Societal impact 3

Societal impact 3

10th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

Computer Misuse Act of 1990 Quiz

Computer Misuse Act of 1990 Quiz

12th Grade

12 Qs

Chapter-8: Safety and security

Chapter-8: Safety and security

9th - 10th Grade

10 Qs

Security Risks & Precautions

Security Risks & Precautions

10th - 12th Grade

8 Qs

Bezpieczeństwo w sieci

Bezpieczeństwo w sieci

7th - 12th Grade

10 Qs

Competencias Digitales Quiz

Competencias Digitales Quiz

12th Grade

10 Qs

Unit 1 Programming with Karel Javascript

Unit 1 Programming with Karel Javascript

12th Grade

10 Qs

1.6 Threats to networks 1: People as the weak point

1.6 Threats to networks 1: People as the weak point

10th Grade

12 Qs

Cyber Security Quiz

Cyber Security Quiz

11th Grade

13 Qs

Societal impact 3

Societal impact 3

Assessment

Quiz

Computers

10th - 12th Grade

Medium

Created by

Suman Joshi

Used 60+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The term "Intellectual property Rights" covers :

Copyrights

Trademarks

Patents

All of the above

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Online personal account, personal websites are examples of :

Digital Wallet

Digital Property

Digital Certificate

Digital Signature

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Using someone else's twitter handle to post something will be termed as :

Fraud

Identity Theft

Online stealing

Violation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a/an open-source software?

Microsoft Windows

Adobe Photoshop

Mysql

Ms Powerpoint

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Public Domain Software is free and can be used with restrictions:

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

E-document becomes legal after it is digitally signed.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The ability to control what information one reveals about oneself over the internet is called __________________

Privacy

Security

Phishing

Web bug

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Obtaining files that you don't have the right to use from the internet is called ____________________

Phishing

Hacking

Illegal Downloading

Spam