Review 1 - Spring Branch ISD

Review 1
Module Test
1. ___________________ is the act of breaking into a computer to steal information.
A. Safe-cracking
B. Hacking
C. Identity theft
D. Lifting
2. Is "Ih@%eC@ts!" a strong password?
A. Yes
B. No
3. The Fair Use rule of copyright law explains ________.
A. when free use of copyrighted material is acceptable.
B. when free use of copyrighted material is unacceptable.
4. What type of identity theft occurs when a thief spends another person's money or opens a line of credit in their
name?
A. Governmental
B. Financial
C. Criminal
D. Medical
5. A software license is an agreement between you and the owner of a software program that allows you to
perform certain tasks with software.
A. True
B. False
6. Does a company have the right to monitor all your digital communications if you are using their equipment?
A. No
B. Yes
7. Dependency on technology is one of the ________________ impacts of technology on the workplace.
A. negative
B. positive
8. Free Wi-Fi is typically offered on a(n) _____________ network.
A. encrypted
B. open
C. private
D. unencrypted
Review 1
Module Test
9. To whom should you report cyberbullying?
A. Church members
B. Classmates
C. Authority figures
D. Friends
10. Plagiarism is the _____________ of someone else's words or ideas and presenting them as your own.
A. borrowing
B. stealing
C. rewording
D. remixing
11. Public domain represents works whose intellectual property rights have extended or works that have been
released by the creator.
A. False
B. True
12. The digital divide is an economic ________________ between groups, broadly construed, in terms of access
to, use of, or knowledge of information and communication technologies.
A. normalcy
B. inequality
C. abnormality
D. equality
13. Ryan receives an email from his cousin Mike. The subject of the email looks strange and it has an
attachment. What should Ryan do?
A. Respond to the email
B. Delete the email
C. Ask Mike if he sent the email
D. Open the attachment
14. Antivirus software is a computer program that _____________, prevents, and takes action to disarm or
remove malicious software programs.
A. deters
B. avoids
C. approves
D. detects
15. Confidential and proprietary information is information that ______________ be shared outside of the
company without prior consent.
A. should not
B. is allowed to
C. can
D. should
Review 1
Module Test
16. Asking questions are important to determining the best use of digital communication because they help me
think _______________________, which helps me make better decisions.
A. after taking action
B. while taking action
C. about past actions
D. before taking action
17. A digital footprint is all of the information on-line about a person posted by that person or others,
________________________.
A. recklessly
B. intentionally or unintentionally
C. intentionally
D. unintentionally or accidentally
18. Which of the following is a illegal?
A. Plagiarism
B. Copyright violation
C. Both A and B
19. A digital native is a person who has been exposed to technology at a(n) ____________________ and is
comfortable using it.
A. home
B. old age
C. young age
D. school
20. Protecting what is added to your digital footprint is important because potentially embarrassing information
can remain on-line _________________________.
A. forever
B. until it is forgotten
C. up to 6 months
D. until removed
21. Select the item below that can be protected by a copyright:
A. Ideas
B. Facts
C. Music
22. Downtime is one of the ________________ impacts of technology on the workplace.
A. positive
B. negative
Review 1
Module Test
23. Visiting Internet sites that are prohibited by an employer could result in consequences up to and including
termination.
A. False
B. True
24. Which of the following is a positive impact of technology on society?
A. Staying connected
B. Global deterioration
C. Inactive lifestyles
D. Decreased human interaction
25. Cyberbullying is protected by Freedom of Speech.
A. False
B. True
26. A ____________ attaches itself to a file or program, enabling it to spread from one computer to another.
A. worm
B. computer virus
27. Julia receives an email from an unknown source. The subject of the email looks strange and it has an
attachment. What should Julia do?
A. Forward the email
B. Open the attachment
C. Delete the email
D. Respond to the email
28. Efficiency is one of the ________________ impacts of technology on the workplace.
A. negative
B. positive
29. Intellectual property is the works, inventions or creations of an individual, group or business.
A. False
B. True
30. Is making hateful comments about someone through emails, blogs, on-line profiles, or chat rooms considered
a method of cyberbullying?
A. No
B. Yes
Review 1
Module Test
31. Before I post something on-line that is critical about someone, one of the questions I should ask myself is,
"Am I doing this because of a(n) _______________________?"
A. emotional reaction
B. rumor
C. great idea
D. peer pressuring me
32. Hiring managers and college admissions officers are some of the people who use social media and other
Internet resources to research candidates for employment.
