Big Idea 5 Extra Questions

Quiz
•
Computers
•
9th - 12th Grade
•
Medium
Keneshia Jackson
Used 4+ times
FREE Resource
5 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
Which of the following can be described as a cyber attack? Select two answer choices.
Operating System Failure
Hard disk crash
Distributed Denial of Service
Ransomware
Answer explanation
Answers A and B are examples of computer hardware failures. Answer choices C and D are examples of cyber attacks.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Computing innovation is not always met with approval from the lawmakers in society. The reason is because
all computing innovations cause problems
computing innovations once deployed can sometimes cause unexpected problems
all computing innovations have predictable behavior
the impact a computing innovation has on society does not last forever
Answer explanation
Answers A and C are not correct. Answer D is true, however it is not a good reason to not approve a computing innovation.
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Intellectual property is defined as
something that a person owns (this means they have paid to use the product)
something that while free cannot be distributed
something that, because it is created by a person, cannot be sold or distributed
something that a person has created like a story, song, movie, and can be distributed or sold with permission
Answer explanation
The most important aspect of intellectual property is that the users have to ask for permission or they need to understand how to acknowledge the contributions of the creator of the work (i.e. song, story, etc.). The other answer choices may or may not be correct in all cases.
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
One of the most important technologies needed for crowdsourcing is
knowing how to write computer programs
access to the Internet
the ability to attend online classes
having a microphone, webcam, and speaker
Answer explanation
All the other answers will assist with crowdsourcing but are not necessary for the process to be successful.
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Information about a person such as their name, email, or age is called
personalized data
metadata
cookie data
Personally Identifiable Information
Answer explanation
Personally Identifiable Information is the data that can be used to identify an individual uniquely. Having their name, email, and age will assist with providing this information.
Similar Resources on Wayground
10 questions
Cloud Computing

Quiz
•
12th Grade
10 questions
Chapter 1 FUNDAMENTALS OF COMPUTER, 1.1.1 Evolution of Computer

Quiz
•
9th Grade
10 questions
Privacy & Security in Cloud Computing Case Study By Mr. B

Quiz
•
12th Grade
10 questions
Emerging trends

Quiz
•
11th Grade
7 questions
Unit 9 & 10 review

Quiz
•
10th - 11th Grade
9 questions
U24 M1 Requirements of Enterprise Computing Solution

Quiz
•
12th Grade
10 questions
Intro to Computational thinking

Quiz
•
9th Grade
10 questions
Files and Directories

Quiz
•
9th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
10 questions
1.2 OSI & TCP IP Models Quiz

Quiz
•
10th Grade
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
30 questions
Introduction to Computers

Quiz
•
8th - 9th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
20 questions
Hardware vs. Software Quiz

Quiz
•
7th - 10th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade