Unit Vocab Review

Unit Vocab Review

12th Grade

10 Qs

quiz-placeholder

Similar activities

Computer Vocab

Computer Vocab

10th Grade - University

15 Qs

Mass media

Mass media

12th Grade

10 Qs

Encryption Quiz - Open Note

Encryption Quiz - Open Note

12th Grade

10 Qs

Internet of things

Internet of things

12th Grade

8 Qs

Technology Terms

Technology Terms

11th Grade - University

15 Qs

Timeline of Computer History

Timeline of Computer History

12th Grade

13 Qs

Digital Security Risk Quiz

Digital Security Risk Quiz

12th Grade

15 Qs

Grade 11 W16 Computer and Internet Terminology Quiz

Grade 11 W16 Computer and Internet Terminology Quiz

2nd Grade - University

10 Qs

Unit Vocab Review

Unit Vocab Review

Assessment

Quiz

English

12th Grade

Medium

CCSS
RI.9-10.4, L.11-12.6, L.11-12.4A

+18

Standards-aligned

Created by

Christopher Baber

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Facts and statistics collected for reference or analysis


data

digital footprints

online profile

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

information about a particular person that exists on the Internet as a result of their online activity


digital footprint

data

profile

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

the act of bringing someone under domination or control


surveillance

subjugation

scrutiny

Tags

CCSS.L.11-12.6

CCSS.L.9-10.6

CCSS.W.11-12.2D

CCSS.W.8.2D

CCSS.W.9-10.2D

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

a type of cyber attack in which emails allegedly from reputable sources are used to gain personal information, such as passwords, credit card numbers, and other personal data.


USB attack

spoofing

phishing

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

When hackers pretend to be someone or something else to win a person's trust. The motivation is usually to gain access to systems, steal data, steal money, or spread malware.


phishing

spoofing

cloning

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is a network comprised of physical objects capable of gathering and sharing electronic information?


Internet of Technology

data

Internet of Things

servers

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which word is the opposite of surveillance?

examination

scrutiny

neglect

lookout

Tags

CCSS.L.11-12.4A

CCSS.L.7.4A

CCSS.L.7.5B

CCSS.L.8.4A

CCSS.L.9-10.4A

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?