A. False
B. True
33. Malware is software that has ____________________________.
A. malicious intent
B. positive intent
C. faster speed
D. poor behavior
34. A ____________ conviction in a cyberbullying case may result in the offender paying restitution to the victim's
family.
A. civil
B. criminal
35. What is software that is provided to others with restrictions or for a certain limited trial basis?
A. Purchased license
B. Freeware
C. Shareware
36. Cyberbullying is the use of Information Technology to harm or harass other people in a _______________,
repeated, and hostile manner.
A. accidental
B. deliberate
C. unconscious
D. inappropriate
37. The "A" in the D.E.A.L. acronym stands for
A. Applaud
B. Assess
C. Authenticate
D. Ascertain
Review 1
Module Test
38. Identity theft is when someone wrongfully obtains and uses another person's personal data, typically for
economic gain.
A. False
B. True
39. How are digital assets and digital footprints related?
A. Digital assets and digital footprints are not related
B. Digital assets create digital footprints
C. Digital footprints create digital assets
D. Digital assets and digital footprints are the same
40. What type of identity theft occurs when a thief uses someone's Social Security Number (SSN) to file taxes or
reap other benefits?
A. Medical
B. Financial
C. Governmental
D. Criminal
41. Which control would you use to start customizing a browser?
A. Settings
B. Refresh
C. Home
D. Bookmark
42. What is the domain for the URL: http://www.nasa.gov/astronauts/index.html?
A. astronauts/index.html
B. http://
C. www.nasa.gov
43. In an URL what does the domain name describe?
A. The network or computer linked to the Internet
B. The protocol used by the web server
C. The path of the web page on the web server
44. Which statement is TRUE?
A. You can use the same keyword list across multiple search engines with equal results.
B. You can share bookmarks when everyone uses the same Web browser.
C. Bookmarks are a way to save search results.
Review 1
Module Test
45. What is plagiarism?
A. When you create your own original work
B. When you redo someone else's original work
C. When you use someone else's original work as your own
D. When you copy someone else's original work but give them credit
46. You want to include music from a local musician in your school play. You send him an e-mail message, but he
doesn't reply. Can you use his music?
A. No, because you did not receive permission.
B. Yes, because you intend to credit him.
C. Yes, as long as you have a copy of the request.
47. Which of the following is the best way to organize your bookmarks?
A. Alphabetically using the bookmark title
B. Use folders to hold related bookmarks
C. Use the size of the bookmarked web page
D. Use the creation date of the bookmark
48. What is the file path for the URL: http://www.mydomain.com/main/index.html?
A. www.mydomain.com
B. http://
C. main/index.html
49. You are doing research for a science project on current trends in nanotechnology. You do a web search for
information that includes several interesting articles with publish dates about a year ago. Which evaluation factor
are you using when you decide NOT to use these articles?
A. Authority
B. Accuracy
C. Comprehensiveness
D. Bias
E. Relevance
50. What is used to identify the location of web pages?
A. HTML
B. URL
C. Domain
D. ARPANET
51. Which of the following statements is TRUE?
A. You can use material considered public domain without permission.
B. Companies can copyright slogans
C. The federal government holds the copyright to the Declaration of Independence.
Review 1
Module Test
52. What is saved when you bookmark a web page?
A. The web page author
B. The web page size
C. The web page media
D. The web page URL
53. What is HTML?
A. A computer program that displays web pages
B. A tag language used to convert documents into web pages
C. A computer language that stores web pages
54. What is a web browser?
A. A computer that stores web pages
B. A program used to display web pages
C. A computer that runs HTML
55. Where would the following URL most likely to send you: http://www.nasa.gov/astronauts/index.html?
A. Facebook pages for space station astronauts
B. Information about the solar system
C. A page that contains information about U.S. astronauts
D. The main page of the NASA Web site
56. What is an advantage of using a meta-search engine?
A. Searches use several search engines at once
B. Searches return a high rate of relative results
C. Searches can use complex search "language"
D. Searches are comprehensive
57. You find a Web site that has an article containing information you need for a report. You like the way the
author has organized the content. You copy several sections and continue to add more information from other
sources in your report. Is this plagiarism?
A. No, because you used more than one source of information.
B. Yes, because you copied the author's words and structure.
C. No. As long as you add credit the author, you are fine.
58. How would you search for a specific phrase?
A. Use the OR operator between each word in the phrase
B. Use the AND operator between each word in the phrase
C. Use quotation marks around the phrase
Review 1
Module Test
59. You want to use copyrighted material on an educational blog. Which of the following statements is TRUE?
A. The Fair Use exemption allows you to use copyright material but limits it by type of material, such as text only,
not an image.
