Computer Science 1: Big Idea #5 Review

Computer Science 1: Big Idea #5 Review

9th - 12th Grade

30 Qs

quiz-placeholder

Similar activities

Unions in C Programming

Unions in C Programming

10th Grade

25 Qs

UNAC - ESAC - 1 - II B

UNAC - ESAC - 1 - II B

11th Grade

25 Qs

Đề thi số 4 (A2)

Đề thi số 4 (A2)

6th - 9th Grade

25 Qs

SHS Quiz 2 Grade X

SHS Quiz 2 Grade X

10th Grade

25 Qs

PTS Desain Multimedia Interaktif

PTS Desain Multimedia Interaktif

12th Grade

25 Qs

MS EXCEL

MS EXCEL

9th Grade

25 Qs

Repaso tema 4: Programas de Aplicaciones

Repaso tema 4: Programas de Aplicaciones

10th Grade

25 Qs

KOMPUTER DAN JARINGAN

KOMPUTER DAN JARINGAN

10th Grade

25 Qs

Computer Science 1: Big Idea #5 Review

Computer Science 1: Big Idea #5 Review

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Jennifer Comer

Used 20+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Intellectual Property Laws deals with the rules for securing and enforcing legal rights to inventions, designs, and artistic works.

TRUE

FALSE

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital fingerprints are a trail of data you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services.

TRUE

FALSE

Answer explanation

Media Image

NOPE! These are FOOTPRINTS!

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bias is being in favor of or against one thing, person, or group compared with another, usually in a way considered to be unfair

TRUE

FALSE

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Crowdsourcing is information or input into a particular task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the Internet

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Arjun received an email claiming to be from his bank, asking for his account details and password. This is an example of..

identity theft

phishing

private information

internet scam

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

James, Nora, and Charlotte are participating in a school debate. If James consistently favors Nora's arguments over Charlotte's, even when Charlotte's arguments are stronger, this is an example of..

corroboration

private information

bias

evaluate

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When access to the Internet is unequal based on geographic or socioeconomic reasons, it's referred to as the

Internet divide

wealthy divide

distance divide

digital divide

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?