Unit Vocab Review

Unit Vocab Review

12th Grade

10 Qs

quiz-placeholder

Similar activities

A Man Called Ove - Ch 2 Quiz [open book]

A Man Called Ove - Ch 2 Quiz [open book]

12th Grade

15 Qs

Social Dilemma

Social Dilemma

9th - 12th Grade

10 Qs

surveillance(speakout,upper-intermediate,unit 2)

surveillance(speakout,upper-intermediate,unit 2)

9th - 12th Grade

8 Qs

documentary

documentary

9th - 12th Grade

15 Qs

Vocabulary Quiz #7

Vocabulary Quiz #7

5th - 12th Grade

10 Qs

UNSEEN COMPREHENSION PASSAGE

UNSEEN COMPREHENSION PASSAGE

9th - 12th Grade

10 Qs

TKAM QUIZ 2 vocab ch 12-22

TKAM QUIZ 2 vocab ch 12-22

9th - 12th Grade

10 Qs

The Franklin

The Franklin

9th - 12th Grade

10 Qs

Unit Vocab Review

Unit Vocab Review

Assessment

Quiz

English

12th Grade

Medium

CCSS
RI.9-10.4, L.11-12.6, L.11-12.4A

+18

Standards-aligned

Created by

Christopher Baber

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Facts and statistics collected for reference or analysis


data

digital footprints

online profile

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

information about a particular person that exists on the Internet as a result of their online activity


digital footprint

data

profile

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

the act of bringing someone under domination or control


surveillance

subjugation

scrutiny

Tags

CCSS.L.11-12.6

CCSS.L.9-10.6

CCSS.W.11-12.2D

CCSS.W.8.2D

CCSS.W.9-10.2D

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

a type of cyber attack in which emails allegedly from reputable sources are used to gain personal information, such as passwords, credit card numbers, and other personal data.


USB attack

spoofing

phishing

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

When hackers pretend to be someone or something else to win a person's trust. The motivation is usually to gain access to systems, steal data, steal money, or spread malware.


phishing

spoofing

cloning

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is a network comprised of physical objects capable of gathering and sharing electronic information?


Internet of Technology

data

Internet of Things

servers

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which word is the opposite of surveillance?

examination

scrutiny

neglect

lookout

Tags

CCSS.L.11-12.4A

CCSS.L.7.4A

CCSS.L.7.5B

CCSS.L.8.4A

CCSS.L.9-10.4A

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?