1.
When evaluating a website's content, which is the most important issue?
Correct Answer
D. Finding who made the site and where the content comes from
Explanation
When evaluating a website's content, finding who made the site and where the content comes from is the most important issue. This is because knowing the source of the content helps determine its credibility and reliability. It allows the user to assess the expertise and authority of the author or organization behind the website, which is crucial in determining the accuracy and trustworthiness of the information provided. Additionally, understanding the origin of the content helps in identifying any potential biases or conflicts of interest that may influence the information presented on the website.
2.
Look at this URL, what does it tell you about the site?
http://www.ncstate.edu
Correct Answer
A. It is associated with a higher educational institution
Explanation
The URL "http://www.ncstate.edu" indicates that the site is associated with a higher educational institution. The ".edu" domain is typically used by educational institutions in the United States, and "ncstate" in the URL suggests that it may be associated with North Carolina State University.
3.
When creating a report you use an online source. What needs to be included in the citation of this resource?
Correct Answer
D. All of the above
Explanation
When creating a report using an online source, it is important to include all of the above information in the citation of the resource. Including the name of the author, the date you viewed the website, and the name of the web page helps provide proper credit to the original source and allows readers to easily locate the information.
4.
Using a photo you found on the Internet in your project without properly citing the source is an example of:
Correct Answer
B. Plagiarism
Explanation
Using a photo found on the Internet in a project without properly citing the source is considered plagiarism. Plagiarism involves presenting someone else's work or ideas as your own without giving credit to the original creator. In this case, not citing the source of the photo is a violation of intellectual property rights and unethical. It is important to always acknowledge and give credit to the original source when using someone else's work to avoid plagiarism.
5.
Finding music online and downloading them without paying for them and giving them to your friends could result in the following consequences of:
Correct Answer
D. All of the above
Explanation
Downloading music online without paying for it and distributing it to others is a form of copyright infringement. This action violates the rights of the musician and deprives them of income from their music. As a consequence, one could lose their computer privileges as a disciplinary action. Additionally, the musician or their representatives may take legal action and sue the individual for monetary damages. Therefore, all of the mentioned consequences are possible outcomes of engaging in such activities.
6.
What are you expected to do if you see a classmate using a computer website that you know is blocked by the school's firewall?
Correct Answer
C. Privately tell the teacher about it
Explanation
If you see a classmate using a computer website that you know is blocked by the school's firewall, the best course of action would be to privately tell the teacher about it. This way, you are not directly confronting or embarrassing the classmate, but you are still taking the responsible step of reporting the issue to the appropriate authority. By informing the teacher privately, you allow them to address the situation and ensure that the classmate is following the school's rules and guidelines.
7.
If you are in a chat room and the "friend" you are talking with asks you for your real name and phone number, what should you do?
Correct Answer
A. Telling a parent or teacher
Explanation
It is important to tell a parent or teacher if someone in a chat room asks for your real name and phone number. This is because sharing personal information online can be risky and potentially dangerous. Parents and teachers can provide guidance and support in handling such situations and help ensure your safety.
8.
Which of these file extensions would be for an image?
Correct Answer
D. .jpg
Explanation
The file extension .jpg is commonly used for image files. It stands for Joint Photographic Experts Group, which is a popular image compression format. This format allows for high-quality images with relatively small file sizes, making it ideal for sharing and displaying images on the web or in digital media. Therefore, .jpg is the correct file extension for an image file.
9.
A portable storage device that uses a USB drive can be called many things. Which is not considered one of them?
Correct Answer
D. Wire drive
Explanation
A portable storage device that uses a USB drive is commonly referred to as a flash drive, thumb drive, or pen drive. However, "wire drive" is not a commonly used term to describe such devices.
10.
Software is a program that was purchased and installed on a computer. Which of these is considered software?
Correct Answer
C. Word processing, spreadsheet, database
Explanation
The options given in the question can be categorized into hardware (computer, printer, scanner, CD-ROM, thumb drive, DVD) and software (Twitter, Delicious, Facebook, word processing, spreadsheet, database). Among these options, word processing, spreadsheet, and database are considered software because they are programs that can be installed and used on a computer to perform specific tasks.
11.
When you go apply for a job, the military, or college; what might these supervisors check to learn more about the kind of person you are?
Correct Answer
D. All of the above
Explanation
Supervisors may check Facebook or Myspace pages, blogs, and conduct Google searches to learn more about the kind of person you are when you apply for a job, the military, or college. These online platforms provide insights into an individual's behavior, interests, and social interactions, allowing supervisors to assess their character and suitability for the position or institution. By examining all of these sources, supervisors can gather a comprehensive understanding of the applicant's online presence and make informed decisions based on the information found.
12.
What is an example of a Cybercrime?
Correct Answer
A. Identity theft
Explanation
Identity theft is an example of a cybercrime because it involves the unauthorized use of someone's personal information, such as their name, social security number, or credit card details, in order to commit fraud or other illegal activities online. This can lead to financial loss, damage to reputation, and other serious consequences for the victim. Cybercriminals often use various techniques, such as phishing emails or hacking into databases, to obtain this information and carry out identity theft.
13.
An example of an assistive technology tool is:
Correct Answer
D. All the above
Explanation
The correct answer is "All the above" because using an online dictionary, language conversion, and the read aloud feature are all examples of assistive technology tools. An online dictionary helps individuals with word definitions and spellings, language conversion tools assist in translating text into different languages, and the read aloud feature helps individuals with reading difficulties by reading the text aloud. Therefore, all of these options fall under the category of assistive technology tools.
14.
Creating a media rich presentation means it could include:
Correct Answer
D. All the above
Explanation
A media-rich presentation refers to a presentation that incorporates various types of media elements such as videos, photos, and links to related sites. By including all of the above options, the presentation becomes more engaging and visually appealing, allowing the presenter to effectively communicate their message and capture the audience's attention.
15.
Leaving a digital footprint means:
Correct Answer
B. Things you post online could come back to haunt you later
Explanation
Leaving a digital footprint refers to the traces or records that are left behind when you engage in online activities. This can include the things you post on social media, comments you make on websites, or any other online interactions. These digital footprints can have long-lasting consequences as they can be easily accessed and potentially used against you in the future. Therefore, it is important to be mindful of what you post online as it can come back to haunt you later.