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?