Advertisement
Guest User

Formatted Answers Dump

a guest
Mar 14th, 2018
46
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.91 KB | None | 0 0
  1. choosing_a_computer:
  2. 1. True or false: You usually have to pay for a license to use Open Source software.
  3. Answer: B
  4.  
  5. 2. Which of the following tasks requires software?
  6. Answer: D
  7.  
  8. 3. "The Cloud " is:
  9. Answer: B
  10.  
  11. 4. True or false: By increasing RAM, a computer's CPU can process more quickly.
  12. Answer: A
  13.  
  14. 5. A Central Processing Unit, or CPU, is:
  15. Answer: A
  16.  
  17. 6. Open Source software is:
  18. Answer: B
  19.  
  20. 7. On sites that use "cloud computing," how is your information being stored?
  21. Answer: A
  22.  
  23. 8. Which of the following is true about tablet computers?
  24. Answer: A
  25.  
  26. 9. When buying a computer, you should:
  27. Answer: C
  28.  
  29. 10. People might increase their hard drive space if:
  30. Answer: D
  31.  
  32.  
  33. wireless_communication:
  34. 1. Even if you're in your coverage area, you still may experience service interruption if:
  35. Answer: D
  36.  
  37. 2. True or false: It doesn't matter what you text someone as long as you trust the person you're texting.
  38. Answer: B
  39.  
  40. 3. Which of the following is true about texting while driving?
  41. Answer: D
  42.  
  43. 4. When buying a cell phone, which feature is the most important?
  44. Answer: D
  45.  
  46. 5. Teens can be responsible with cell phones by:
  47. Answer: D
  48.  
  49. 6. True or false: Location-based services are always free.
  50. Answer: B
  51.  
  52. 7. What can an emergency service application do?
  53. Answer: D
  54.  
  55. 8. Which of the following is true about roaming?
  56. Answer: D
  57.  
  58. 9. True or false: All types of cell phones have operating systems.
  59. Answer: B
  60.  
  61. 10. True or false: People who send or receive sexually explicit messages can face legal consequences.
  62. Answer: A
  63.  
  64.  
  65. viral_world:
  66. 1. Having the most up-to-date web browser can:
  67. Answer: D
  68.  
  69. 2. Which is an example of malware?
  70. Answer: D
  71.  
  72. 3. Which can be a consequence of overusing technology?
  73. Answer: C
  74.  
  75. 4. People might have a problem with technology if:
  76. Answer: D
  77.  
  78. 5. The strongest password would include:
  79. Answer: A
  80.  
  81. 6. Like 'HTTPS,' Secure Socket Layer, or SSL helps to:
  82. Answer: C
  83.  
  84. 7. What can an online predator do with your personal information?
  85. Answer: D
  86.  
  87. 8. True or false: A virus that arrives in spam could wipe out your entire hard drive.
  88. Answer: A
  89.  
  90. 9. True or false: Using a social networking site's default privacy settings is the safest way to go.
  91. Answer: B
  92.  
  93. 10. Which of the following can you be in danger of overusing?
  94. Answer: D
  95.  
  96.  
  97. internet_resources_and_credibility:
  98. 1. True or false: A website with no spelling mistakes, recent updates, and an author who isn't an expert on the subject is probably okay to use as a source.
  99. Answer: B
  100.  
  101. 2. While researching online, it is important to recognize when an author has a viewpoint that doesn't take different or opposing viewpoints into consideration. This is known as what?
  102. Answer: C
  103.  
  104. 3. Why is citing your research important?
  105. Answer: D
  106.  
  107. 4. In order to avoid plagiarizing, you should:
  108. Answer: D
  109.  
  110. 5. To improve the credibility or trustworthiness of a site, the author should list what in his or her bio?
  111. Answer: B
  112.  
  113. 6. True or false: It's okay to directly quote a source in a paper, as long as you give credit to that source.
  114. Answer: A
  115.  
  116. 7. True or false: Plagiarism is considered a form of stealing.
  117. Answer: A
  118.  
  119. 8. Correctly paraphrasing is:
  120. Answer: B
  121.  
  122. 9. Which of the following domains might indicate that a website should be investigated further to make sure it's credible?
  123. Answer: B
  124.  
  125. 10. A possible consequence of plagiarizing is:
  126. Answer: D
  127.  
  128.  
  129. creating_multimedia_products:
  130. 1. People might use a word processing program to:
  131. Answer: B
  132.  
  133. 2. Which statement is true?
  134. Answer: C
  135.  
  136. 3. Which activity would be considered online publishing?
  137. Answer: A
  138.  
  139. 4. Which example is most likely protected by fair use?
  140. Answer: A
  141.  
  142. 5. Which comment is most true?
  143. Answer: D
  144.  
  145. 6. True or false: You have to be professional to make and share multimedia products.
  146. Answer: B
  147.  
  148. 7. A good way to use presentation software would be to:
  149. Answer: A
  150.  
  151. 8. Which of the following is true about piracy?
  152. Answer: D
  153.  
  154. 9. What would be the best feature to add to a blog if you want to survey people on a certain topic?
  155. Answer: C
  156.  
  157. 10. Which of the following can be copyrighted?
  158. Answer: A
  159.  
  160.  
  161. digital_relationships_and_respect:
  162. 1. How often is the cyberbully victim a friend or acquaintance of the cyberbully?
  163. Answer: C
  164.  
  165. 2. Which statement is typically true about cyberbullying victims?
  166. Answer: B
  167.  
  168. 3. What is the most important things to do if you see cyberbullying happen?
  169. Answer: B
  170.  
  171. 4. What is the best thing for a person to do if they receive a threatening e-mail from a cyberbully?
  172. Answer: A
  173.  
  174. 5. True or false: Cyberbullies don't always realize the potential consequences of their action
  175. Answer: A
  176.  
  177. 6. Which is a potential consequence of cyberbullying?
  178. Answer: D
  179.  
  180. 7. An activity might be considered cyberbullying if:
  181. Answer: D
  182.  
  183. 8. Which of the following statement is true?
  184. Answer: D
  185.  
  186. 9. True or false: It can sometimes be hard to tell when someone is being cyberbullied.
  187. Answer: A
  188.  
  189. 10. How can bystanders best help cyberbully victim?
  190. Answer: D
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement