Search Header Logo

ESL Quiz #4

Authored by Robert KnightdaleHS

English

12th Grade

CCSS covered

ESL Quiz #4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A category of biometric software that maps an individual's facial features mathematically and stores the data as a faceprint.

Facial Recognition Software

Facial Reclining Software

Facial Recognition Hardware

Facial Reclining Hardware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

the level of privacy protection an individual has while connected to the Internet. It covers the amount of online security available for personal and financial data, communications, and preferences.

Online Piracy

Online Partying

Online Privacy

Online Proning

Tags

CCSS.RI.11-12.8

CCSS.RI.9-10.7

CCSS.RL.11-12.8

CCSS.RL.9-10.7

CCSS.RI.8.7

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Text files with small pieces of data — like a username and password — that are used to identify your computer as you use a network.

Cakes

Cookies

Pies

Brownies

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

Malware

Melware

Milware

Molware

Tags

CCSS.RI.11-12.8

CCSS.RI.9-10.7

CCSS.RL.11-12.8

CCSS.RL.9-10.7

CCSS.RL.8.7

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malicious software designed to block access to a computer system until a sum of money is paid.

Randomware

Rudderware

Rubyware

Ransomware

Tags

CCSS.RI.11-12.8

CCSS.RI.9-10.7

CCSS.RL.11-12.8

CCSS.RL.9-10.7

CCSS.RL.8.7

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A small video camera worn on the body, typically used by police officers to record arrests, evidence from crime scenes, etc.

Cody Camera

Fody Camera

Nody Camera

Body Camera

Tags

CCSS.L.1.6

CCSS.L.3.6

CCSS.L.K.5A

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attempt by hackers to damage or destroy a computer network or system.

Cyber-Attack

Cider-Attack

Cykill-Attack

Cycle-Attack

Tags

CCSS.RI.9-10.4

CCSS.RI.9-10.4

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?