Societal impact 3

Societal impact 3

10th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

Found. of IT: Security Threats - A

Found. of IT: Security Threats - A

9th - 12th Grade

10 Qs

ICT Quiz

ICT Quiz

9th - 12th Grade

10 Qs

security and ethic 1

security and ethic 1

10th Grade

12 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

GCSE OCR Computing 1.4.1 - Threats to Computer Systems

GCSE OCR Computing 1.4.1 - Threats to Computer Systems

10th Grade

10 Qs

Computer Misuse Act

Computer Misuse Act

10th - 12th Grade

12 Qs

Level 1 ICT: Security Quiz

Level 1 ICT: Security Quiz

12th Grade

12 Qs

Quiz # 3 Asignacion

Quiz # 3 Asignacion

7th - 12th Grade

10 Qs

Societal impact 3

Societal impact 3

Assessment

Quiz

Computers

10th - 12th Grade

Medium

Created by

Suman Joshi

Used 60+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The term "Intellectual property Rights" covers :

Copyrights

Trademarks

Patents

All of the above

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Online personal account, personal websites are examples of :

Digital Wallet

Digital Property

Digital Certificate

Digital Signature

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Using someone else's twitter handle to post something will be termed as :

Fraud

Identity Theft

Online stealing

Violation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a/an open-source software?

Microsoft Windows

Adobe Photoshop

Mysql

Ms Powerpoint

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Public Domain Software is free and can be used with restrictions:

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

E-document becomes legal after it is digitally signed.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The ability to control what information one reveals about oneself over the internet is called __________________

Privacy

Security

Phishing

Web bug

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Obtaining files that you don't have the right to use from the internet is called ____________________

Phishing

Hacking

Illegal Downloading

Spam