dampak sosial informatika 9

dampak sosial informatika 9

40 Qs

quiz-placeholder

Similar activities

PAS AGAMA KATOLIK

PAS AGAMA KATOLIK

KG - University

40 Qs

ulangan harian TEMA 3

ulangan harian TEMA 3

KG - University

35 Qs

LATIHAN SOAL  SAS X PENDIDIKAN PANCASILA

LATIHAN SOAL SAS X PENDIDIKAN PANCASILA

10th Grade

40 Qs

SOAL TES SEMESTER GENAP : PKN

SOAL TES SEMESTER GENAP : PKN

KG - University

41 Qs

REMEDI INFORMATIKAPTS2 T.A 2022/2023

REMEDI INFORMATIKAPTS2 T.A 2022/2023

KG - University

44 Qs

LATIHAN SOAL SAS PENDIDKAN PANCASILA XI

LATIHAN SOAL SAS PENDIDKAN PANCASILA XI

KG - University

40 Qs

Simulasi PPPK Denpasar

Simulasi PPPK Denpasar

KG - University

40 Qs

Ilmu Pengetahuan Sosial 8

Ilmu Pengetahuan Sosial 8

8th Grade

35 Qs

dampak sosial informatika 9

dampak sosial informatika 9

Assessment

Quiz

others

Hard

Created by

Fretty M

FREE Resource

40 questions

Show all answers

1.

OPEN ENDED QUESTION

30 sec • Ungraded

Nama

Evaluate responses using AI:

OFF

2.

MULTIPLE CHOICE QUESTION

30 sec • Ungraded

Kelas :
9-1
9-2
9-3

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Salah satu kejahatan dengan memanfaatkan computer dan internet adalah ….
Networking
Anti Virus
Cyber Sabotage
Sign In

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Kejahatan dunia maya disebut dengan….
online crime
cybercrime
experiment crime
cyber sosial

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Beberapa metode dalam Computational Thinking yaitu ….
Decomposition, pattern region, abstraksi, analisis
Decomposition, pattern region, abstraksi, implementasi
Decomposition, pattern cognition, algorithm design
Decomposition, pattern recognition, abstraksi, algorithm design

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Pelaku kejahatan dunia maya disebut….
hacker
motivator
actor
blocker

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Kejahatan dengan cara memasukkan data atau informasi ke internet tentang sesuatu yang tidak benar dan dianggap melanggar hukum dan mengganggu ketertiban umum adalah ...
llegal content
cyber espionage
cyber sabotage
cracking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?