placeholder image to represent content

Questions Middle 3

Quiz by ..what is this..

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
23 questions
Show answers
  • Q1
    Web 2.0
    A Meetings linked to webcams and screens that can be accessed worldwide
    B An interactive webpage which can be edited by users and anyone can contribute entries (not accurate). It contains information about a variety of topics that can be searched
    C This is often called the 'Social Web' because of the way that users can interact and share. It's also been called the 'Read-Write Web' because much of the content is now written by users.
    D Building online communities of users who share same interests/activities
    30s
  • Q2
    3. video conferencing
    D Building online communities of users who share same interests/activities
    C This is often called the 'Social Web' because of the way that users can interact and share. It's also been called the 'Read-Write Web' because much of the content is now written by users.
    B An interactive webpage which can be edited by users and anyone can contribute entries (notaccurate). It contains information about a variety of topics that can be searched
    A Meetings linked to webcams and screens that can be accessed worldwide
    30s
  • Q3
    5. Spam
    C Sending of unsolicited emails. Spam is 'junk email' that is sent automatically to thousands
    B A type of Malware that locates and saves data from users without them knowing about it
    D A piece of code that is capable of copying itself & typically has a detrimental effect
    A A program or a set of program instructions that are designed to enter a computer & disrupt its normal operations
    30s
  • Q4
    7. Should the Internet be policed? (Mark 3 arguments AGAINST this idea)
    D Prevent/reduce amount of inaccurate info being published - anyone can publish anything!
    C Prevent children/vulnerable groups from accessing undesirable websites
    A Expense of policing could fall on end-users
    B Difficult to enforce on a global scale
    30s
  • Q5
    9. Authentication
    D The process that enables work to be conducted from any place at any time through the use of communications technology
    C The process in which a user's user name and password are checked against a system database that contains all user account information.
    B The condition that shows the information true and updated
    A The degree to which a study accurately reflects or assesses the specific concepts that the researcher is attempting to measure.
    30s
  • Q6
    11. Overloaded Power Sockets (Safety problem). Mark its main DANGER.
    C Always make sure there are fire extinguishers nearby
    D It can result in the socket being overloaded, overheating & a fire starting.
    A Place cables inside cable ducts or under the carpet/flooringducts
    B Keep drinks & food away from computers
    30s
  • Q7
    13. Deskilling
    C retrained for a job which requires new skills
    A traditional skills replaced by jobs that require few skills
    B Having or needing some training; having or requiring more training than unskilled labour but less than skilled labour
    30s
  • Q8
    15. Encrypting
    A Secretly gaining access to computers and files without permission
    C Using fake emails to get personal details. These emails appear to come from well-known companies
    B The process of transforming data into a non-readable form for security purposes.
    D Infecting legitimate websites with malicious code that redirects users to bogus versions of the site, enabling them to obtain personal details
    30s
  • Q9
    17. memory chip
    B A global network connecting millions of computers
    C Electronic circuits that can store data
    D It is a small cpu (central processing unit) built onto a single chip. It is put into electronic devices to control how they function. eg: Programmable microwave ovens
    A An input device, output device or secondary storage device that is not part of the central processing unit (CPU)
    30s
  • Q10
    19. Firewall
    D A product of the intellect such as an expressed idea or concept that has commercial value.
    C It is a piece of software that is placed between your computer/LAN and the rest of the network/WAN (where the hackers are!);it is like a 'shield' between your computer and the Internet.
    B A copy of data that is made in case the original data is lost or damaged. It can be used to restore the original data.
    A If you have it over some software, it means that you have the protection of the law if anyone tries to steal your software.
    30s
  • Q11
    21. Copyright
    D A product of the intellect such as an expressed idea or concept that has commercial value.
    A If you have it over some software, it means that you have the protection of the law if anyone tries to steal your software.
    B A copy of data that is made in case the original data is lost or damaged. It can be used to restore the original data.
    C It is a piece of software that is placed between your computer/LAN and the rest of the network/WAN (where the hackers are!);it is like a 'shield' between your computer and the Internet.
    30s
  • Q12
    23. Blog
    C A little piece of information that is put on your computer to allow some servers to track everything you do on the Internet
    D Improper remove of hardware or a faulty file may carry a virus
    B A web log that acts as an online diary where users can express their opinions about a topic and receive feedback
    A An interactive webpage which can be edited by users and anyone can contribute entries
    30s
  • Q13
    25. The use of the computer to predict the outcome of a real-life situation by using a model of that situation.
    A Simulation
    C Data logging
    D Batch processing
    B Monitoring
    30s
  • Q14
    28. What is a Server?
    A It connects computers and devices together by using a form of packet switching which then sends data to a device connected to it.
    C A computer or device that manages networks
    B A hardware device that connects multiple computers together in a network and allows them to share data.
    30s
  • Q15
    29. What is a Hub?
    C computer or device that manages networks
    A It connects computers and devices together by using a form of packet switching which then sends data to a device connected to it.
    D A hardware device that connects multiple computers together in a network and allows them to share data.
    B Network Interface card
    30s

Teachers give this quiz to your class