Computer Science 1: Big Idea #5 Review

Computer Science 1: Big Idea #5 Review

9th - 12th Grade

30 Qs

quiz-placeholder

Similar activities

CIW IBA Lesson 2 Vocabulary

CIW IBA Lesson 2 Vocabulary

8th Grade - University

25 Qs

Computer Basics

Computer Basics

11th Grade

25 Qs

CSC134_Chapter 7: Internet and the Web

CSC134_Chapter 7: Internet and the Web

12th Grade

25 Qs

Cloud Computing

Cloud Computing

9th Grade

25 Qs

11EC-03: Cybersecurity in Enterprises

11EC-03: Cybersecurity in Enterprises

11th Grade

25 Qs

TEST YOURSELF: 9y

TEST YOURSELF: 9y

9th - 11th Grade

26 Qs

Legal, Ethical & Environmental Issues: J277

Legal, Ethical & Environmental Issues: J277

9th Grade

26 Qs

APCSP IOC-1.F Legal and Ethical Concerns in Computing

APCSP IOC-1.F Legal and Ethical Concerns in Computing

9th - 12th Grade

25 Qs

Computer Science 1: Big Idea #5 Review

Computer Science 1: Big Idea #5 Review

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Jennifer Comer

Used 20+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Intellectual Property Laws deals with the rules for securing and enforcing legal rights to inventions, designs, and artistic works.

TRUE

FALSE

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital fingerprints are a trail of data you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services.

TRUE

FALSE

Answer explanation

Media Image

NOPE! These are FOOTPRINTS!

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bias is being in favor of or against one thing, person, or group compared with another, usually in a way considered to be unfair

TRUE

FALSE

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Crowdsourcing is information or input into a particular task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the Internet

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Arjun received an email claiming to be from his bank, asking for his account details and password. This is an example of..

identity theft

phishing

private information

internet scam

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

James, Nora, and Charlotte are participating in a school debate. If James consistently favors Nora's arguments over Charlotte's, even when Charlotte's arguments are stronger, this is an example of..

corroboration

private information

bias

evaluate

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When access to the Internet is unequal based on geographic or socioeconomic reasons, it's referred to as the

Internet divide

wealthy divide

distance divide

digital divide

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?