Internet Usage And Safety MS

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Masterson
M
Masterson
Community Contributor
Quizzes Created: 5 | Total Attempts: 7,951
| Attempts: 363 | Questions: 15
Please wait...
Question 1 / 15
0 %
0/100
Score 0/100
1. What are you expected to do if you see a classmate using a computer website that you know is blocked by the school's firewall?

Explanation

If you see a classmate using a computer website that you know is blocked by the school's firewall, the best course of action would be to privately tell the teacher about it. This way, you are not directly confronting or embarrassing the classmate, but you are still taking the responsible step of reporting the issue to the appropriate authority. By informing the teacher privately, you allow them to address the situation and ensure that the classmate is following the school's rules and guidelines.

Submit
Please wait...
About This Quiz
Internet Usage And Safety MS - Quiz

The 'Internet Usage and Safety MS' quiz assesses knowledge on ethical internet practices, focusing on website evaluation, understanding URLs, proper citation, consequences of illegal downloads, and handling blocked... see moresites responsibly. see less

2. Creating a media rich presentation means it could include:

Explanation

A media-rich presentation refers to a presentation that incorporates various types of media elements such as videos, photos, and links to related sites. By including all of the above options, the presentation becomes more engaging and visually appealing, allowing the presenter to effectively communicate their message and capture the audience's attention.

Submit
3. What is an example of a Cybercrime?

Explanation

Identity theft is an example of a cybercrime because it involves the unauthorized use of someone's personal information, such as their name, social security number, or credit card details, in order to commit fraud or other illegal activities online. This can lead to financial loss, damage to reputation, and other serious consequences for the victim. Cybercriminals often use various techniques, such as phishing emails or hacking into databases, to obtain this information and carry out identity theft.

Submit
4. If you are in a chat room and the "friend" you are talking with asks you for your real name and phone number, what should you do?

Explanation

It is important to tell a parent or teacher if someone in a chat room asks for your real name and phone number. This is because sharing personal information online can be risky and potentially dangerous. Parents and teachers can provide guidance and support in handling such situations and help ensure your safety.

Submit
5. When you go apply for a job, the military, or college; what might these supervisors check to learn more about the kind of person you are?

Explanation

Supervisors may check Facebook or Myspace pages, blogs, and conduct Google searches to learn more about the kind of person you are when you apply for a job, the military, or college. These online platforms provide insights into an individual's behavior, interests, and social interactions, allowing supervisors to assess their character and suitability for the position or institution. By examining all of these sources, supervisors can gather a comprehensive understanding of the applicant's online presence and make informed decisions based on the information found.

Submit
6. Using a photo you found on the Internet in your project without properly citing the source is an example of:

Explanation

Using a photo found on the Internet in a project without properly citing the source is considered plagiarism. Plagiarism involves presenting someone else's work or ideas as your own without giving credit to the original creator. In this case, not citing the source of the photo is a violation of intellectual property rights and unethical. It is important to always acknowledge and give credit to the original source when using someone else's work to avoid plagiarism.

Submit
7. Which of these file extensions would be for an image?

Explanation

The file extension .jpg is commonly used for image files. It stands for Joint Photographic Experts Group, which is a popular image compression format. This format allows for high-quality images with relatively small file sizes, making it ideal for sharing and displaying images on the web or in digital media. Therefore, .jpg is the correct file extension for an image file.

Submit
8. Leaving a digital footprint means:

Explanation

Leaving a digital footprint refers to the traces or records that are left behind when you engage in online activities. This can include the things you post on social media, comments you make on websites, or any other online interactions. These digital footprints can have long-lasting consequences as they can be easily accessed and potentially used against you in the future. Therefore, it is important to be mindful of what you post online as it can come back to haunt you later.

Submit
9. Look at this URL, what does it tell you about the site? https://www.ncstate.edu

Explanation

The URL "http://www.ncstate.edu" indicates that the site is associated with a higher educational institution. The ".edu" domain is typically used by educational institutions in the United States, and "ncstate" in the URL suggests that it may be associated with North Carolina State University.

Submit
10. An example of an assistive technology tool is:

Explanation

The correct answer is "All the above" because using an online dictionary, language conversion, and the read aloud feature are all examples of assistive technology tools. An online dictionary helps individuals with word definitions and spellings, language conversion tools assist in translating text into different languages, and the read aloud feature helps individuals with reading difficulties by reading the text aloud. Therefore, all of these options fall under the category of assistive technology tools.

Submit
11. When creating a report you use an online source.  What needs to be included in the citation of this resource?

Explanation

When creating a report using an online source, it is important to include all of the above information in the citation of the resource. Including the name of the author, the date you viewed the website, and the name of the web page helps provide proper credit to the original source and allows readers to easily locate the information.

Submit
12. Finding music online and downloading them without paying for them and giving them to your friends could result in  the following consequences of:

Explanation

Downloading music online without paying for it and distributing it to others is a form of copyright infringement. This action violates the rights of the musician and deprives them of income from their music. As a consequence, one could lose their computer privileges as a disciplinary action. Additionally, the musician or their representatives may take legal action and sue the individual for monetary damages. Therefore, all of the mentioned consequences are possible outcomes of engaging in such activities.

Submit
13. A portable storage device that uses a USB drive can be called many things.  Which is not considered one of them?

Explanation

A portable storage device that uses a USB drive is commonly referred to as a flash drive, thumb drive, or pen drive. However, "wire drive" is not a commonly used term to describe such devices.

Submit
14. When evaluating a website's content, which is the most important  issue?

Explanation

When evaluating a website's content, finding who made the site and where the content comes from is the most important issue. This is because knowing the source of the content helps determine its credibility and reliability. It allows the user to assess the expertise and authority of the author or organization behind the website, which is crucial in determining the accuracy and trustworthiness of the information provided. Additionally, understanding the origin of the content helps in identifying any potential biases or conflicts of interest that may influence the information presented on the website.

Submit
15. Software is a program that was purchased and installed on a computer.  Which of these is considered software?

Explanation

The options given in the question can be categorized into hardware (computer, printer, scanner, CD-ROM, thumb drive, DVD) and software (Twitter, Delicious, Facebook, word processing, spreadsheet, database). Among these options, word processing, spreadsheet, and database are considered software because they are programs that can be installed and used on a computer to perform specific tasks.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 13, 2010
    Quiz Created by
    Masterson
Cancel
  • All
    All (15)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What are you expected to do if you see a classmate using a computer...
Creating a media rich presentation means it could include:
What is an example of a Cybercrime?
If you are in a chat room and the "friend" you are talking...
When you go apply for a job, the military, or college; what might...
Using a photo you found on the Internet in your project without...
Which of these file extensions would be for an image?
Leaving a digital footprint means:
Look at this URL, what does it tell you about the site?...
An example of an assistive technology tool is:
When creating a report you use an online source.  What needs to...
Finding music online and downloading them without paying for them and...
A portable storage device that uses a USB drive can be called many...
When evaluating a website's content, which is the most...
Software is a program that was purchased and installed on a...
Alert!

Advertisement