Technology Issues1

25 Questions | Attempts: 443
Share

SettingsSettingsSettings
Technology Issues1 - Quiz

This test will measure your knowledge of technology issues and terminology.


Questions and Answers
  • 1. 

    What is the goal of artificial intelligence software?

    • A.

      Allows humans to act like computers

    • B.

      Change something real into something make believe

    • C.

      Process information without human intervention

    • D.

      To make computers smarter

    Correct Answer
    C. Process information without human intervention
  • 2. 

    What is a virus that is activated at a certain time or date?

    • A.

      Bomb

    • B.

      Hacker

    • C.

      Trojan horse

    • D.

      Worm

    Correct Answer
    A. Bomb
  • 3. 

    Who is a person who breaks into your computer with bad intentions?

    • A.

      Hacker

    • B.

      Pest

    • C.

      Pirate

    • D.

      Technologies

    Correct Answer
    A. Hacker
  • 4. 

    What is one way to safeguard access to a computer?

    • A.

      Copyright

    • B.

      Domain

    • C.

      Password

    • D.

      Piracy

    Correct Answer
    C. Password
  • 5. 

    What is a program that tricks users into thinking they have a virus?

    • A.

      Hoax

    • B.

      Pirate

    • C.

      Trojan horse

    • D.

      Worm

    Correct Answer
    A. Hoax
  • 6. 

    What is software that is given to a user free of charge on a trial basis?

    • A.

      Commercial software

    • B.

      Freeware

    • C.

      Public domain

    • D.

      Shareware

    Correct Answer
    D. Shareware
  • 7. 

    Programs that allow a person to legally copy files and give them to anyone at no cost are called what?

    • A.

      Freeware

    • B.

      Pirated software

    • C.

      Public domain

    • D.

      Shareware

    Correct Answer
    C. Public domain
  • 8. 

    A program that is written to cause corruption of data on a computer is called what?

    • A.

      Fraud

    • B.

      Hacking

    • C.

      Theft

    • D.

      Virus

    Correct Answer
    D. Virus
  • 9. 

    The standards of good moral conduct or principles are known as what?

    • A.

      Ethics

    • B.

      Felony

    • C.

      Privacy

    • D.

      Security

    Correct Answer
    A. Ethics
  • 10. 

    What is a virus that masquerades as a useful program?

    • A.

      Bomb

    • B.

      Pirex

    • C.

      Trojan horse

    • D.

      Worm

    Correct Answer
    C. Trojan horse
  • 11. 

    What criminal act is committed through the use of a computer?

    • A.

      Computer crime

    • B.

      Computer hacker

    • C.

      Felony

    • D.

      Misdemeanor

    Correct Answer
    A. Computer crime
  • 12. 

    What is a computer virus that makes copies of itself resulting in the consumption of  system resources that slows down or actually halts tasks?

    • A.

      Logic bomb

    • B.

      Time bomb

    • C.

      Trojan horse

    • D.

      Worm

    Correct Answer
    D. Worm
  • 13. 

    Delivery of education over the Internet is called:

    • A.

      Distance learning

    • B.

      Simulation

    • C.

      Virtual Reality

    • D.

      Web learning

    Correct Answer
    A. Distance learning
  • 14. 

    If you would like to load copies of a commercial educational program on every computer in your school, you should do what?

    • A.

      Buy a site license

    • B.

      Charge a small fee for users

    • C.

      Hide the licensed paperwork

    • D.

      Load the program on each computer

    Correct Answer
    A. Buy a site license
  • 15. 

    What is the process of buying and selling products through the Internet?

    • A.

      Digital cash

    • B.

      Electronic commerce

    • C.

      Electronic messaging

    • D.

      Voice Recognition

    Correct Answer
    B. Electronic commerce
  • 16. 

    What is a software program that can be used to retrieve documents from the World Wide Web and to display them in a readable format?

    • A.

      Browser

    • B.

      File retrieval

    • C.

      Public domain

    • D.

      Security Domain

    Correct Answer
    A. Browser
  • 17. 

    A helmet would be required if participating in what type of application?

    • A.

      Cloning

    • B.

      Computer-based training

    • C.

      Simulation

    • D.

      Virtual reality

    Correct Answer
    D. Virtual reality
  • 18. 

    Using a computer as a tutor is called?

    • A.

      Computer-based learning

    • B.

      Distance learning

    • C.

      Simulation

    • D.

      Virtual reality

    Correct Answer
    A. Computer-based learning
  • 19. 

    Changing the DNA in a living organism is known as:

    • A.

      Artificial intelligence

    • B.

      Genetic engineering

    • C.

      Globalization

    • D.

      Simulation

    Correct Answer
    B. Genetic engineering
  • 20. 

    When a virus is discovered on a computer, what should be done?

    • A.

      Buy a new computer

    • B.

      Install another virus to destroy it

    • C.

      Remove and destroy all data files

    • D.

      Run a virus disinfectant program

    Correct Answer
    D. Run a virus disinfectant program
  • 21. 

    What virus is triggered by the appearance or disappearance of specified data?

    • A.

      Logic bomb

    • B.

      Time bomb

    • C.

      Trojan horse

    • D.

      Worm

    Correct Answer
    A. Logic bomb
  • 22. 

    How do software companies prevent users from making multiple copies of their software?

    • A.

      Charge higher prices

    • B.

      Charge lower prices

    • C.

      Lock the software

    • D.

      Patent the software

    Correct Answer
    C. Lock the software
  • 23. 

    John buys a single-user license of Microsoft Office for his home computer.  His friend asks to borrow the CD so that he can load it on his computer.  This is an example of what?

    • A.

      Human virus

    • B.

      Lack of respect

    • C.

      Software piracy

    • D.

      Wise use of resources

    Correct Answer
    C. Software piracy
  • 24. 

    What system allows users to pay online by transmitting a number from one computer to another?

    • A.

      Digital cash

    • B.

      Electronic commerce

    • C.

      Electronic messaging

    • D.

      Voice Recognition

    Correct Answer
    A. Digital cash
  • 25. 

    What type of activity uses the Internet for investigation and problem solving?

    • A.

      WebQuest

    • B.

      Web page

    • C.

      Word wrap

    • D.

      WYSIWYG

    Correct Answer
    A. WebQuest

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • May 22, 2019
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 02, 2008
    Quiz Created by
    Gthomp
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.