50 questions
You usually have to pay for a license to use Open Source software.
True
False
The "Cloud" is
a form of word processing
a network for accessing applications and your files from any device
a virtual gaming environment
a kind of security software
By increasing RAM, a computer's CPU can process more quickly.
True
False
It doesn't matter what you text to someone as long as you trust the person you are texting.
True
False
"Roaming" is when people use a cell phone network different from their own.
True
False
Keeping your web browser up-to-date will
Increase your browser speed
Allow you to view the most up-to-date version of websites
Increase your online security
All of these
Which of the following web protocols is most secure?
FTP
HTTPS
HTTP
WWW
secure.web.gov
A virus that arrives in spam could delete your entire hard drive.
True
False
Using a social network site's default privacy settings is the safest way to go.
True
False
Why is citing your research important?
To know where you got your information from
To improve the credibility of what you wrote
To give credit to the person that gave you information
All of the above
Correctly paraphrasing is:
Using the author's exact words but including citation
Rewriting the author's words in your own words and including a citation
Rewriting the author's words in your own words but not including a citation
None of the above
One possible consequence of plagiarizing is getting a failing grade.
True
False
Commenting on a friend's social networking profile would be considered online publishing.
True
False
A cyberbullying could potentially be expelled from school and face jail time.
True
False
An activity might be considered cyberbullying if:
It could make a person feel embarrassed
It could make a person feel unsafe
Adults would generally disapprove of the activity
All of the above
People have complete control over who sees their online content.
true
false
__________________ includes the physical parts of a computer such as the monitor, mouse, and RAM.
Internet
Hardware
Software
RAM
_____________________ is the address of a website.
WWW
Spam
URL
Web Browser
__________________ is using technology to harm others through deliberate, repeated, and hostile attacks.
Spam
Piracy
Cyberbullying
Plagiarism
What should people do when they are cyberbullied?
Delete any messages received from the cyberbully
Respond to the cyberbully right away
Talk to a trusted adult about what happened.
If you know someone is being cyberbullied, what is something you should do?
Report it to a trusted adult.
Help them get revenge.
Confront the bully.
Nothing - it's not your problem.
You can only become addicted to things like drugs and alcohol, not technology.
True
False
Computer software that displays advertisements is known as
Malware.
Adware.
a Virus
Spam.
CPU stands for ___________ and is like the "brain" of the computer.
Central Production Unit
Central Power Unit
Central Processing Unit
Computer Power Up
When you keep track of your resources during research and write them down you are able to write proper
citations.
calculations.
cpu.
bias.
If something is trustworthy or believable, we say it is
credible.
colorful.
biased.
cloud computing.
The programs and files found on your actual computer are stored in/on the
RAM.
CPU.
Hard Drive.
Processor.
Chrome, Firefox, Safari, and Internet Explorer are examples of
web browsers.
operating systems.
malware.
search engines.
Bing, Google, DuckDuckGo, and Yahoo are examples of
web browsers.
search engines.
cloud computing.
RAM.
The information you put into a computer is known as _____ and could come from a keyboard, mouse, camera, or game controller, or microphone.
output
input
shot put
put put
Computer ______ is the information that comes out of a computer and could be everything from music, video, or a printed paper.
shot put
input
output
data
When is it ok to share personal information like your full name, and address online?
Only when you buy something online.
Only when you're on a site you can trust and that is secure (ex. HTTPS).
Only for social networking profiles.
Only when a really good friend you met online is asking for it.
What are the best privacy settings to have when using social media accounts?
custom
default from the company
as few as possible
none
A "strong" password should include
an important date and your first name with capital letters.
your name.
upper- and lowercase letters, numbers, and special characters.
a lot of numbers.
Inappropriate online behavior is ok as long as you say you were joking.
True
False
Cyberbullying can have consequences at school and with law enforcement.
True
False
Why is citing your research important?
To know from where you got your information.
To improve the credibility of what you write or make.
To give credit to the person or resource from where you got the information.
All of these are important reasons for citing research.
In order to avoid plagiarizing, you should (select all correct answers).
Always cite your sources.
Ask for help if you aren't sure.
Try to explain ideas in your own words (paraphrase)
Just change one or two words from a sentence you copy.
Which of the following can be copyrighted? (select all correct answers)
Facts
Songs
Images & Pictures
Videos
Software & Apps
When you delete something online, it's gone forever.
True
False
What should someone do if they are being cyberbullied? (choose all correct responses)
Report it to a trusted adult.
Get revenge as soon as possible.
Save any messages received from the cyberbully as evidence.
Bully them back with a fake user account.
Online activities can have consequences in real life.
True
False
People might increase their hard drive space if:
They want a wireless internet connection.
They want to download lots of music files
They want to store a ton of photos
They have a lot of videos and movies.
Information from which web domain(s) should probably be researched further?
.gov
.net
.com
.org
.edu