Internet Usage And Safety MS

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Masterson
M
Masterson
Community Contributor
Quizzes Created: 6 | Total Attempts: 6,653
Questions: 15 | Attempts: 333

SettingsSettingsSettings
Internet Usage And Safety MS - Quiz

For my students only please.


Questions and Answers
  • 1. 

    When evaluating a website's content, which is the most important  issue?

    • A.

      When the last time the site was updated

    • B.

      The graphics and page design look very nice

    • C.

      Contacting the author of the site

    • D.

      Finding who made the site and where the content comes from

    Correct Answer
    D. Finding who made the site and where the content comes from
    Explanation
    When evaluating a website's content, finding who made the site and where the content comes from is the most important issue. This is because knowing the source of the content helps determine its credibility and reliability. It allows the user to assess the expertise and authority of the author or organization behind the website, which is crucial in determining the accuracy and trustworthiness of the information provided. Additionally, understanding the origin of the content helps in identifying any potential biases or conflicts of interest that may influence the information presented on the website.

    Rate this question:

  • 2. 

    Look at this URL, what does it tell you about the site? http://www.ncstate.edu

    • A.

      It is associated with a higher educational institution

    • B.

      It is associated with a government agency

    • C.

      It is associated with a branch of the military

    • D.

      It is associated with a non-profit organization

    Correct Answer
    A. It is associated with a higher educational institution
    Explanation
    The URL "http://www.ncstate.edu" indicates that the site is associated with a higher educational institution. The ".edu" domain is typically used by educational institutions in the United States, and "ncstate" in the URL suggests that it may be associated with North Carolina State University.

    Rate this question:

  • 3. 

    When creating a report you use an online source.  What needs to be included in the citation of this resource?

    • A.

      Name of the author

    • B.

      Date you viewed the website

    • C.

      The name of the web page

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    When creating a report using an online source, it is important to include all of the above information in the citation of the resource. Including the name of the author, the date you viewed the website, and the name of the web page helps provide proper credit to the original source and allows readers to easily locate the information.

    Rate this question:

  • 4. 

    Using a photo you found on the Internet in your project without properly citing the source is an example of:

    • A.

      Spam

    • B.

      Plagiarism

    • C.

      File-Sharing

    • D.

      Archiving

    Correct Answer
    B. Plagiarism
    Explanation
    Using a photo found on the Internet in a project without properly citing the source is considered plagiarism. Plagiarism involves presenting someone else's work or ideas as your own without giving credit to the original creator. In this case, not citing the source of the photo is a violation of intellectual property rights and unethical. It is important to always acknowledge and give credit to the original source when using someone else's work to avoid plagiarism.

    Rate this question:

  • 5. 

    Finding music online and downloading them without paying for them and giving them to your friends could result in  the following consequences of:

    • A.

      Losing your computer privileges

    • B.

      Being fined or sued for money

    • C.

      The musician does not get paid for their music

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    Downloading music online without paying for it and distributing it to others is a form of copyright infringement. This action violates the rights of the musician and deprives them of income from their music. As a consequence, one could lose their computer privileges as a disciplinary action. Additionally, the musician or their representatives may take legal action and sue the individual for monetary damages. Therefore, all of the mentioned consequences are possible outcomes of engaging in such activities.

    Rate this question:

  • 6. 

    What are you expected to do if you see a classmate using a computer website that you know is blocked by the school's firewall?

    • A.

      Ignore the student

    • B.

      Tell the class what he/she is doing

    • C.

      Privately tell the teacher about it

    • D.

      Ask the student to show you how they did it

    Correct Answer
    C. Privately tell the teacher about it
    Explanation
    If you see a classmate using a computer website that you know is blocked by the school's firewall, the best course of action would be to privately tell the teacher about it. This way, you are not directly confronting or embarrassing the classmate, but you are still taking the responsible step of reporting the issue to the appropriate authority. By informing the teacher privately, you allow them to address the situation and ensure that the classmate is following the school's rules and guidelines.

    Rate this question:

  • 7. 

    If you are in a chat room and the "friend" you are talking with asks you for your real name and phone number, what should you do?

    • A.

      Telling a parent or teacher

    • B.

      Tell them you will email it instead

    • C.

      Give it to them

    • D.

      Ask them for their information instead

    Correct Answer
    A. Telling a parent or teacher
    Explanation
    It is important to tell a parent or teacher if someone in a chat room asks for your real name and phone number. This is because sharing personal information online can be risky and potentially dangerous. Parents and teachers can provide guidance and support in handling such situations and help ensure your safety.

    Rate this question:

  • 8. 

    Which of these file extensions would be for an image?

    • A.

      .doc

    • B.

