Computer Science 1: Big Idea #5 Review

Computer Science 1: Big Idea #5 Review

9th - 12th Grade

30 Qs

quiz-placeholder

Similar activities

KS2 Computing Quiz (FUN)

KS2 Computing Quiz (FUN)

3rd - 10th Grade

25 Qs

AP CSP Cybersecurity and Global Impacts

AP CSP Cybersecurity and Global Impacts

9th - 12th Grade

26 Qs

Cloud computing

Cloud computing

9th - 12th Grade

25 Qs

Computer Software

Computer Software

6th Grade - University

25 Qs

Communication Technologies & Cloud V2

Communication Technologies & Cloud V2

11th Grade

25 Qs

Computing For The Win/Win

Computing For The Win/Win

5th - 12th Grade

26 Qs

Cloud-computing and Databases revision

Cloud-computing and Databases revision

12th Grade

26 Qs

Quiz 1 EmpTech

Quiz 1 EmpTech

11th Grade

35 Qs

Computer Science 1: Big Idea #5 Review

Computer Science 1: Big Idea #5 Review

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Jennifer Comer

Used 20+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Intellectual Property Laws deals with the rules for securing and enforcing legal rights to inventions, designs, and artistic works.

TRUE

FALSE

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital fingerprints are a trail of data you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services.

TRUE

FALSE

Answer explanation

Media Image

NOPE! These are FOOTPRINTS!

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bias is being in favor of or against one thing, person, or group compared with another, usually in a way considered to be unfair

TRUE

FALSE

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Crowdsourcing is information or input into a particular task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the Internet

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Arjun received an email claiming to be from his bank, asking for his account details and password. This is an example of..

identity theft

phishing

private information

internet scam

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

James, Nora, and Charlotte are participating in a school debate. If James consistently favors Nora's arguments over Charlotte's, even when Charlotte's arguments are stronger, this is an example of..

corroboration

private information

bias

evaluate

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When access to the Internet is unequal based on geographic or socioeconomic reasons, it's referred to as the

Internet divide

wealthy divide

distance divide

digital divide

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?