Test 2: Email, Blogs, Searches, Applications, Ethics, Laws

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Bfigueroa
B
Bfigueroa
Community Contributor
Quizzes Created: 1 | Total Attempts: 99
| Attempts: 99 | Questions: 27
Please wait...
Question 1 / 27
0 %
0/100
Score 0/100
1. I can burn copies of computer software discs for others.

Explanation

Burning copies of computer software discs for others is considered illegal because it violates copyright laws. Copying and distributing software without the proper authorization from the copyright holder is a form of piracy and is against the law. It is important to respect intellectual property rights and obtain legal copies of software to support the developers and protect their work.

Submit
Please wait...
About This Quiz
Test 2: Email, Blogs, Searches, Applications, Ethics, Laws - Quiz

This quiz will test the knowledge of Middle School students in email, blogging, internet safety, and Microsoft Office 2007 applications.

Personalize your quiz and earn a certificate with your name on it!
2. Illegally downloading and illegal file-sharing of software, music, and movies can result in:

Explanation

Illegally downloading and file-sharing software, music, and movies can result in the loss of your hard drive and all files due to viruses attached to these illegal downloads. Viruses can be hidden within the files you download, and when you open or execute them, they can infect your computer and cause damage to your hard drive and files. This is a common risk associated with engaging in illegal downloading and file-sharing activities.

Submit
3. If you have a research project about UTSA and want to know the number of students who attend which is the best search option?

Explanation

Enrollment at UTSA is the best search option to find the number of students who attend the university. This search term specifically focuses on the enrollment aspect, which directly relates to the number of students. UTSA and UTSA Texas may provide general information about the university but may not specifically mention the enrollment numbers. Therefore, "Enrollment at UTSA" is the most suitable search option to obtain the desired information.

Submit
4. Which application would you use to write a story about your dream car?

Explanation

A word processing application is the most suitable choice for writing a story about your dream car. Word processing software provides a range of tools and features specifically designed for creating and editing text-based documents. It allows users to easily format text, add images, and organize content. In contrast, a spreadsheet application is primarily used for organizing and analyzing numerical data, while a database application is used for storing and managing large amounts of structured information. Therefore, a word processing application is the most appropriate choice for writing a story.

Submit
5. To start a new message click on Compose.

Explanation

The given correct answer is "True". This suggests that in order to start a new message, one needs to click on the "Compose" button. This implies that there is a specific action required to initiate the creation of a new message, which is clicking on the "Compose" option.

Submit
6. If your friend, Enzo, sent you a message and you want to send the message to another friend, Fred, click on reply.

Explanation

The statement is false because if Enzo sent you a message and you want to send it to Fred, you should click on "forward" instead of "reply". "Reply" is used to respond directly to the sender of the message, not to forward it to someone else.

Submit
7. I can share software by installing it on several computers.

Explanation

Sharing software by installing it on multiple computers without proper licensing or permission from the software owner is considered illegal. It violates copyright laws and the terms of use of the software. Unauthorized distribution of software can result in legal consequences, including fines and penalties. It is important to respect intellectual property rights and obtain the necessary licenses or permissions when sharing software.

Submit
8. A piece of programming code designed to record and report a computer user's keystrokes.

Explanation

A keylogger is a type of programming code that is specifically designed to record and report a computer user's keystrokes. It is often used for malicious purposes, such as stealing sensitive information like passwords or credit card details. Keyloggers can be installed on a computer without the user's knowledge and can operate silently in the background, recording every keystroke made by the user. This information is then sent to the attacker, who can use it for their own malicious intentions.

Submit
9. What two things can you do after you type your message?

Explanation

After typing a message, you have the option to either send it immediately or save it as a draft for later. This allows you to either send the message right away or save it and come back to it at a later time to review, edit, and send it. The option to delete the message is not mentioned, so it is not one of the available actions after typing the message.

Submit
10. I can post copies of computer software, songs, movies, or other copyrighted works online through social networking sites.

Explanation

Posting copies of computer software, songs, movies, or other copyrighted works online without proper authorization from the copyright holder is considered illegal. Copyright laws protect the rights of creators and owners of original works, and distributing their works without permission infringes upon those rights.

Submit
11. Any piece of programming code designed to harm a system.

