Standards Of Conduct For The Use Of Lca Computers And Networks 2012

12 Questions | Total Attempts: 70

SettingsSettingsSettings
Please wait...
Standards Of Conduct For The Use Of Lca Computers And Networks 2012

Test your knowledge of the LCA standards of conduct when using LCA computers and networks


Questions and Answers
  • 1. 
    1. The best way to maintain your personal safety on the web is by only using your own assigned username/password and keeping passwords, addresses and phone numbers private.
    • A. 

      True

    • B. 

      False

  • 2. 
    1. The Tech Director or other administrator has the right to monitor and access all computer files and websites students visit without giving the students prior authorization.
    • A. 

      True

    • B. 

      False

  • 3. 
    1. LCA does not allow bullying, harassing, or intimidating someone online or sending offensive mail, documents or images via the web.
    • A. 

      True

    • B. 

      False

  • 4. 
    1. This passage is plagiarized: “The most famous of the friends Jack (C.S. Lewis) made at Oxford was John Ronald Ruel Tolkien, future author of the fantasy epic The Lord of the Rings.
    • A. 

      True

    • B. 

      False

  • 5. 
    1. Downloading software, viruses or altering the BIOS settings, software shortcuts, or screen resolution on the LCA network is not allowed, with the exception of participants in the 1-1 program who are allowed to download software.
    • A. 

      True

    • B. 

      False

  • 6. 
    Playing “academic” type games on the computer is allowed.
    • A. 

      True

    • B. 

      False

  • 7. 
    1. File sharing or sharing music is allowed on the LCA network.
    • A. 

      True

    • B. 

      False

  • 8. 
    1. Texting your friend in class for clarification on a point in the lesson is allowed.
    • A. 

      True

    • B. 

      False

  • 9. 
    1. Calling home for a ride at the end of the school day is allowed.
    • A. 

      True

    • B. 

      False

  • 10. 
    1. If I use a computer inappropriately or dishonestly there will be consequences administered by a teacher or administrator.
    • A. 

      True

    • B. 

      False

  • 11. 
    1. Is this passage plagiarized?
      “Johnson’s 3 P’s of Technology Ethics: 1.    Privacy - I will protect my privacy and respect the privacy of others. 2.    Property - I will protect my property and respect the property of others. 3.    aPpropriate Use - I will use technology in constructive ways and in ways which do not break the rules of my family, religion, school, or government.” (Johnson, D.A., 1998)
    • A. 

      True

    • B. 

      False

  • 12. 
    1. Facebook use is only allowed when students in a work group share presentation work, all other Facebook use is prohibited.
    • A. 

      True

    • B. 

      False

Back to Top Back to top