1.
What should you do if you get an email that makes you feel weird?
Correct Answer
C. Tell a grown-up so they can contact your Internet service provider
Explanation
If you receive an email that makes you feel weird, it is important to tell a grown-up so they can contact your Internet service provider. This is because the Internet service provider can investigate the email and take appropriate action if it is found to be harmful, spam, or a potential threat. It is crucial to involve a responsible adult who can handle the situation and ensure your safety online. Deleting the email may not address the issue, and forwarding it to friends or responding with a mean email can escalate the situation or potentially put others at risk.
2.
Who should know your password(s)?
Correct Answer
A. You, and possibly your parents.
Explanation
The correct answer is "You, and possibly your parents." This is because passwords are personal and should be kept confidential. You should be the only one who knows your password, and it is possible that your parents may also need to know it for certain situations where their assistance is required. Sharing passwords with friends or classmates can compromise the security of your accounts and lead to unauthorized access or misuse of your personal information.
3.
What can happen if you use rude or offensive language online?
Correct Answer
D. Both A and B.
Explanation
Using rude or offensive language online can have consequences such as being suspended from school and getting kicked offline by your service provider. This behavior is generally not tolerated and can result in disciplinary actions or even legal consequences. It is important to maintain respectful and appropriate communication online to create a positive and safe digital environment.
4.
Determine which of the actions described below is practicing internet safety.
Correct Answer
D. Both B and C.
Explanation
The correct answer is both B and C because using the computer in a common area of the house where grown-ups usually are helps ensure that online activities are supervised and monitored. Asking a grown-up before meeting an online friend is also a practice of internet safety as it allows for guidance and potential precautions to be taken.
5.
Which of these actions are good to do in the computer lab?
Correct Answer
C. Never eat or drink any thing.
Explanation
The correct answer is "Never eat or drink anything." This is because eating or drinking in the computer lab can lead to spills and damage to the equipment. It is important to keep the computer lab clean and free from any potential hazards that could harm the computers or other users.
6.
Upon entering the computer lab, you __________________.
Correct Answer
A. Take your assigned seat.
Explanation
Upon entering the computer lab, it is expected that you would take your assigned seat. This suggests that there is a specific seating arrangement in place, and it is important for individuals to follow it in order to maintain order and organization in the lab. Taking any seat you want or running around the lab would disrupt the functioning of the lab and cause chaos. Therefore, the correct answer is to take your assigned seat.
7.
Regarding plug-ins (mouse or keyboard) and cables, I should _______________________.
Correct Answer
B. Not touch any plug-ins or cables.
Explanation
The correct answer is "Not touch any plug-ins or cables." This answer suggests that when it comes to plug-ins (mouse or keyboard) and cables, the best course of action is to avoid touching them. This is likely because touching or tampering with plug-ins and cables can lead to disconnections, malfunctions, or even damage to the devices or equipment they are connected to. It is important to handle plug-ins and cables with care and avoid unnecessary interference to ensure proper functioning.
8.
Printing in the lab is ____________________.
Correct Answer
B. Allowed only with the teacher's permission.
Explanation
Printing in the lab is allowed only with the teacher's permission. This means that students cannot print without obtaining the teacher's approval beforehand. The teacher has the authority to grant or deny permission for printing in the lab, indicating that it is not a freely available resource for students. The requirement for permission suggests that there may be limitations or guidelines in place for printing in order to ensure responsible use of the lab's resources.
9.
When leaving the computer lab, I must ________________.
Correct Answer
D. Both A and C.
Explanation
When leaving the computer lab, it is important to push in your chair to ensure that the area is neat and tidy for the next person to use. Additionally, logging out is necessary to protect your personal information and prevent unauthorized access to your account. Therefore, the correct answer is both A and C.
10.
