1.
-
The best way to maintain your personal safety on the web is by only using your own assigned username/password and keeping passwords, addresses and phone numbers private.
Correct Answer
A. True
Explanation
The statement is true because using your own assigned username/password ensures that you are the only one accessing your accounts, reducing the risk of unauthorized access. Keeping passwords, addresses, and phone numbers private is important to prevent identity theft and protect personal information from being misused by others. By following these practices, individuals can maintain their personal safety and minimize the chances of falling victim to online scams or cyberattacks.
2.
-
The Tech Director or other administrator has the right to monitor and access all computer files and websites students visit without giving the students prior authorization.
Correct Answer
A. True
Explanation
The statement suggests that the Tech Director or other administrator has the authority to monitor and access all computer files and websites that students visit, without needing the students' prior authorization. This implies that the administrator has the power to supervise and review students' online activities without their knowledge or consent.
3.
-
LCA does not allow bullying, harassing, or intimidating someone online or sending offensive mail, documents or images via the web.
Correct Answer
A. True
Explanation
The given statement is true. LCA, which stands for Legal and Criminological Aspects, does not allow any form of bullying, harassment, or intimidation online. It also prohibits sending offensive mail, documents, or images through the internet. This is to ensure a safe and respectful online environment for all users.
4.
-
This passage is plagiarized: “The most famous of the friends Jack (C.S. Lewis) made at Oxford was John Ronald Ruel Tolkien, future author of the fantasy epic The Lord of the Rings.”
Correct Answer
A. True
Explanation
The given passage is plagiarized because it directly copies the original text without giving proper credit to the original author. Plagiarism is the act of using someone else's work or ideas without proper acknowledgment, and in this case, the sentence is taken from another source without any quotation marks or citation.
5.
-
Downloading software, viruses or altering the BIOS settings, software shortcuts, or screen resolution on the LCA network is not allowed, with the exception of participants in the 1-1 program who are allowed to download software.
Correct Answer
A. True
Explanation
The statement is true because it states that downloading software, viruses, or altering certain settings on the LCA network is not allowed. However, it also mentions an exception for participants in the 1-1 program who are allowed to download software. This exception implies that downloading software is generally not allowed for other users on the LCA network.
6.
Playing “academic” type games on the computer is allowed.
Correct Answer
B. False
Explanation
Playing "academic" type games on the computer is not allowed.
7.
-
File sharing or sharing music is allowed on the LCA network.
Correct Answer
B. False
Explanation
Sharing music or file sharing is not allowed on the LCA network.
8.
-
Texting your friend in class for clarification on a point in the lesson is allowed.
Correct Answer
B. False
Explanation
Texting your friend in class for clarification on a point in the lesson is not allowed. This is because it can be distracting to both you and your classmates, and it disrupts the flow of the lesson. It is important to pay attention and engage in the class discussion instead of relying on texting for clarification.
9.
-
Calling home for a ride at the end of the school day is allowed.
Correct Answer
A. True
Explanation
The statement indicates that calling home for a ride at the end of the school day is allowed. This means that students have permission to contact their family members or guardians to arrange for transportation after school.
10.
-
If I use a computer inappropriately or dishonestly there will be consequences administered by a teacher or administrator.
Correct Answer
A. True
Explanation
If someone uses a computer inappropriately or dishonestly, such as accessing unauthorized websites or cheating on assignments, it is likely that there will be consequences administered by a teacher or administrator. These consequences may include disciplinary action, loss of computer privileges, or academic penalties. Therefore, the statement is true.
11.
-
Is this passage plagiarized?
“Johnson’s 3 P’s of Technology Ethics:
1. Privacy - I will protect my privacy and respect the privacy of others.
2. Property - I will protect my property and respect the property of others.
3. aPpropriate Use - I will use technology in constructive ways and in ways which do not break the rules of my family, religion, school, or government.” (Johnson, D.A., 1998)
Correct Answer
B. False
Explanation
The given passage is not plagiarized. It is a direct quote from Johnson's 3 P's of Technology Ethics, which was written by D.A. Johnson in 1998. The passage is properly cited with the author's name and the year of publication.
12.
-
Facebook use is only allowed when students in a work group share presentation work, all other Facebook use is prohibited.
Correct Answer
A. True
Explanation
The given statement states that Facebook use is only allowed when students in a work group share presentation work, and all other Facebook use is prohibited. This means that students are only allowed to use Facebook for the specific purpose of sharing presentation work within their work group. Any other use of Facebook is not permitted. Therefore, the correct answer is True, indicating that the statement is accurate.