Explanation

Malware refers to any piece of programming code designed to harm a system. It is a general term that encompasses various types of malicious software, including viruses, worms, trojans, ransomware, and spyware. These programs are created with the intention of causing damage, stealing sensitive information, or gaining unauthorized access to a system. Malware can be distributed through various means, such as email attachments, malicious websites, or infected software downloads. Once installed, it can perform a range of harmful activities, such as deleting files, corrupting data, or disrupting system operations.

Submit
12. A piece of programming code designed to snoop on a computer system.

Explanation

Spyware refers to a type of malicious programming code that is specifically designed to secretly monitor and gather information from a computer system without the user's consent. It is often installed without the user's knowledge and can track activities, collect personal data, and transmit it to a third party. Unlike worms and keyloggers, spyware primarily focuses on covertly spying on the user rather than spreading itself or capturing keystrokes. Therefore, the correct answer for this question is spyware.

Submit
13. To send a picture click on attach.

Explanation

The given answer is true because to send a picture, you need to click on the attach button. This implies that the action of sending a picture requires the user to click on the attach button in order to select and attach the desired picture file.

Submit
14. Which application would you use to create a For Sale sign?

Explanation

Desktop Publishing software is commonly used to create visually appealing documents such as brochures, flyers, and signs. It provides a wide range of tools and features to design and layout text, images, and graphics in a professional manner. Therefore, to create a For Sale sign that is visually attractive and eye-catching, one would use Desktop Publishing software. Spreadsheet and Database applications are not designed for creating visual designs and layouts, but rather for organizing and analyzing data.

Submit
15. Copyright violators cannot be sued or prosecuted.

Explanation

This statement is false. Copyright violators can indeed be sued or prosecuted for their actions. Copyright laws are in place to protect the rights of creators and owners of original works, and violations of these laws can lead to legal consequences such as fines or imprisonment. Therefore, it is incorrect to say that copyright violators cannot be sued or prosecuted.

Submit
16. A piece of programming code designed to seize control of a personal computer.

Explanation

A Zombie-Bot is a piece of programming code that is designed to seize control of a personal computer. It is a type of malware that infects a computer and turns it into a part of a larger network of infected computers, known as a botnet. Once a computer is infected, it can be controlled remotely by a hacker or cybercriminal to carry out various malicious activities, such as sending spam emails, launching DDoS attacks, or stealing sensitive information. Unlike a worm, which is a self-replicating malware, a Zombie-Bot requires an initial infection to spread and gain control over other computers.

Submit
17. A piece of programming code designed to disable a computer system.

Explanation

A virus is a type of programming code that is designed to disable a computer system. It can replicate itself and spread to other computers, causing damage to files, corrupting data, and disrupting the normal functioning of the system. Unlike keyloggers and time bombs, viruses have the ability to self-replicate and spread, making them particularly harmful and dangerous.

Submit
18. Today, copyright laws apply as soon as work is created.  There is no need to mark the work with a copyright symbol.

Explanation

Copyright laws automatically protect original works of authorship as soon as they are created in a fixed form, such as writing, music, or art. The use of a copyright symbol (©) is not required for the work to be protected. Therefore, the statement that copyright laws apply as soon as work is created and there is no need to mark the work with a copyright symbol is true.

Submit
19. A piece of programming code disigned to damage a computer system at some point in the future.

Explanation

A time bomb is a type of malicious code that is designed to damage a computer system at a specific future time or date. It is programmed to remain dormant until the predetermined time is reached, at which point it may execute destructive actions, such as deleting files, corrupting data, or even rendering the entire system inoperable. Unlike other types of malware, a time bomb does not actively spread or replicate itself, but rather lies dormant within a system until its trigger conditions are met. This makes it a particularly dangerous and stealthy form of attack, as it can remain undetected until it is too late.

Submit
20. What is the box callled where you type your message?

Explanation

The box where you type your message is called the message box.

Submit
21. I can use excerpts from a copyrighted work in a school paper without obtaining the copyright holder's permission.

Explanation

Using excerpts from a copyrighted work in a school paper without obtaining the copyright holder's permission is considered legal under certain circumstances. This falls under the "fair use" doctrine, which allows limited use of copyrighted material for purposes such as criticism, comment, news reporting, teaching, scholarship, or research. However, the extent of the excerpts used and the purpose of their use should be considered. It is important to properly cite the source and give credit to the copyright holder.

Submit
22. Malicious software disguised as a useful program or computer file.

