Technology Issues1

25 Questions | Total Attempts: 438

SettingsSettingsSettings
Please wait...
Technology Issues1

This test will measure your knowledge of technology issues and terminology.


Questions and Answers
  • 1. 
    What is the goal of artificial intelligence software?
    • A. 

      Allows humans to act like computers

    • B. 

      Change something real into something make believe

    • C. 

      Process information without human intervention

    • D. 

      To make computers smarter

  • 2. 
    What is a virus that is activated at a certain time or date?
    • A. 

      Bomb

    • B. 

      Hacker

    • C. 

      Trojan horse

    • D. 

      Worm

  • 3. 
    Who is a person who breaks into your computer with bad intentions?
    • A. 

      Hacker

    • B. 

      Pest

    • C. 

      Pirate

    • D. 

      Technologies

  • 4. 
    What is one way to safeguard access to a computer?
    • A. 

      Copyright

    • B. 

      Domain

    • C. 

      Password

    • D. 

      Piracy

  • 5. 
    What is a program that tricks users into thinking they have a virus?
    • A. 

      Hoax

    • B. 

      Pirate

    • C. 

      Trojan horse

    • D. 

      Worm

  • 6. 
    What is software that is given to a user free of charge on a trial basis?
    • A. 

      Commercial software

    • B. 

      Freeware

    • C. 

      Public domain

    • D. 

      Shareware

  • 7. 
    Programs that allow a person to legally copy files and give them to anyone at no cost are called what?
    • A. 

      Freeware

    • B. 

      Pirated software

    • C. 

      Public domain

    • D. 

      Shareware

  • 8. 
    A program that is written to cause corruption of data on a computer is called what?
    • A. 

      Fraud

    • B. 

      Hacking

    • C. 

      Theft

    • D. 

      Virus

  • 9. 
    The standards of good moral conduct or principles are known as what?
    • A. 

      Ethics

    • B. 

      Felony

    • C. 

      Privacy

    • D. 

      Security

  • 10. 
    What is a virus that masquerades as a useful program?
    • A. 

      Bomb

    • B. 

      Pirex

    • C. 

      Trojan horse

    • D. 

      Worm

  • 11. 
    What criminal act is committed through the use of a computer?
    • A. 

      Computer crime

    • B. 

      Computer hacker

    • C. 

      Felony

    • D. 

      Misdemeanor

  • 12. 
    What is a computer virus that makes copies of itself resulting in the consumption of  system resources that slows down or actually halts tasks?
    • A. 

      Logic bomb

    • B. 

      Time bomb

    • C. 

      Trojan horse

    • D. 

      Worm

  • 13. 
    Delivery of education over the Internet is called:
    • A. 

      Distance learning

    • B. 

      Simulation

    • C. 

      Virtual Reality

    • D. 

      Web learning

  • 14. 
    If you would like to load copies of a commercial educational program on every computer in your school, you should do what?
    • A. 

      Buy a site license

    • B. 

      Charge a small fee for users

    • C. 

      Hide the licensed paperwork

    • D. 

      Load the program on each computer

  • 15. 
    What is the process of buying and selling products through the Internet?
    • A. 

      Digital cash

    • B. 

      Electronic commerce

    • C. 

      Electronic messaging

    • D. 

      Voice Recognition

  • 16. 
    What is a software program that can be used to retrieve documents from the World Wide Web and to display them in a readable format?
    • A. 

      Browser

    • B. 

      File retrieval

    • C. 

      Public domain

    • D. 

      Security Domain

  • 17. 
    A helmet would be required if participating in what type of application?
    • A. 

      Cloning

    • B. 

      Computer-based training

    • C. 

      Simulation

    • D. 

      Virtual reality

  • 18. 
    Using a computer as a tutor is called?
    • A. 

      Computer-based learning

    • B. 

      Distance learning

    • C. 

      Simulation

    • D. 

      Virtual reality

  • 19. 
    Changing the DNA in a living organism is known as:
    • A. 

      Artificial intelligence

    • B. 

      Genetic engineering

    • C. 

      Globalization

    • D. 

      Simulation

  • 20. 
    When a virus is discovered on a computer, what should be done?
    • A. 

      Buy a new computer

    • B. 

      Install another virus to destroy it

    • C. 

      Remove and destroy all data files

    • D. 

      Run a virus disinfectant program

  • 21. 
    What virus is triggered by the appearance or disappearance of specified data?
    • A. 

      Logic bomb

    • B. 

      Time bomb

    • C. 

      Trojan horse

    • D. 

      Worm

  • 22. 
    How do software companies prevent users from making multiple copies of their software?
    • A. 

      Charge higher prices

    • B. 

      Charge lower prices

    • C. 

      Lock the software

    • D. 

      Patent the software

  • 23. 
    John buys a single-user license of Microsoft Office for his home computer.  His friend asks to borrow the CD so that he can load it on his computer.  This is an example of what?
    • A. 

      Human virus

    • B. 

      Lack of respect

    • C. 

      Software piracy

    • D. 

      Wise use of resources

  • 24. 
    What system allows users to pay online by transmitting a number from one computer to another?
    • A. 

      Digital cash

    • B. 

      Electronic commerce

    • C. 

      Electronic messaging

    • D. 

      Voice Recognition

  • 25. 
    What type of activity uses the Internet for investigation and problem solving?
    • A. 

      WebQuest

    • B. 

      Web page

    • C. 

      Word wrap

    • D. 

      WYSIWYG