G8 Revision Term 1 2023

G8 Revision Term 1 2023

8th Grade

53 Qs

quiz-placeholder

Similar activities

Y10 E-Safety

Y10 E-Safety

8th Grade

53 Qs

Pixlr X Basics

Pixlr X Basics

8th Grade

50 Qs

Form 1 Term 1 ICT Quiz

Form 1 Term 1 ICT Quiz

7th - 8th Grade

50 Qs

Year 7 Assessment

Year 7 Assessment

8th Grade

54 Qs

Digital Arts

Digital Arts

KG - 12th Grade

53 Qs

Digital Citizenship Quiz Review

Digital Citizenship Quiz Review

8th Grade

58 Qs

Exam #2

Exam #2

6th - 8th Grade

55 Qs

PH Informatika Kelas 8 (Perkembangan TIK dan Media Sosial)

PH Informatika Kelas 8 (Perkembangan TIK dan Media Sosial)

8th Grade

50 Qs

G8 Revision Term 1 2023

G8 Revision Term 1 2023

Assessment

Quiz

Computers

8th Grade

Easy

Created by

Malak Sadik

Used 7+ times

FREE Resource

53 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your digital footprint includes information that others post about you online.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

There is no need to take the permission of the person in a photo if you want to publish it.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cookie is used to remember settings from your last visit to a website such as items added to a shopping basket.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All the changes made on the Google docs files are saved in the Version history.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you delete your account from popular social media platforms such as Facebook and Instagram, the companies will delete your data too.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Previous versions of the Google docs are saved in random order on the right side of the screen.

True

False

Answer explanation

Previous versions of the Google docs are saved in Sequential order on the right side of the screen.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data collected during the social engineering strategy such as emails, anniversaries, birth dates, and so on, is used in attacks targeting password identification.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?