Review 1 Module Test 1. ___________________ is the act of breaking into a computer to steal information. A. Safe-cracking B. Hacking C. Identity theft D. Lifting 2. Is "Ih@%eC@ts!" a strong password? A. Yes B. No 3. The Fair Use rule of copyright law explains ________. A. when free use of copyrighted material is acceptable. B. when free use of copyrighted material is unacceptable. 4. What type of identity theft occurs when a thief spends another person's money or opens a line of credit in their name? A. Governmental B. Financial C. Criminal D. Medical 5. A software license is an agreement between you and the owner of a software program that allows you to perform certain tasks with software. A. True B. False 6. Does a company have the right to monitor all your digital communications if you are using their equipment? A. No B. Yes 7. Dependency on technology is one of the ________________ impacts of technology on the workplace. A. negative B. positive 8. Free Wi-Fi is typically offered on a(n) _____________ network. A. encrypted B. open C. private D. unencrypted Review 1 Module Test 9. To whom should you report cyberbullying? A. Church members B. Classmates C. Authority figures D. Friends 10. Plagiarism is the _____________ of someone else's words or ideas and presenting them as your own. A. borrowing B. stealing C. rewording D. remixing 11. Public domain represents works whose intellectual property rights have extended or works that have been released by the creator. A. False B. True 12. The digital divide is an economic ________________ between groups, broadly construed, in terms of access to, use of, or knowledge of information and communication technologies. A. normalcy B. inequality C. abnormality D. equality 13. Ryan receives an email from his cousin Mike. The subject of the email looks strange and it has an attachment. What should Ryan do? A. Respond to the email B. Delete the email C. Ask Mike if he sent the email D. Open the attachment 14. Antivirus software is a computer program that _____________, prevents, and takes action to disarm or remove malicious software programs. A. deters B. avoids C. approves D. detects 15. Confidential and proprietary information is information that ______________ be shared outside of the company without prior consent. A. should not B. is allowed to C. can D. should Review 1 Module Test 16. Asking questions are important to determining the best use of digital communication because they help me think _______________________, which helps me make better decisions. A. after taking action B. while taking action C. about past actions D. before taking action 17. A digital footprint is all of the information on-line about a person posted by that person or others, ________________________. A. recklessly B. intentionally or unintentionally C. intentionally D. unintentionally or accidentally 18. Which of the following is a illegal? A. Plagiarism B. Copyright violation C. Both A and B 19. A digital native is a person who has been exposed to technology at a(n) ____________________ and is comfortable using it. A. home B. old age C. young age D. school 20. Protecting what is added to your digital footprint is important because potentially embarrassing information can remain on-line _________________________. A. forever B. until it is forgotten C. up to 6 months D. until removed 21. Select the item below that can be protected by a copyright: A. Ideas B. Facts C. Music 22. Downtime is one of the ________________ impacts of technology on the workplace. A. positive B. negative Review 1 Module Test 23. Visiting Internet sites that are prohibited by an employer could result in consequences up to and including termination. A. False B. True 24. Which of the following is a positive impact of technology on society? A. Staying connected B. Global deterioration C. Inactive lifestyles D. Decreased human interaction 25. Cyberbullying is protected by Freedom of Speech. A. False B. True 26. A ____________ attaches itself to a file or program, enabling it to spread from one computer to another. A. worm B. computer virus 27. Julia receives an email from an unknown source. The subject of the email looks strange and it has an attachment. What should Julia do? A. Forward the email B. Open the attachment C. Delete the email D. Respond to the email 28. Efficiency is one of the ________________ impacts of technology on the workplace. A. negative B. positive 29. Intellectual property is the works, inventions or creations of an individual, group or business. A. False B. True 30. Is making hateful comments about someone through emails, blogs, on-line profiles, or chat rooms considered a method of cyberbullying? A. No B. Yes Review 1 Module Test 31. Before I post something on-line that is critical about someone, one of the questions I should ask myself is, "Am I doing this because of a(n) _______________________?" A. emotional reaction B. rumor C. great idea D. peer pressuring me 32. Hiring managers