Search Header Logo

csd_theme3_t2_LF3_quizizz_01_e

Authored by ls hkep

Social Studies

1st - 5th Grade

Used 15+ times

csd_theme3_t2_LF3_quizizz_01_e
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is a component of information literacy?

Deny information

Obtain information

Evaluate information

Apply information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

‘I found a photo online to include in my homework, but I don’t know who is the copyright owner, so I ended up not using it.” Which component of information literacy does this example illustrate?

Evaluate information

Apply information

Verify information

Obtain information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the country with the highest standard of information literacy?

Spain

Italy

Denmark

France

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following sites is a ‘content farm’?

The media provides some latest news information

Publish the latest game walkthroughs

Share food information in the district

Copy and produce a lot of fake news to earn traffic

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is a reason for the emergence of false information?

The development of information technology makes the dissemination of information easier.

Netizens love to spread false information.

Some people attempt to mislead the public to gain benefits or vent their emotions.

Some people deliberately use false information to attract readers to click.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is a way to handle false information?

Before receiving any message, verify the content first.

The government uses legislation to combat the spread of false information.

Pay more attention to the position and orientation of the media which releases information.

Do not watch any messages from the Internet.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following is a method of protecting personal information?

Refuse to access sensitive personal information on public networks.

Do not open messages from unknown sources.

Entrust personal information to others and engage in business on others’ behalf.

Install a firewall on your home computer.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?