G8 Revision Term 1 2023

G8 Revision Term 1 2023

8th Grade

53 Qs

quiz-placeholder

Similar activities

Power Point Core 2016

Power Point Core 2016

8th Grade

50 Qs

ASKT1 - Kod Arahan (4.1)

ASKT1 - Kod Arahan (4.1)

7th - 8th Grade

50 Qs

Ôn tập HK II - TIN 8

Ôn tập HK II - TIN 8

8th Grade

50 Qs

CK 1 TIN 8 CD MỚI

CK 1 TIN 8 CD MỚI

8th Grade

50 Qs

ON THI HK1 K8

ON THI HK1 K8

8th Grade

48 Qs

Year 8 ICT Assessment

Year 8 ICT Assessment

8th Grade

50 Qs

HTML_Assessment

HTML_Assessment

7th - 9th Grade

52 Qs

ICT benchmarking test 1.2

ICT benchmarking test 1.2

8th Grade

56 Qs

G8 Revision Term 1 2023

G8 Revision Term 1 2023

Assessment

Quiz

Computers

8th Grade

Practice Problem

Easy

Created by

Malak Sadik

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

53 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your digital footprint includes information that others post about you online.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There is no need to take the permission of the person in a photo if you want to publish it.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cookie is used to remember settings from your last visit to a website such as items added to a shopping basket.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All the changes made on the Google docs files are saved in the Version history.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you delete your account from popular social media platforms such as Facebook and Instagram, the companies will delete your data too.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Previous versions of the Google docs are saved in random order on the right side of the screen.

True

False

Answer explanation

Previous versions of the Google docs are saved in Sequential order on the right side of the screen.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data collected during the social engineering strategy such as emails, anniversaries, birth dates, and so on, is used in attacks targeting password identification.

True

False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?