and college admissions officers are some of the people who use social media and other Internet resources to research candidates for employment. A. False B. True 33. Malware is software that has ____________________________. A. malicious intent B. positive intent C. faster speed D. poor behavior 34. A ____________ conviction in a cyberbullying case may result in the offender paying restitution to the victim's family. A. civil B. criminal 35. What is software that is provided to others with restrictions or for a certain limited trial basis? A. Purchased license B. Freeware C. Shareware 36. Cyberbullying is the use of Information Technology to harm or harass other people in a _______________, repeated, and hostile manner. A. accidental B. deliberate C. unconscious D. inappropriate 37. The "A" in the D.E.A.L. acronym stands for A. Applaud B. Assess C. Authenticate D. Ascertain Review 1 Module Test 38. Identity theft is when someone wrongfully obtains and uses another person's personal data, typically for economic gain. A. False B. True 39. How are digital assets and digital footprints related? A. Digital assets and digital footprints are not related B. Digital assets create digital footprints C. Digital footprints create digital assets D. Digital assets and digital footprints are the same 40. What type of identity theft occurs when a thief uses someone's Social Security Number (SSN) to file taxes or reap other benefits? A. Medical B. Financial C. Governmental D. Criminal 41. Which control would you use to start customizing a browser? A. Settings B. Refresh C. Home D. Bookmark 42. What is the domain for the URL: http://www.nasa.gov/astronauts/index.html? A. astronauts/index.html B. http:// C. www.nasa.gov 43. In an URL what does the domain name describe? A. The network or computer linked to the Internet B. The protocol used by the web server C. The path of the web page on the web server 44. Which statement is TRUE? A. You can use the same keyword list across multiple search engines with equal results. B. You can share bookmarks when everyone uses the same Web browser. C. Bookmarks are a way to save search results. Review 1 Module Test 45. What is plagiarism? A. When you create your own original work B. When you redo someone else's original work C. When you use someone else's original work as your own D. When you copy someone else's original work but give them credit 46. You want to include music from a local musician in your school play. You send him an e-mail message, but he doesn't reply. Can you use his music? A. No, because you did not receive permission. B. Yes, because you intend to credit him. C. Yes, as long as you have a copy of the request. 47. Which of the following is the best way to organize your bookmarks? A. Alphabetically using the bookmark title B. Use folders to hold related bookmarks C. Use the size of the bookmarked web page D. Use the creation date of the bookmark 48. What is the file path for the URL: http://www.mydomain.com/main/index.html? A. www.mydomain.com B. http:// C. main/index.html 49. You are doing research for a science project on current trends in nanotechnology. You do a web search for information that includes several interesting articles with publish dates about a year ago. Which evaluation factor are you using when you decide NOT to use these articles? A. Authority B. Accuracy C. Comprehensiveness D. Bias E. Relevance 50. What is used to identify the location of web pages? A. HTML B. URL C. Domain D. ARPANET 51. Which of the following statements is TRUE? A. You can use material considered public domain without permission. B. Companies can copyright slogans C. The federal government holds the copyright to the Declaration of Independence. Review 1 Module Test 52. What is saved when you bookmark a web page? A. The web page author B. The web page size C. The web page media D. The web page URL 53. What is HTML? A. A computer program that displays web pages B. A tag language used to convert documents into web pages C. A computer language that stores web pages 54. What is a web browser? A. A computer that stores web pages B. A program used to display web pages C. A computer that runs HTML 55. Where would the following URL most likely to send you: http://www.nasa.gov/astronauts/index.html? A. Facebook pages for space station astronauts B. Information about the solar system C. A page that contains information about U.S. astronauts D. The main page of the NASA Web site 56. What is an advantage of using a meta-search engine? A. Searches use several search engines at once B. Searches return a high rate of relative results C. Searches can use complex search "language" D. Searches are comprehensive 57. You find a Web site that has an article containing information you need for a report. You like the way the author has organized the content. You copy several sections and continue to add more information from other sources in your report. Is this plagiarism? A. No, because