
ESL Quiz #4
Authored by Robert KnightdaleHS
English
12th Grade
CCSS covered

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A category of biometric software that maps an individual's facial features mathematically and stores the data as a faceprint.
Facial Recognition Software
Facial Reclining Software
Facial Recognition Hardware
Facial Reclining Hardware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
the level of privacy protection an individual has while connected to the Internet. It covers the amount of online security available for personal and financial data, communications, and preferences.
Online Piracy
Online Partying
Online Privacy
Online Proning
Tags
CCSS.RI.11-12.8
CCSS.RI.9-10.7
CCSS.RL.11-12.8
CCSS.RL.9-10.7
CCSS.RL.8.7
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Text files with small pieces of data — like a username and password — that are used to identify your computer as you use a network.
Cakes
Cookies
Pies
Brownies
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Malware
Melware
Milware
Molware
Tags
CCSS.RI.11-12.8
CCSS.RI.9-10.7
CCSS.RL.11-12.8
CCSS.RL.9-10.7
CCSS.RL.8.7
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A type of malicious software designed to block access to a computer system until a sum of money is paid.
Randomware
Rudderware
Rubyware
Ransomware
Tags
CCSS.RI.11-12.8
CCSS.RI.9-10.7
CCSS.RL.11-12.8
CCSS.RL.9-10.7
CCSS.RI.8.7
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A small video camera worn on the body, typically used by police officers to record arrests, evidence from crime scenes, etc.
Cody Camera
Fody Camera
Nody Camera
Body Camera
Tags
CCSS.L.1.6
CCSS.L.3.6
CCSS.L.K.5A
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attempt by hackers to damage or destroy a computer network or system.
Cyber-Attack
Cider-Attack
Cykill-Attack
Cycle-Attack
Tags
CCSS.RI.9-10.4
CCSS.RI.9-10.4
CCSS.RI.11-12.4
CCSS.RI.7.4
CCSS.RI.8.4
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?