Search Header Logo

Journalism Terms

Authored by Margaret Anderson

English

University

CCSS covered

Journalism Terms
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When a journalist deeply investigates a single topic of interest, often involving crime, this is called...

investigative journalism

yellow journalism

papparazzi journalism

Tags

CCSS.RI.11-12.10

CCSS.RI.6.10

CCSS.RI.7.10

CCSS.RI.8.10

CCSS.RI.9-10.10

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When a journalist publishes a news story before anyone else hears about it, it is called a...

source

leak

scoop

Tags

CCSS.RI.9-10.4

CCSS.RI.9-10.4

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If someone doesn't want you to publish information about them, they might take out an ______ to stop you.

scoop

injunction

investigative

leak

Tags

CCSS.RI.9-10.4

CCSS.RI.9-10.4

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Exposing unethical or illegal actions by an organisation is called...

whistle-blowing

investigative journalism

blow

yellow press

Tags

CCSS.RI.11-12.10

CCSS.RI.6.10

CCSS.RI.7.10

CCSS.RI.8.10

CCSS.RI.9-10.10

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information which, if disclosed by unauthorised people, could cause problems for a company or government, etc., is called ...

exclusive information

secretive information

sensitive information

Tags

CCSS.RI.11-12.10

CCSS.RI.6.10

CCSS.RI.7.10

CCSS.RI.8.10

CCSS.RI.9-10.10

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Someone who provides information to journalists so they can write the story is a ...

provider

source

scoop

Tags

CCSS.L.11-12.6

CCSS.L.9-10.6

CCSS.W.11-12.2D

CCSS.W.8.2D

CCSS.W.9-10.2D

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The release of protected information to the public without permission is called a...

leak

filter

truth

Tags

CCSS.RI.9-10.4

CCSS.RI.9-10.4

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?