B. The Fair Use exemption allows you to use a limited amounts of the copyright material.
C. The Fair Use exemption allows you to use unlimited amounts of the copyright material.
60. You want to find information on Disney World in Tokyo for the last three years, written in English. What is the
best way to search for this information?
A. Use your keywords and the Boolean operators (AND, NOT and OR)
B. Use the Advanced Search feature to specify an exact search phrase, year and language.
C. Use your keywords, each separated by a space.
D. Use quotes around your key phrases.
61. Is rearranging word in a sentence a good way to avoid plagiarism?
A. Yes
B. No
62. You want to find who invented the x-ray machine. Which of the following search would provide the best
results?
A. (x-ray OR machine) AND invented
B. x-ray AND machine OR invented
C. x-ray AND machine AND invented
D. Who invented the x-ray machine?
63. Many works by Mark Twain were published before 1923. In addition, there are other works that were
discovered after his death and published in the 1960s. Which of the following items are no longer under copyright
protection?
A. Everything published by Mark Twain before 1923.
B. Commentary on Mark Twain’s work.
C. The complete collection of Mark Twain.
64. What will happen to the number of returns you get if you use the NOT Boolean operator in a search?
A. The number will be larger.
B. The number will be smaller.
C. The number will not change
65. You are buying a new bicycle and want to find articles that compare mountain bikes and hybrid bikes. Which
search would be best?
A. Mountain OR hybrid bikes
B. Mountain NOT hybrid bikes
C. Mountain AND hybrid bikes
Review 1
Module Test
66. If your friends are involved in cyberbullying, you should
A. hope it goes away.
B. ignore it.
C. join in the fun.
D. ask them to stop.
67. Which Boolean operation is
indicated by the figure?
A. A + B
B. A OR B
C. A not B
68. Which part of the web
browser is highlighted?
A. Search bar
B. Address bar
C. Bookmark bar
D. Address and Bookmark bar
E. Address and Search bar
Review 1
Module Test
69. Which button would you click
to Bookmark the currently
displayed web page.
A.
B.
C.
D.
Review 1
Module Test
Answer Key
1.
B - Hacking
2.
A - Yes
3.
A - when free use of copyrighted material is acceptable.
4.
B - Financial
5.
A - True
6.
B - Yes
7.
A - negative
8.
D - unencrypted
9.
C - Authority figures
10.
B - stealing
11.
A - False
12.
D - equality
13.
C - Ask Mike if he sent the email
14.
D - detects
15.
A - should not
16.
D - before taking action
17.
B - intentionally or unintentionally
18.
B - Copyright violation
19.
C - young age
20.
A - forever
21.
C - Music
22.
B - negative
23.
B - True
24.
A - Staying connected
25.
A - False
26.
B - computer virus
27.
C - Delete the email
28.
B - positive
29.
B - True
30.
B - Yes
31.
A - emotional reaction
Review 1
Module Test
32.
B - True
33.
A - malicious intent
34.
A - civil
35.
C - Shareware
36.
B - deliberate
37.
C - Authenticate
38.
B - True
39.
B - Digital assets create digital footprints
40.
C - Governmental
41.
A - Settings
42.
C - www.nasa.gov
43.
A - The network or computer linked to the Internet
44.
C - Bookmarks are a way to save search results.
45.
C - When you use someone else's original work as your own
46.
A - No, because you did not receive permission.
47.
B - Use folders to hold related bookmarks
48.
C - main/index.html
49.
E - Relevance
50.
B - URL
51.
A - You can use material considered public domain without permission.
52.
D - The web page URL
53.
B - A tag language used to convert documents into web pages
54.
B - A program used to display web pages
55.
C - A page that contains information about U.S. astronauts
56.
A - Searches use several search engines at once
57.
B - Yes, because you copied the author's words and structure.
58.
C - Use quotation marks around the phrase
59.
B - The Fair Use exemption allows you to use a limited amounts of the copyright material.
60.
B - Use the Advanced Search feature to specify an exact search phrase, year and language.
61.
B - No
62.
D - Who invented the x-ray machine?
63.
A - Everything published by Mark Twain before 1923.
64.
B - The number will be smaller.
Review 1
Module Test
65.
C - Mountain AND hybrid bikes
66.
D - ask them to stop.
67.
A- A+B
68.
E - Address and Search bar
69.
D