Create a quiz about the CRAAP test used to evaluate web pages
Quiz by Benjamin Muganzi
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
34 questions
Show answers
- Q1What does the 'C' in CRAAP stand for?ClarityCorrectnessConditionCurrency30s
- Q2What does the 'R' in CRAAP stand for?RigorRecentnessRelevanceReliability30s
- Q3What does the first 'A' in CRAAP stand for?ArticulationAuthorityAccuracyArgumentation30s
- Q4What does the 'P' in CRAAP stand for?PerspectivePurposePublishingProcess30s
- Q5Which of the following is NOT a part of the CRAAP test?AuthorityCurrencyTonePurpose30s
- Q6Which criteria of the CRAAP test refers to how well a source provides complete and comprehensive coverage of a topic?SecuritySubjectivitySourceScope30s
- Q7Which of the following is NOT a factor to consider when evaluating the 'Relevance' of a source using the CRAAP test?The requirements of your research assignmentThe website's designThe focus of your researchThe level of your research project30s
- Q8What is the 'Credibility' criterion in CRAAP test?The trustworthiness or believability of the sourceThe relevance of the informationThe authority of the authorThe purpose of the information30s
- Q9What is the purpose of the CRAAP test?To analyze trafficTo promote productsTo evaluate sources of informationTo create websites30s
- Q10What does the CRAAP test evaluate?Phone callsEmailsText messagesWeb Pages30s
- Q11What is the 'Scope' criterion in CRAAP test?The timeliness of the informationThe authority of the authorThe purpose of the informationThe depth and extent of the information30s
- Q12What is a common method used by hackers to obtain personal data?MeditationRecyclingBakingPhishing30s
- Q13What is the best way to protect your personal data from hackers?Posting it on social mediaLeaving it on open devicesSharing it with strangersUsing strong passwords and two-factor authentication30s
- Q14What is encryption?Converting data into coded language to prevent unauthorized accessPosting data on social mediaDeleting data from a deviceSharing data with strangers30s
- Q15What is the most common password?qwertypassword12345678912345630s