you used more than one source of information. B. Yes, because you copied the author's words and structure. C. No. As long as you add credit the author, you are fine. 58. How would you search for a specific phrase? A. Use the OR operator between each word in the phrase B. Use the AND operator between each word in the phrase C. Use quotation marks around the phrase Review 1 Module Test 59. You want to use copyrighted material on an educational blog. Which of the following statements is TRUE? A. The Fair Use exemption allows you to use copyright material but limits it by type of material, such as text only, not an image. B. The Fair Use exemption allows you to use a limited amounts of the copyright material. C. The Fair Use exemption allows you to use unlimited amounts of the copyright material. 60. You want to find information on Disney World in Tokyo for the last three years, written in English. What is the best way to search for this information? A. Use your keywords and the Boolean operators (AND, NOT and OR) B. Use the Advanced Search feature to specify an exact search phrase, year and language. C. Use your keywords, each separated by a space. D. Use quotes around your key phrases. 61. Is rearranging word in a sentence a good way to avoid plagiarism? A. Yes B. No 62. You want to find who invented the x-ray machine. Which of the following search would provide the best results? A. (x-ray OR machine) AND invented B. x-ray AND machine OR invented C. x-ray AND machine AND invented D. Who invented the x-ray machine? 63. Many works by Mark Twain were published before 1923. In addition, there are other works that were discovered after his death and published in the 1960s. Which of the following items are no longer under copyright protection? A. Everything published by Mark Twain before 1923. B. Commentary on Mark Twain’s work. C. The complete collection of Mark Twain. 64. What will happen to the number of returns you get if you use the NOT Boolean operator in a search? A. The number will be larger. B. The number will be smaller. C. The number will not change 65. You are buying a new bicycle and want to find articles that compare mountain bikes and hybrid bikes. Which search would be best? A. Mountain OR hybrid bikes B. Mountain NOT hybrid bikes C. Mountain AND hybrid bikes Review 1 Module Test 66. If your friends are involved in cyberbullying, you should A. hope it goes away. B. ignore it. C. join in the fun. D. ask them to stop. 67. Which Boolean operation is indicated by the figure? A. A + B B. A OR B C. A not B 68. Which part of the web browser is highlighted? A. Search bar B. Address bar C. Bookmark bar D. Address and Bookmark bar E. Address and Search bar Review 1 Module Test 69. Which button would you click to Bookmark the currently displayed web page. A. B. C. D. Review 1 Module Test Answer Key 1. B - Hacking 2. A - Yes 3. A - when free use of copyrighted material is acceptable. 4. B - Financial 5. A - True 6. B - Yes 7. A - negative 8. D - unencrypted 9. C - Authority figures 10. B - stealing 11. A - False 12. D - equality 13. C - Ask Mike if he sent the email 14. D - detects 15. A - should not 16. D - before taking action 17. B - intentionally or unintentionally 18. B - Copyright violation 19. C - young age 20. A - forever 21. C - Music 22. B - negative 23. B - True 24. A - Staying connected 25. A - False 26. B - computer virus 27. C - Delete the email 28. B - positive 29. B - True 30. B - Yes 31. A - emotional reaction Review 1 Module Test 32. B - True 33. A - malicious intent 34. A - civil 35. C - Shareware 36. B - deliberate 37. C - Authenticate 38. B - True 39. B - Digital assets create digital footprints 40. C - Governmental 41. A - Settings 42. C - www.nasa.gov 43. A - The network or computer linked to the Internet 44. C - Bookmarks are a way to save search results. 45. C - When you use someone else's original work as your own 46. A - No, because you did not receive permission. 47. B - Use folders to hold related bookmarks 48. C - main/index.html 49. E - Relevance 50. B - URL 51. A - You can use material considered public domain without permission. 52. D - The web page URL 53. B - A tag language used to convert documents into web pages 54. B - A program used to display web pages 55. C - A page that contains information about U.S. astronauts 56. A - Searches use several search engines at once 57. B - Yes, because you copied the author's words and structure. 58. C - Use quotation marks around the phrase 59. B - The Fair Use exemption allows you to use a limited amounts of the copyright material. 60. B - Use the Advanced Search feature to specify an exact search phrase, year and language. 61. B - No 62. D - Who invented the x-ray machine? 63. A - Everything published by Mark Twain before 1923. 64. B - The number will be smaller. Review 1 Module Test 65. C - Mountain AND hybrid bikes 66. D - ask them to stop. 67. A- A+B 68. E - Address and Search bar 69. D
© Copyright 2026 Paperzz