Input/Output
Directions: In the spaces provided, write "input" or "output" to indicate whether or not the device is an output or an input device. Example: Digital Camera ________input__________________________
Mouse __________________________________________
Correct Answer
input
Explanation
The given correct answer is "input" because a mouse is an input device. It allows the user to interact with the computer by moving the cursor on the screen and clicking on various elements. The mouse sends signals to the computer, which then processes the input and performs the corresponding actions. Therefore, the mouse is classified as an input device.
11.
Monitor ______________________________________
Correct Answer
output
Explanation
The word "output" completes the sentence in a logical manner. A monitor is a device that displays information or data, so it makes sense that the missing word would be related to the display or presentation of information. "Output" is the correct term to describe the information that is displayed on a monitor.
12.
Keyboard ______________________________________
Correct Answer
input
Explanation
The word "keyboard" is a noun, and it is related to the action of inputting information into a device. The word "input" is a noun that directly relates to the act of providing information or data to a device or system. Therefore, "input" is the correct answer as it is the most appropriate and relevant word to complete the given phrase.
13.
Scanner _________________________________________
Correct Answer
input
Explanation
The correct answer is "input" because the question is asking for the missing word or phrase that would complete the given statement. In this case, the word "input" is necessary to complete the statement "Scanner _________" as it is the action or process of entering data or information into the scanner.
14.
Printer __________________________________________
Correct Answer
output
15.
What is the Telecommunications Policy of Baltimore County Public Schools?
Correct Answer
D. Both B and C.
Explanation
The correct answer is "Both B and C." This is because the Telecommunications Policy of Baltimore County Public Schools contains the do's and don'ts of using all telecommunications at all BCPS schools, as well as stating that any personal use of technology is strictly prohibited.
16.
Which of the following violates the Telecommunications Policy of BCPS:
Correct Answer
D. All of the above.
Explanation
All of the given options violate the Telecommunications Policy of BCPS. Downloading software or programs onto the computer without authorization, bypassing the BCPS filtering system, and installing unauthorized software on the computers are all actions that go against the policy.
17.
Telecommunications can be defined as:
Correct Answer
D. Both A and B.
Explanation
The correct answer is "Both A and B" because telecommunications involves both communicating at a distance and communication over a series of electronic networks. It encompasses various forms of communication, including telephone calls, video conferencing, internet communication, and more.
18.
Your friend forgot their username and password. You are allowed to give them yours to use, just for the day.
Correct Answer
B. False
Explanation
It is not advisable to give your username and password to anyone, even if it is just for a day. Sharing login credentials can compromise the security of your account and put your personal information at risk. It is important to keep your login details confidential and encourage your friend to follow proper procedures for retrieving their own username and password.
19.
Violating the Telecommunications Policy of BCPS is which of the following offenses:
Correct Answer
B. Category II -- Suspension
Explanation
Violating the Telecommunications Policy of BCPS is considered a Category II offense, which results in suspension. This means that if someone breaches the policy, they will face a suspension as a consequence.
20.
Name that part :
Correct Answer
monitor
moniter
21.
Name that part:
Correct Answer
mouse
Explanation
The given answer "mouse" correctly identifies the name of the part. A mouse is a common input device used to control the cursor on a computer screen. It is typically held in the hand and moved across a surface, allowing the user to navigate and interact with graphical user interfaces.
22.
Name that part:
Correct Answer
scanner
scaner
Explanation
The correct answer is "scanner". It appears that the word "scaner" is a misspelling of the correct term. The correct term is "scanner", which refers to a device used to capture images or documents and convert them into digital format.
23.
Name that part:
Correct Answer
speakers
speaker
speeker
speekers
spekers
Explanation
The given options are all variations of the word "speaker." The correct answer is "speakers" as it is the plural form of the word. The other options are misspellings or incorrect forms of the word.
24.
Name that part:
Correct Answer
keyboard
keybord
Explanation
The answer to this question is "keyboard, keybord" because both options are variations of the same word. "Keyboard" is the correct spelling, while "keybord" is a common misspelling. Therefore, both options refer to the same part, which is the input device used to type on a computer or typewriter.