Explanation

A Trojan Horse is a type of malicious software that appears to be a useful program or file, but actually contains hidden harmful code. It tricks users into installing or executing it, giving the attacker unauthorized access to the user's computer. Unlike a keylogger, which records keystrokes, or a time bomb, which is a type of malware that is triggered at a specific time, a Trojan Horse disguises itself to deceive users and gain access to their system.

Submit
23. Which application would you use to balance your allowance?

Explanation

A spreadsheet application would be the best choice for balancing your allowance. Spreadsheets are designed to handle numerical data and perform calculations easily. You can create a budget sheet, input your income and expenses, and use formulas to calculate your remaining balance. Additionally, spreadsheets allow you to organize and track your financial transactions efficiently. Unlike a word processing application, which is primarily used for creating documents, or a database application, which is more suited for storing and retrieving large amounts of structured data, a spreadsheet provides the necessary tools for managing and balancing your allowance effectively.

Submit
24. Which application would you use to keep an address book of your friends and family?

Explanation

A database would be the appropriate application to keep an address book of friends and family. Databases are designed to store and manage large amounts of structured data, making it easier to organize and search for specific information. With a database, you can create tables to store different types of data such as names, addresses, phone numbers, and other relevant details. Additionally, databases offer functionalities like sorting, filtering, and querying data, which can be helpful when managing and updating an address book. Spreadsheet and word processing applications are not specifically designed for this purpose and may not provide the same level of efficiency and organization.

Submit
25. Which application would you use to create a table of your TAKS scores each year and include a chart?

Explanation

A spreadsheet application would be the most suitable choice for creating a table of TAKS scores each year and including a chart. Spreadsheets allow users to organize and analyze data in a tabular format, making it easy to input and manipulate scores. Additionally, spreadsheets often have built-in charting tools that enable users to create visual representations of the data, such as charts and graphs. This makes it convenient to present the TAKS scores in a visually appealing and easily understandable manner. A database application is more appropriate for storing and managing large amounts of structured data, while desktop publishing is used for creating documents with complex layouts and designs.

Submit
26. Can other people comment back on blogs?

Explanation

The answer is "Yes, unless the website allows restrictions" because in general, most blogs allow comments from other people. However, some websites may have restrictions in place that prevent users from commenting. These restrictions could be due to various reasons such as preventing spam, maintaining a certain level of content quality, or avoiding inappropriate or offensive comments. Therefore, while commenting on blogs is generally allowed, it ultimately depends on the specific website's policies and settings.

Submit
27. A piece of programming code designed to damage a wide network of computers.

Explanation

A worm is a type of malicious computer program that is designed to replicate and spread across a network of computers. Unlike viruses, worms do not need to attach themselves to existing files or programs in order to spread. Instead, they exploit vulnerabilities in computer systems to self-replicate and spread to other computers. This makes them highly effective at quickly infecting and damaging a wide network of computers.

Submit
View My Results

Quiz Review Timeline (Updated): Feb 14, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 14, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 04, 2010
    Quiz Created by
    Bfigueroa
Cancel
  • All
    All (27)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
I can burn copies of computer software discs for others.
Illegally downloading and illegal file-sharing of software, music, and...
If you have a research project about UTSA and want to know the number...
Which application would you use to write a story about your dream car?
To start a new message click on Compose.
If your friend, Enzo, sent you a message and you want to send the...
I can share software by installing it on several computers.
A piece of programming code designed to record and report a computer...
What two things can you do after you type your message?
I can post copies of computer software, songs, movies, or other...
Any piece of programming code designed to harm a system.
A piece of programming code designed to snoop on a computer system.
To send a picture click on attach.
Which application would you use to create a For Sale sign?
Copyright violators cannot be sued or prosecuted.
A piece of programming code designed to seize control of a personal...
A piece of programming code designed to disable a computer system.
Today, copyright laws apply as soon as work is created.  There is...
A piece of programming code disigned to damage a computer system at...
What is the box callled where you type your message?
I can use excerpts from a copyrighted work in a school paper without...
Malicious software disguised as a useful program or computer file.
Which application would you use to balance your allowance?
Which application would you use to keep an address book of your...
Which application would you use to create a table of your TAKS scores...
Can other people comment back on blogs?
A piece of programming code designed to damage a wide network of...
Alert!

Advertisement