Download Ms. Decker`s Third- Grade Class

Document related concepts

Psychological effects of Internet use wikipedia , lookup

Transcript
Multiple Choice
Computer Practice Test!
1. All the equipment that is
plugged into your computer
system is called _____
A.
B.
C.
D.
Technology
Software
Hardware
Telecommunications
1. All the equipment that is
plugged into your computer
system is called _____
C. Hardware
2. A _____ gives someone the
right to copy and sell their
art work or written work.
A.
B.
C.
D.
Privilege
Citation
Telecommunications
Copyright
2. A _____ gives someone the
right to copy and sell their
art work or written work.
D. copyright
3. _____ means to tell where
you got your information for
a research project.
A.
B.
C.
D.
Copyright
Illegal
Site
Cite
3. _____ means to tell where
you got your information for
a research project.
D. Cite
4. Freeware is a type of
software that can be copied
and shared with all your
friends.
A. True
B. False
4. Freeware is a type of
software that can be copied
and shared with all your
friends.
A. True
5. Programs that are installed
on a computer are called
_____ .
A.
B.
C.
D.
Technology
Software
Hardware
Telecommunications
5. Programs that are installed
on a computer are called
_____ .
B. Software
6. Commercial software is
protected by a copyright.
It cannot be shared and
copied.
A. True
B. False
6. Commercial software is
protected by a copyright.
It cannot be shared and
copied.
A. True
7. It's okay to read an
article on the Internet and
then copy it into your
research paper for Social
Studies class.
A. True
B. False
7. It's okay to read an
article on the Internet and
then copy it into your
research paper for Social
Studies class.
B. False
8. Emailing chain letters to
all your friends _____ .
A. Slows down the network
B. Is NOT an acceptable way
to use school technology
C. Is NOT educational
D. All of the above
8. Emailing chain letters to
all your friends _____ .
D. All of the
above
9. Turning in a signed
Acceptable Use Policy
allows you to _____ .
A. Check out books in the library
B. Use the network and the
Internet at school
C. Have your picture on your
school’s web site
D. Go on field trips
9. Turning in a signed
Acceptable Use Policy
allows you to _____ .
B. Use the network
and the Internet at
school.
10. You get a CD in the mail
with some games on it. Since
the games are freeware, you
can give the CD to your
friends so they can install the
games on their computers too.
A. True
B. False
10. You get a CD in the mail
with some games on it.
Since the games are
freeware, you can give the
CD to your friends so they
can install the games on
their computers too.
A. True
11. © is the _____
symbol.
A.
B.
C.
D.
Email
Citation
Telecommunication
Copyright
11. © is the _____
symbol.
D. Copyright
12. It is not acceptable to
use inappropriate language
or "cuss words" in emails or
web pages. This type of
language is called _____ .
A.
B.
C.
D.
Profanity
Bullying
Illegal
Citing
12. It is not acceptable to
use inappropriate language
or "cuss words" in emails or
web pages. This type of
language is called _____ .
A.Profanity
13. Looking at a web site
about insects during Science
class is a good example of
using the Internet for an
educational project.
A. True
B. False
13. Looking at a web site
about insects during Science
class is a good example of
using the Internet for an
educational project.
A. True
14. Hurting someone's feelings
by saying or writing
something about their race,
religion, or heritage is
called _____
A.
B.
C.
D.
Profanity
Bullying
Illegal
Citing
14. Hurting someone's feelings
by saying or writing
something about their race,
religion, or heritage is
called _____
B. Bullying
15. If you use a photograph or
a picture from the Internet in
a research project, you
_____ .
A. only need to tell your teacher where you
got the picture
B. don’t have to cite it because it is just a
picture
C. cite your source on the same page as the
photograph or picture
D. all of the above
15. If you use a photograph
or a picture from the
Internet in a research
project, you _____ .
C. cite your source on
the same page as the
photograph or picture
16. An inappropriate or
offensive web site _____ .
A. Might make you feel uncomfortable
B. Uses proper language and attractive
graphics
C. Is okay to look at in school
D. Does not need to be reported to an
adult
16. An inappropriate or
offensive web site _____ .
A. Might make you
feel
uncomfortable
17. Software that can't be
copied and shared because
it is protected by a
copyright is called _____ .
A.
B.
C.
D.
Shareware
Freeware
