Biometrics Are Not Better

Biometrics Are Not Better

6th - 8th Grade

12 Qs

quiz-placeholder

Similar activities

Among the Hidden - Quizizz #3

Among the Hidden - Quizizz #3

6th - 7th Grade

10 Qs

Putting Together the Pieces of the Puzzle

Putting Together the Pieces of the Puzzle

6th Grade

14 Qs

The Call of the Wild

The Call of the Wild

7th Grade

9 Qs

Found Quiz 2

Found Quiz 2

6th Grade

15 Qs

Rhetorical Triangle Diamond

Rhetorical Triangle Diamond

7th Grade

7 Qs

Unit 11 Roots Review

Unit 11 Roots Review

8th Grade

13 Qs

Hilda season 1 episode 1

Hilda season 1 episode 1

5th - 10th Grade

14 Qs

Whose Who's Whom Who

Whose Who's Whom Who

7th - 8th Grade

10 Qs

Biometrics Are Not Better

Biometrics Are Not Better

Assessment

Quiz

English

6th - 8th Grade

Medium

CCSS
RI.6.2, L.6.4A, RI.6.4

+7

Standards-aligned

Created by

Rachel Barnett

Used 18+ times

FREE Resource

12 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

True or False: The author focuses on the production of energy in "Biometrics Are Not Better"?

Tags

CCSS.RI.6.1

CCSS.RI.6.2

CCSS.RI.6.6

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

"Biometrics are easier to use as passwords" and "They use an individual's unique features" are TWO perceived advantages or biometrics": True or False?

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Biometrics can be unreliable because body measurements can _____.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"You can't replace your fingerprints, your eyes, or any of your biometric data" is an example of______.

the right to privacy

bypassed

breaches

serious security risk

5.

DRAG AND DROP QUESTION

1 min • 1 pt

Biometrics could cause an individual to lose the right to ​ (a)  

privacy
vote
free speech

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Holes left in window shattered by hailstones" would be an example of_____.

breaches

bypassed

passwords

free speech

Tags

CCSS.L.6.4A

CCSS.RI.6.4

7.

DRAG AND DROP QUESTION

1 min • 1 pt

"The trail ahead was muddy, so I turned back and chose another path" is an example of​ ​ ​ (a)  

bypassed
mistakes
vulnerabilities
breaches

Tags

CCSS.L.6.4A

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?