Dms Comp App Module 6

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rosbo35
Community Contributor
Quizzes Created: 9 | Total Attempts: 6,730
Questions: 10 | Attempts: 329

Document Management System Quizzes & Trivia

This is a 10 question fill in the blank quiz over Module 6.

Questions and Answers
  • 1. 

    Be sure not to abuse company or school e-mail systems, as e-mail systems leave a ______________________.

    The correct answer is "digital paper trail". This phrase refers to the fact that electronic communication, such as emails, leaves a traceable record of the messages exchanged. This means that any inappropriate or abusive behavior conducted through email can be easily traced back to the sender, which serves as a deterrent against misuse of company or school email systems. The plural form "digital paper trails" is also correct, as it emphasizes that multiple instances of communication can be tracked and recorded.

    Rate this question:

  • 2. 

    Taking somebody else's ideas and passing them off as your own is called ______________________.

    Plagiarism refers to the act of using someone else's ideas, words, or work without giving them proper credit and presenting it as one's own. It is considered unethical and a form of intellectual theft. Plagiarism can occur in various forms, such as copying and pasting text from a source without citation, paraphrasing someone else's work without acknowledgment, or even using someone else's ideas or concepts without permission. It is important to always give credit to the original source and properly cite any borrowed information to avoid plagiarism.

    Rate this question:

  • 3. 

    A(n) ______________________ protects someone who creates an original work.

    Copyright is a legal protection that safeguards the rights of individuals who create original works such as books, music, films, and artworks. It grants the creator exclusive rights to reproduce, distribute, display, and perform their work, as well as the ability to control its derivative works. This protection prevents others from using or copying the work without the creator's permission, ensuring that they can benefit financially and maintain control over their creation.

    Rate this question:

  • 4. 

    Copyright protection is provided by the Copyright Act of 19__, a federal statute.

    The correct answer is 76,1976 because it refers to the year in which the Copyright Act was enacted. The Copyright Act of 1976 is a federal statute that provides protection for creative works.

    Rate this question:

  • 5. 

    A ______________________ is an aggressive or insulting letter.

    A flame is an aggressive or insulting letter. This term is commonly used in the context of online communication, particularly in forums or social media platforms, where individuals may engage in heated arguments or exchanges. A flame typically contains derogatory language, personal attacks, or inflammatory remarks aimed at provoking or offending the recipient. It is important to maintain respectful and constructive communication to avoid engaging in flames and promote healthy dialogue.

    Rate this question:

  • 6. 

    ______________________ refers to the right to reprint brief excerpts from copyrighted works without obtaining permission.

    Fair use is a legal doctrine that allows for the limited use of copyrighted material without permission from the copyright holder. It allows individuals to use brief excerpts from copyrighted works for purposes such as criticism, commentary, news reporting, teaching, or research. This exception is intended to balance the rights of copyright holders with the public's interest in accessing and using copyrighted material for certain purposes.

    Rate this question:

  • 7. 

    ______________________ is a crime in which someone takes your personal information and uses it to establish credit and charge items to you.

    Identity theft is a crime where an individual steals personal information of another person and utilizes it to create credit accounts and make unauthorized purchases. This involves acquiring sensitive data such as social security numbers, credit card details, or bank account information. The perpetrator then misuses this information to impersonate the victim, causing financial harm and potential damage to their reputation.

    Rate this question:

  • 8. 

    If you quote online sources in work, you must identify those soutces and give them proper ______________________.

    When quoting online sources in work, it is important to give them proper credit. This means acknowledging the original author or creator of the source and providing appropriate citation information. By doing so, it shows respect for the intellectual property of others and avoids plagiarism. Properly crediting online sources also allows readers to easily locate and verify the information being referenced.

    Rate this question:

  • 9. 

    Make sure your Caps Lock key is off to avoid ______________________.

    The correct answer is SHOUTS, SHOUT, shouting. This is because having the Caps Lock key on while typing will result in all the letters being capitalized, which is commonly interpreted as shouting in online communication. To avoid this, it is important to keep the Caps Lock key off while typing.

    Rate this question:

  • 10. 

    Today's identity thieves use the ______________________ to solicit the information from you.

    Today's identity thieves use the internet to solicit information from you. The internet has become a common platform for identity theft, as it allows thieves to easily access personal information through various means such as phishing emails, fake websites, and social media scams. They can trick individuals into providing sensitive information like passwords, credit card details, or social security numbers, which they can then use for fraudulent activities. Therefore, it is crucial to be cautious and protect personal information while using the internet.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 10, 2009
    Quiz Created by
Back to Top Back to top

Here's an interesting quiz for you.

We have other quizzes matching your interest.