Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- choosing_a_computer:
- 1. True or false: You usually have to pay for a license to use Open Source software.
- Answer: B
- 2. Which of the following tasks requires software?
- Answer: D
- 3. "The Cloud " is:
- Answer: B
- 4. True or false: By increasing RAM, a computer's CPU can process more quickly.
- Answer: A
- 5. A Central Processing Unit, or CPU, is:
- Answer: A
- 6. Open Source software is:
- Answer: B
- 7. On sites that use "cloud computing," how is your information being stored?
- Answer: A
- 8. Which of the following is true about tablet computers?
- Answer: A
- 9. When buying a computer, you should:
- Answer: C
- 10. People might increase their hard drive space if:
- Answer: D
- wireless_communication:
- 1. Even if you're in your coverage area, you still may experience service interruption if:
- Answer: D
- 2. True or false: It doesn't matter what you text someone as long as you trust the person you're texting.
- Answer: B
- 3. Which of the following is true about texting while driving?
- Answer: D
- 4. When buying a cell phone, which feature is the most important?
- Answer: D
- 5. Teens can be responsible with cell phones by:
- Answer: D
- 6. True or false: Location-based services are always free.
- Answer: B
- 7. What can an emergency service application do?
- Answer: D
- 8. Which of the following is true about roaming?
- Answer: D
- 9. True or false: All types of cell phones have operating systems.
- Answer: B
- 10. True or false: People who send or receive sexually explicit messages can face legal consequences.
- Answer: A
- viral_world:
- 1. Having the most up-to-date web browser can:
- Answer: D
- 2. Which is an example of malware?
- Answer: D
- 3. Which can be a consequence of overusing technology?
- Answer: C
- 4. People might have a problem with technology if:
- Answer: D
- 5. The strongest password would include:
- Answer: A
- 6. Like 'HTTPS,' Secure Socket Layer, or SSL helps to:
- Answer: C
- 7. What can an online predator do with your personal information?
- Answer: D
- 8. True or false: A virus that arrives in spam could wipe out your entire hard drive.
- Answer: A
- 9. True or false: Using a social networking site's default privacy settings is the safest way to go.
- Answer: B
- 10. Which of the following can you be in danger of overusing?
- Answer: D
- internet_resources_and_credibility:
- 1. True or false: A website with no spelling mistakes, recent updates, and an author who isn't an expert on the subject is probably okay to use as a source.
- Answer: B
- 2. While researching online, it is important to recognize when an author has a viewpoint that doesn't take different or opposing viewpoints into consideration. This is known as what?
- Answer: C
- 3. Why is citing your research important?
- Answer: D
- 4. In order to avoid plagiarizing, you should:
- Answer: D
- 5. To improve the credibility or trustworthiness of a site, the author should list what in his or her bio?
- Answer: B
- 6. True or false: It's okay to directly quote a source in a paper, as long as you give credit to that source.
- Answer: A
- 7. True or false: Plagiarism is considered a form of stealing.
- Answer: A
- 8. Correctly paraphrasing is:
- Answer: B
- 9. Which of the following domains might indicate that a website should be investigated further to make sure it's credible?
- Answer: B
- 10. A possible consequence of plagiarizing is:
- Answer: D
- creating_multimedia_products:
- 1. People might use a word processing program to:
- Answer: B
- 2. Which statement is true?
- Answer: C
- 3. Which activity would be considered online publishing?
- Answer: A
- 4. Which example is most likely protected by fair use?
- Answer: A
- 5. Which comment is most true?
- Answer: D
- 6. True or false: You have to be professional to make and share multimedia products.
- Answer: B
- 7. A good way to use presentation software would be to:
- Answer: A
- 8. Which of the following is true about piracy?
- Answer: D
- 9. What would be the best feature to add to a blog if you want to survey people on a certain topic?
- Answer: C
- 10. Which of the following can be copyrighted?
- Answer: A
- digital_relationships_and_respect:
- 1. How often is the cyberbully victim a friend or acquaintance of the cyberbully?
- Answer: C
- 2. Which statement is typically true about cyberbullying victims?
- Answer: B
- 3. What is the most important things to do if you see cyberbullying happen?
- Answer: B
- 4. What is the best thing for a person to do if they receive a threatening e-mail from a cyberbully?
- Answer: A
- 5. True or false: Cyberbullies don't always realize the potential consequences of their action
- Answer: A
- 6. Which is a potential consequence of cyberbullying?
- Answer: D
- 7. An activity might be considered cyberbullying if:
- Answer: D
- 8. Which of the following statement is true?
- Answer: D
- 9. True or false: It can sometimes be hard to tell when someone is being cyberbullied.
- Answer: A
- 10. How can bystanders best help cyberbully victim?
- Answer: D
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement