G8 Revision Term 1 2023

G8 Revision Term 1 2023

8th Grade

53 Qs

quiz-placeholder

Similar activities

Year 8 - End of year assessment

Year 8 - End of year assessment

7th Grade - University

50 Qs

24 CFII Dec Exam

24 CFII Dec Exam

8th Grade

53 Qs

Computer & Internet Basics

Computer & Internet Basics

6th - 8th Grade

49 Qs

ICT 8

ICT 8

8th Grade

50 Qs

Apps Knowledge Check

Apps Knowledge Check

8th Grade

50 Qs

Code.org - CSD - Unit 6 - Physical Computing - Review

Code.org - CSD - Unit 6 - Physical Computing - Review

7th - 12th Grade

50 Qs

Term 03 - Grade 8 Revision

Term 03 - Grade 8 Revision

8th Grade

50 Qs

CF1 3rd 9weeks Test

CF1 3rd 9weeks Test

7th - 8th Grade

50 Qs

G8 Revision Term 1 2023

G8 Revision Term 1 2023

Assessment

Quiz

Computers

8th Grade

Easy

Created by

Malak Sadik

Used 7+ times

FREE Resource

53 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your digital footprint includes information that others post about you online.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There is no need to take the permission of the person in a photo if you want to publish it.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cookie is used to remember settings from your last visit to a website such as items added to a shopping basket.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All the changes made on the Google docs files are saved in the Version history.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you delete your account from popular social media platforms such as Facebook and Instagram, the companies will delete your data too.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Previous versions of the Google docs are saved in random order on the right side of the screen.

True

False

Answer explanation

Previous versions of the Google docs are saved in Sequential order on the right side of the screen.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data collected during the social engineering strategy such as emails, anniversaries, birth dates, and so on, is used in attacks targeting password identification.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?