Search Header Logo

Understanding Digital Privacy Terms

Authored by Anne Tran

Instructional Technology

1st Grade

Used 1+ times

Understanding Digital Privacy Terms
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a data breach?

A data breach is a type of software update.

A data breach is a legal agreement between companies.

A data breach is an incident where unauthorized access to sensitive data occurs.

A data breach is a method of data encryption.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a surveillance society mean?

A society with no surveillance at all.

A society that only monitors public spaces.

A society focused on enhancing privacy rights.

A society characterized by pervasive surveillance of individuals' activities.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Can you explain invasion of privacy?

Invasion of privacy refers to the act of sharing personal information with friends.

Invasion of privacy is a legal term for public speaking.

Invasion of privacy is a type of social media trend.

Invasion of privacy is the violation of an individual's right to privacy, often involving unauthorized access to personal information or activities.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is facial recognition used for?

Facial recognition is used for social media likes.

Facial recognition is used for cooking recipes.

Facial recognition is used for security, identification, and authentication purposes.

Facial recognition is used for weather forecasting.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a digital footprint?

A digital footprint is the amount of data stored on a hard drive.

A digital footprint refers to the physical traces left by devices.

A digital footprint is the record of your online activities and interactions.

A digital footprint is a type of online security measure.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does end-to-end encryption work?

Data is encrypted only during transmission.

End-to-end encryption works by encrypting data on the sender's device and only allowing the recipient to decrypt it using their private key.

Encryption occurs on the recipient's device before sending.

Only the sender can decrypt the data using a public key.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is intrusive technology?

Intrusive technology is technology that invades personal privacy or disrupts normal activities.

Software that automates daily tasks

Devices that improve communication efficiency

Technology that enhances personal security

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?