Unit Vocab Review

Unit Vocab Review

12th Grade

10 Qs

quiz-placeholder

Similar activities

HARDWARE AND SOFTWARE - TECHNOLOGY 3RD ESO

HARDWARE AND SOFTWARE - TECHNOLOGY 3RD ESO

12th Grade

10 Qs

Computer Network Revision

Computer Network Revision

7th Grade - Professional Development

10 Qs

Manipulated Media/Deep Fake/Filter Bubbles/Xenophobia

Manipulated Media/Deep Fake/Filter Bubbles/Xenophobia

10th - 12th Grade

15 Qs

MLA Format

MLA Format

7th - 12th Grade

14 Qs

Basics of Information and Communication Tech

Basics of Information and Communication Tech

12th Grade

10 Qs

How much do you know about technology?

How much do you know about technology?

12th Grade - University

10 Qs

Exploring the Internet of Things

Exploring the Internet of Things

12th Grade - University

10 Qs

Understanding Data Transmission

Understanding Data Transmission

3rd Grade - University

10 Qs

Unit Vocab Review

Unit Vocab Review

Assessment

Quiz

English

12th Grade

Medium

CCSS
RI.9-10.4, L.11-12.6, L.11-12.4A

+18

Standards-aligned

Created by

Christopher Baber

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Facts and statistics collected for reference or analysis


data

digital footprints

online profile

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

information about a particular person that exists on the Internet as a result of their online activity


digital footprint

data

profile

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

the act of bringing someone under domination or control


surveillance

subjugation

scrutiny

Tags

CCSS.L.11-12.6

CCSS.L.8.6

CCSS.L.9-10.6

CCSS.W.11-12.2D

CCSS.W.9-10.2D

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

a type of cyber attack in which emails allegedly from reputable sources are used to gain personal information, such as passwords, credit card numbers, and other personal data.


USB attack

spoofing

phishing

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

When hackers pretend to be someone or something else to win a person's trust. The motivation is usually to gain access to systems, steal data, steal money, or spread malware.


phishing

spoofing

cloning

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is a network comprised of physical objects capable of gathering and sharing electronic information?


Internet of Technology

data

Internet of Things

servers

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which word is the opposite of surveillance?

examination

scrutiny

neglect

lookout

Tags

CCSS.L.11-12.4A

CCSS.L.7.4A

CCSS.L.7.5B

CCSS.L.8.4A

CCSS.L.9-10.4A

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?