POP QUIZ

POP QUIZ

University

6 Qs

quiz-placeholder

Similar activities

Python - Data Types

Python - Data Types

12th Grade - University

11 Qs

Database Week 3 Quiz

Database Week 3 Quiz

University

10 Qs

Pre-test before Industrial Revolution's class (Part 2)

Pre-test before Industrial Revolution's class (Part 2)

University

10 Qs

Object Linking for Process Control

Object Linking for Process Control

University

10 Qs

PT-317, day-1, 7th sem, roll-036,pilot plant scale up techni

PT-317, day-1, 7th sem, roll-036,pilot plant scale up techni

University

10 Qs

Cycle 2: Session 2 Review.

Cycle 2: Session 2 Review.

University - Professional Development

10 Qs

TKK MEDIA lITERAVY

TKK MEDIA lITERAVY

University

10 Qs

Week 8_Pre Test

Week 8_Pre Test

University

5 Qs

POP QUIZ

POP QUIZ

Assessment

Quiz

Instructional Technology

University

Hard

Created by

Ana Ashrawi

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which of the following is an example of IoT?

Fitness Tracker

Traditional Desktop Computer

Analog Radio

Manual Typewriter

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What was the name of the first robot used in car factories ?

RoboCar

Autobot

Unimate

MechaBuild

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which of the following is not an ethical issue in technology of manufacturing ?

Job Displacement

Intellectual Property Right

Security and Privacy

Workforce Impact

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which of the following is the primary purpose of layer-by-layer creation of items from digital designs using materials like metal, plastic and ceramics ?

To reduce the cost of manufacturing

To enable rapid prototyping, customisation and reduce material waste

To increase the production speed of mass produced items

To replace traditional manufacturing methods entirely

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What was the main cause of the data breach at Telekom Malaysia (TM) ?

TM’s data platform was attacked by hackers

Weak firewalls and poor encryption

TM’s intentionally shared customer data

Customer were negligent in securing their information

6.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

How many ethical theories that we have learned ?

3

4

5

2

Discover more resources for Instructional Technology