0% found this document useful (0 votes)
87 views

Class 8 ICTech WSheet # 1

This document is a practice worksheet for an 8th grade ICTech class on the topic of internet searching techniques and e-safety. It contains questions to test students' understanding of key terms related to searching the internet such as search engines, keywords, hits, spiders, and popups. It also covers topics like plagiarism, cyberbullying, fake news, and live streaming. Students are asked to fill in blanks, select correct options, and identify true/false statements about these internet searching and e-safety concepts.

Uploaded by

waheedalicer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views

Class 8 ICTech WSheet # 1

This document is a practice worksheet for an 8th grade ICTech class on the topic of internet searching techniques and e-safety. It contains questions to test students' understanding of key terms related to searching the internet such as search engines, keywords, hits, spiders, and popups. It also covers topics like plagiarism, cyberbullying, fake news, and live streaming. Students are asked to fill in blanks, select correct options, and identify true/false statements about these internet searching and e-safety concepts.

Uploaded by

waheedalicer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

The City School

Class 8 PAF Chapter


Chapter-1 : Internet Searching
Techniques and E-Safety Prep Section
(Pages 11-44) ICTech
Class 8 ICTech Practice Worksheet No.1 (Term-1 2023-24)
Name: ___________________ Class 8 Section: _____ Date: _____________

Q1. Fill in the blanks with the correct option.


1. A _______________ is designed to search for information on the World Wide Web by
using specified keywords.
2. Search engines rely on computer programs called _______________ or ______________
to crawl the Web and log the words on each page.
3. _______________ involves avoiding plagiarism by giving credit to the work of other
scholars, allowing your reader to track down the sources cited.
4. _______________refers to the group of people that use technology to communicate.
5. _______________ is bullying that occurs online, often through instant messaging, text
messages, emails and social networks.
6. _______________ is deliberately made-up stories or images to make people believe
something that isn’t true.
7. _______________ are adverts for products and services and other times they are
phishing scams.
8. _______________ is the broadcasting of real-time, live video to an audience over the
internet.
9. A _______________ is a secret word, phrase or combination of characters that allows
you access to protected information or an account.

Q2. Select the correct option.


i. Google receives around ______ searches per second on any given day.
(a) 63000 (b) 10000 (c) 2000

ii. 40% of the Internet users will bounce back out if the page takes longer than _____
seconds to load.
(a) 10 (b) 3 (c) 13

iii. The purpose of using __________ search engine is for doing the organic searching.
(a) Yahoo.com (b) images.google.com (c) duckduckgo.com

Class 8 ICTech Worksheet No. 1 - Chapter: Internet Searching Techniques and E-Safety Page 1 of 2
iv. The search results are usually presented in a list commonly called ___________.
(a) hits (b) keywords (c) spiders

v. A search engine is designed to search for information on the World Wide Web by
using specified _____________.
(a) hits (b) keywords (c) spiders
Q3. Write True or False.
i. Fake news is deliberately made up stories or images to make people believe
something that isn’t true. ( _________)
ii. Live streaming is the broadcasting of real time live video to an audience over the
Internet. ( _________)
iii. A popup is a secret word, phrase or combination of characters that allows you
access to protected information or an account. ( _________)

Class 8 ICTech Worksheet No. 1 - Chapter: Internet Searching Techniques and E-Safety Page 2 of 2

You might also like