
Questions Middle 3
Quiz by ..what is this..
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
23 questions
Show answers
- Q1Web 2.0A Meetings linked to webcams and screens that can be accessed worldwideB An interactive webpage which can be edited by users and anyone can contribute entries (not accurate). It contains information about a variety of topics that can be searchedC This is often called the 'Social Web' because of the way that users can interact and share. It's also been called the 'Read-Write Web' because much of the content is now written by users.D Building online communities of users who share same interests/activities30s
- Q23. video conferencingD Building online communities of users who share same interests/activitiesC This is often called the 'Social Web' because of the way that users can interact and share. It's also been called the 'Read-Write Web' because much of the content is now written by users.B An interactive webpage which can be edited by users and anyone can contribute entries (notaccurate). It contains information about a variety of topics that can be searchedA Meetings linked to webcams and screens that can be accessed worldwide30s
- Q35. SpamC Sending of unsolicited emails. Spam is 'junk email' that is sent automatically to thousandsB A type of Malware that locates and saves data from users without them knowing about itD A piece of code that is capable of copying itself & typically has a detrimental effectA A program or a set of program instructions that are designed to enter a computer & disrupt its normal operations30s
- Q47. Should the Internet be policed? (Mark 3 arguments AGAINST this idea)D Prevent/reduce amount of inaccurate info being published - anyone can publish anything!C Prevent children/vulnerable groups from accessing undesirable websitesA Expense of policing could fall on end-usersB Difficult to enforce on a global scale30s
- Q59. AuthenticationD The process that enables work to be conducted from any place at any time through the use of communications technologyC The process in which a user's user name and password are checked against a system database that contains all user account information.B The condition that shows the information true and updatedA The degree to which a study accurately reflects or assesses the specific concepts that the researcher is attempting to measure.30s
- Q611. Overloaded Power Sockets (Safety problem). Mark its main DANGER.C Always make sure there are fire extinguishers nearbyD It can result in the socket being overloaded, overheating & a fire starting.A Place cables inside cable ducts or under the carpet/flooringductsB Keep drinks & food away from computers30s
- Q713. DeskillingC retrained for a job which requires new skillsA traditional skills replaced by jobs that require few skillsB Having or needing some training; having or requiring more training than unskilled labour but less than skilled labour30s
- Q815. EncryptingA Secretly gaining access to computers and files without permissionC Using fake emails to get personal details. These emails appear to come from well-known companiesB The process of transforming data into a non-readable form for security purposes.D Infecting legitimate websites with malicious code that redirects users to bogus versions of the site, enabling them to obtain personal details30s
- Q917. memory chipB A global network connecting millions of computersC Electronic circuits that can store dataD It is a small cpu (central processing unit) built onto a single chip. It is put into electronic devices to control how they function. eg: Programmable microwave ovensA An input device, output device or secondary storage device that is not part of the central processing unit (CPU)30s
- Q1019. FirewallD A product of the intellect such as an expressed idea or concept that has commercial value.C It is a piece of software that is placed between your computer/LAN and the rest of the network/WAN (where the hackers are!);it is like a 'shield' between your computer and the Internet.B A copy of data that is made in case the original data is lost or damaged. It can be used to restore the original data.A If you have it over some software, it means that you have the protection of the law if anyone tries to steal your software.30s
- Q1121. CopyrightD A product of the intellect such as an expressed idea or concept that has commercial value.A If you have it over some software, it means that you have the protection of the law if anyone tries to steal your software.B A copy of data that is made in case the original data is lost or damaged. It can be used to restore the original data.C It is a piece of software that is placed between your computer/LAN and the rest of the network/WAN (where the hackers are!);it is like a 'shield' between your computer and the Internet.30s
- Q1223. BlogC A little piece of information that is put on your computer to allow some servers to track everything you do on the InternetD Improper remove of hardware or a faulty file may carry a virusB A web log that acts as an online diary where users can express their opinions about a topic and receive feedbackA An interactive webpage which can be edited by users and anyone can contribute entries30s
- Q1325. The use of the computer to predict the outcome of a real-life situation by using a model of that situation.A SimulationC Data loggingD Batch processingB Monitoring30s
- Q1428. What is a Server?A It connects computers and devices together by using a form of packet switching which then sends data to a device connected to it.C A computer or device that manages networksB A hardware device that connects multiple computers together in a network and allows them to share data.30s
- Q1529. What is a Hub?C computer or device that manages networksA It connects computers and devices together by using a form of packet switching which then sends data to a device connected to it.D A hardware device that connects multiple computers together in a network and allows them to share data.B Network Interface card30s