Search Header Logo

9.3 Essential Knowledge Assessment

Authored by Laura Boyd

Computers

9th - 12th Grade

Used 4+ times

9.3 Essential Knowledge Assessment
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a digital footprint?

A trail of data left behind by your online activity

A record of your internet history

Information that can be found if you are searched online

A term that describes how active you are online

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Why does a digital footprint have a monetary value? (Select all that apply)

Companies will buy the information to learn about your interest to better know what to sell to you

Companies will buy the information to target you with specific ads

Companies will buy this information to keep more accurate records of its customers

Companies will buy the information to keep track of your activity

Companies will buy the information so they can more easily contact you

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the Data Protection Act?

A sets of rules on how data should be collected about individuals and organisations

A set of standard principles for protecting a company's data online

A law designed to protect people's personal information and ensure it is handled responsibly by organisations

A law that explains how a persons digital footprint should be used and stored

4.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Select all the principles that are part of the Data Protection Act

Personal data must be fairly and lawfully processed

Personal data must be kept securely for an indefinite amount of time

Personal data must be obtained for specified and lawful purposes

Personal data must be accurate and up to data

Personal data must be purposeful and complete

5.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

There are _____ principles in the Data Protection Act

6.

DRAG AND DROP QUESTION

1 min • 1 pt

Hacking is the act of gaining ​ (a)   access to ​ (b)   or a ​ (c)   .

unauthorised
data
computer system
information
authorised

7.

DRAG AND DROP QUESTION

1 min • 1 pt

Social engineering is a method of hacking that targets ​ (a)   instead of ​ (b)   in ​ (c)   .

people
software
weaknesses
hardware
phishing
computers
attacking

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?