POP QUIZ

POP QUIZ

University

6 Qs

quiz-placeholder

Similar activities

Defensive Design/ Robust Coding

Defensive Design/ Robust Coding

9th Grade - University

10 Qs

MIS305 (Ch-6.1)

MIS305 (Ch-6.1)

University

10 Qs

How well do you know about technology

How well do you know about technology

KG - Professional Development

11 Qs

Object Linking for Process Control

Object Linking for Process Control

University

10 Qs

AI Quiz: MoS Video

AI Quiz: MoS Video

University

10 Qs

AIDC

AIDC

University

2 Qs

Data analytics basics

Data analytics basics

University

10 Qs

Power BI Prepare the Data Quiz - 1

Power BI Prepare the Data Quiz - 1

University

10 Qs

POP QUIZ

POP QUIZ

Assessment

Quiz

Instructional Technology

University

Hard

Created by

Ana Ashrawi

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which of the following is an example of IoT?

Fitness Tracker

Traditional Desktop Computer

Analog Radio

Manual Typewriter

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What was the name of the first robot used in car factories ?

RoboCar

Autobot

Unimate

MechaBuild

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which of the following is not an ethical issue in technology of manufacturing ?

Job Displacement

Intellectual Property Right

Security and Privacy

Workforce Impact

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which of the following is the primary purpose of layer-by-layer creation of items from digital designs using materials like metal, plastic and ceramics ?

To reduce the cost of manufacturing

To enable rapid prototyping, customisation and reduce material waste

To increase the production speed of mass produced items

To replace traditional manufacturing methods entirely

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What was the main cause of the data breach at Telekom Malaysia (TM) ?

TM’s data platform was attacked by hackers

Weak firewalls and poor encryption

TM’s intentionally shared customer data

Customer were negligent in securing their information

6.

MULTIPLE CHOICE QUESTION

30 sec • 4 pts

How many ethical theories that we have learned ?

3

4

5

2