      .dbf

    • C.

      .ppt

    • D.

      .jpg

    Correct Answer
    D. .jpg
    Explanation
    The file extension .jpg is commonly used for image files. It stands for Joint Photographic Experts Group, which is a popular image compression format. This format allows for high-quality images with relatively small file sizes, making it ideal for sharing and displaying images on the web or in digital media. Therefore, .jpg is the correct file extension for an image file.

    Rate this question:

  • 9. 

    A portable storage device that uses a USB drive can be called many things.  Which is not considered one of them?

    • A.

      Flash drive

    • B.

      Thumb drive

    • C.

      Pen drive

    • D.

      Wire drive

    Correct Answer
    D. Wire drive
    Explanation
    A portable storage device that uses a USB drive is commonly referred to as a flash drive, thumb drive, or pen drive. However, "wire drive" is not a commonly used term to describe such devices.

    Rate this question:

  • 10. 

    Software is a program that was purchased and installed on a computer.  Which of these is considered software?

    • A.

      Computer, printer, scanner

    • B.

      Twitter, Delicious, Facebook

    • C.

      Word processing, spreadsheet, database

    • D.

      CD-ROM, thumb drive, DVD

    Correct Answer
    C. Word processing, spreadsheet, database
    Explanation
    The options given in the question can be categorized into hardware (computer, printer, scanner, CD-ROM, thumb drive, DVD) and software (Twitter, Delicious, Facebook, word processing, spreadsheet, database). Among these options, word processing, spreadsheet, and database are considered software because they are programs that can be installed and used on a computer to perform specific tasks.

    Rate this question:

  • 11. 

    When you go apply for a job, the military, or college; what might these supervisors check to learn more about the kind of person you are?

    • A.

      Facebook or Myspace pages

    • B.

      Blogs

    • C.

      Google searches

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    Supervisors may check Facebook or Myspace pages, blogs, and conduct Google searches to learn more about the kind of person you are when you apply for a job, the military, or college. These online platforms provide insights into an individual's behavior, interests, and social interactions, allowing supervisors to assess their character and suitability for the position or institution. By examining all of these sources, supervisors can gather a comprehensive understanding of the applicant's online presence and make informed decisions based on the information found.

    Rate this question:

  • 12. 

    What is an example of a Cybercrime?

    • A.

      Identity theft

    • B.

      Stealing bread from the store

    • C.

      Turning on high speed Internet

    • D.

      Using Mapquest to locate destinations

    Correct Answer
    A. Identity theft
    Explanation
    Identity theft is an example of a cybercrime because it involves the unauthorized use of someone's personal information, such as their name, social security number, or credit card details, in order to commit fraud or other illegal activities online. This can lead to financial loss, damage to reputation, and other serious consequences for the victim. Cybercriminals often use various techniques, such as phishing emails or hacking into databases, to obtain this information and carry out identity theft.

    Rate this question:

  • 13. 

    An example of an assistive technology tool is:

    • A.

      Using an online dictionary

    • B.

      Language conversion

    • C.

      Read aloud feature

    • D.

      All the above

    Correct Answer
    D. All the above
    Explanation
    The correct answer is "All the above" because using an online dictionary, language conversion, and the read aloud feature are all examples of assistive technology tools. An online dictionary helps individuals with word definitions and spellings, language conversion tools assist in translating text into different languages, and the read aloud feature helps individuals with reading difficulties by reading the text aloud. Therefore, all of these options fall under the category of assistive technology tools.

    Rate this question:

  • 14. 

    Creating a media rich presentation means it could include:

    • A.

      Video

    • B.

      Photos

    • C.

      Links to related sites

    • D.

      All the above

    Correct Answer
    D. All the above
    Explanation
    A media-rich presentation refers to a presentation that incorporates various types of media elements such as videos, photos, and links to related sites. By including all of the above options, the presentation becomes more engaging and visually appealing, allowing the presenter to effectively communicate their message and capture the audience's attention.

    Rate this question:

  • 15. 

    Leaving a digital footprint means:

    • A.

      Your fingerprints are left on the keys you pressed

    • B.

      Things you post online could come back to haunt you later

    • C.

      Using web 2.0 tools

    • D.

      You downloaded something without permission

    Correct Answer
    B. Things you post online could come back to haunt you later
    Explanation
    Leaving a digital footprint refers to the traces or records that are left behind when you engage in online activities. This can include the things you post on social media, comments you make on websites, or any other online interactions. These digital footprints can have long-lasting consequences as they can be easily accessed and potentially used against you in the future. Therefore, it is important to be mindful of what you post online as it can come back to haunt you later.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 13, 2010
    Quiz Created by
    Masterson
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.