Quizzes
Search
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
›
Science
›
Technology
Technology Issues1
25 Questions
|
By Gthomp | Updated: May 22, 2019
| Attempts: 443
Share
Quiz
Flashcard
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 25
0 %
0/100
Score
0/100
1.
Who is a person who breaks into your computer with bad intentions?
Hacker
Pest
Pirate
Technologies
Submit
Start Quiz
About This Quiz
This test will measure your knowledge of technology issues and terminology.
2.
What's your name?
We’ll put your name on your report, certificate, and leaderboard.
2.
What is a program that tricks users into thinking they have a virus?
Hoax
Pirate
Trojan horse
Worm
Submit
3.
What is one way to safeguard access to a computer?
Copyright
Domain
Password
Piracy
Submit
4.
The standards of good moral conduct or principles are known as what?
Ethics
Felony
Privacy
Security
Submit
5.
When a virus is discovered on a computer, what should be done?
Buy a new computer
Install another virus to destroy it
Remove and destroy all data files
Run a virus disinfectant program
Submit
6.
Using a computer as a tutor is called?
Computer-based learning
Distance learning
Simulation
Virtual reality
Submit
7.
A program that is written to cause corruption of data on a computer is called what?
Fraud
Hacking
Theft
Virus
Submit
8.
Changing the DNA in a living organism is known as:
Artificial intelligence
Genetic engineering
Globalization
Simulation
Submit
9.
How do software companies prevent users from making multiple copies of their software?
Charge higher prices
Charge lower prices
Lock the software
Patent the software
Submit
10.
What type of activity uses the Internet for investigation and problem solving?
WebQuest
Web page
Word wrap
WYSIWYG
Submit
11.
What is a virus that is activated at a certain time or date?
Bomb
Hacker
Trojan horse
Worm
Submit
12.
John buys a single-user license of Microsoft Office for his home computer. His friend asks to borrow the CD so that he can load it on his computer. This is an example of what?
Human virus
Lack of respect
Software piracy
Wise use of resources
Submit
13.
What is the goal of artificial intelligence software?
Allows humans to act like computers
Change something real into something make believe
Process information without human intervention
To make computers smarter
Submit
14.
What criminal act is committed through the use of a computer?
Computer crime
Computer hacker
Felony
Misdemeanor
Submit
15.
What virus is triggered by the appearance or disappearance of specified data?
Logic bomb
Time bomb
Trojan horse
Worm
Submit
16.
What system allows users to pay online by transmitting a number from one computer to another?
Digital cash
Electronic commerce
Electronic messaging
Voice Recognition
Submit
17.
What is a computer virus that makes copies of itself resulting in the consumption of system resources that slows down or actually halts tasks?
Logic bomb
Time bomb
Trojan horse
Worm
Submit
18.
What is a virus that masquerades as a useful program?
Bomb
Pirex
Trojan horse
Worm
Submit
19.
What is the process of buying and selling products through the Internet?
Digital cash
Electronic commerce
Electronic messaging
Voice Recognition
Submit
20.
What is a software program that can be used to retrieve documents from the World Wide Web and to display them in a readable format?
Browser
File retrieval
Public domain
Security Domain
Submit
21.
Programs that allow a person to legally copy files and give them to anyone at no cost are called what?
Freeware
Pirated software
Public domain
Shareware
Submit
22.
What is software that is given to a user free of charge on a trial basis?
Commercial software
Freeware
Public domain
Shareware
Submit
23.
If you would like to load copies of a commercial educational program on every computer in your school, you should do what?
Buy a site license
Charge a small fee for users
Hide the licensed paperwork
Load the program on each computer
Submit
24.
Delivery of education over the Internet is called:
Distance learning
Simulation
Virtual Reality
Web learning
Submit
25.
A helmet would be required if participating in what type of application?
Cloning
Computer-based training
Simulation
Virtual reality
Submit
View My Results
Related Quizzes
Electronic Communication Quiz Questions And Answers
Electronic Communication Quiz Questions And Answers
Which Garmin Watch Is Right For Me?
Which Garmin Watch Is Right For Me?
8th Grade Technology Assessment
8th Grade Technology Assessment
Nervous System Exam Quiz - 1
Nervous System Exam Quiz - 1
6th Grade Technology Test
6th Grade Technology Test
Impact Of Technology On Employment Quiz
Impact Of Technology On Employment Quiz
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (25)
Unanswered (
)
Answered (
)
Who is a person who breaks into your computer with bad intentions?
What is a program that tricks users into thinking they have a virus?
What is one way to safeguard access to a computer?
The standards of good moral conduct or principles are known as what?
When a virus is discovered on a computer, what should be done?
Using a computer as a tutor is called?
A program that is written to cause corruption of data on a computer is...
Changing the DNA in a living organism is known as:
How do software companies prevent users from making multiple copies of...
What type of activity uses the Internet for investigation and problem...
What is a virus that is activated at a certain time or date?
John buys a single-user license of Microsoft Office for his home...
What is the goal of artificial intelligence software?
What criminal act is committed through the use of a computer?
What virus is triggered by the appearance or disappearance of...
What system allows users to pay online by transmitting a number from...
What is a computer virus that makes copies of itself resulting in the...
What is a virus that masquerades as a useful program?
What is the process of buying and selling products through the...
What is a software program that can be used to retrieve documents from...
Programs that allow a person to legally copy files and give them to...
What is software that is given to a user free of charge on a trial...
If you would like to load copies of a commercial educational program...
Delivery of education over the Internet is called:
A helmet would be required if participating in what type of...
X
OK
X
OK
Cancel
X
OK
Cancel
Back to top
Back to top
Advertisement