Pirated software
Commercial software
17. A Software that
copied and shared
it is protected
copyright is called
can't be
because
by a
_____ .
D. Commercial
Software
18. You got an email
message that insulted
your school. You did not
put any insults into the
message you wrote back.
You did the right thing
A.True
B.False
18. You got an email
message that insulted
your school. You did not
put any insults into the
message you wrote back.
You did the right thing
A.True
19. Cite means _____ .
A. To copy information from a source on
the Internet
B. To identify the source of your
information
C. To view a group of web pages that are
linked together
D. All of the above
19. Cite means _____ .
B. To identify the
source of your
information
20. After Bill download a file,
nothing seemed to work
right on his computer. The
file might have had a
_____
A. Virus
B. Security Problem
C. Copyright
D. Citation
20. After Bill download a file,
nothing seemed to work
right on his computer. The
file might have had a
_____
A.Virus
21. When you cite a source in
a research project, you
_____ .
A. Email a friend about a good web site
B. Give credit to the web site where you
found your information
C. Write ideas and thoughts in your own
words
D. Copy pictures from a web site and use
them in a project
21. When you cite a source in
a research project, you
_____ .
B. Give credit to the
web site where
you found your
information
22. Copying or sharing
copyrighted software is
software theft. This crime
is also called _____ .
A.
B.
C.
D.
Cheating
Piracy
Stealing
Speeding
22. Copying or sharing
copyrighted software is
software theft. This crime
is also called _____ .
B. Piracy
23. Which of these are
expectations of the JCPS
Net Acceptable Use Policy?
A. Students will not use profanity or insults.
B. Students will use the network for
educational projects
C. Students will respect other people's work
and honor their privacy.
D. All of the above
23. Which of these are
expectations of the JCPS
Net Acceptable Use Policy?
D. All of the above
24. You bought a commercial
keyboarding program that was
really good! Since it was
educational, it would be okay
for you to give a copy of the
program to your Computer
Teacher for your school's
computers.
A. True
B. False
24. You bought a commercial
keyboarding program that was
really good! Since it was
educational, it would be okay
for you to give a copy of the
program to your Computer
Teacher for your school's
computers.
B. False
25. A secure network ___.
A. Is easy for computer hackers to break
into
B. Is protected by passwords so that data
can't be read or changed
C. Does not need to use virus protection
software
D. All of the above
25. A secure network ___.
B. Is protected by
passwords so that
data can't be read or
changed
26. What does a copyright
do?
A. It protects your software from a virus.
B. It gives a company the right to copy and
sell its software.
C. It guarantees that the software you are
buying will work.
D. It identifies the source of your
information.
26. What does a copyright
do?
B. It gives a company
the right to copy and
sell its software.
27. Our school district, JCPS,
protects us from
inappropriate and offensive
web sites.
A. True
B. False
27. Our school district, JCPS,
protects us from
inappropriate and offensive
web sites.
A.True
28. Which of these is not
permitted by a signed JCPS
Net Acceptable Use Policy?
A.
B.
C.
D.
Using the Internet for research
Visiting web sites
Installing software
Using email
28. Which of these is not
permitted by a signed JCPS
Net Acceptable Use Policy?
C. Installing
Software
29. Jackie and Brandon are writing a
report about Abraham Lincoln.
They got a picture of President
Lincoln from the Internet. Jackie
says they need to cite their
source. Brandon disagrees because
he says that everything on the
Internet is free. Who is right?
A. Jackie
B. Brandon
29. Jackie and Brandon are writing a
report about Abraham Lincoln.
They got a picture of President
Lincoln from the Internet. Jackie
says they need to cite their
source. Brandon disagrees because
he says that everything on the
Internet is free. Who is right?
A.Jackie
30. Students who do not
respect other people's work
by deleting files or using
inappropriate file names
_____ .
A. are not using the school's network in an
acceptable manner
B. Are invading other people's privacy
C. Will not be allowed to work on the
school's computers
D. All of the above
30. Students who do not
respect other people's work
by deleting files or using
inappropriate file names
_____ .
D. All of the above
Great Job!