Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Multiple Choice Computer Practice Test! 1. All the equipment that is plugged into your computer system is called _____ A. B. C. D. Technology Software Hardware Telecommunications 1. All the equipment that is plugged into your computer system is called _____ C. Hardware 2. A _____ gives someone the right to copy and sell their art work or written work. A. B. C. D. Privilege Citation Telecommunications Copyright 2. A _____ gives someone the right to copy and sell their art work or written work. D. copyright 3. _____ means to tell where you got your information for a research project. A. B. C. D. Copyright Illegal Site Cite 3. _____ means to tell where you got your information for a research project. D. Cite 4. Freeware is a type of software that can be copied and shared with all your friends. A. True B. False 4. Freeware is a type of software that can be copied and shared with all your friends. A. True 5. Programs that are installed on a computer are called _____ . A. B. C. D. Technology Software Hardware Telecommunications 5. Programs that are installed on a computer are called _____ . B. Software 6. Commercial software is protected by a copyright. It cannot be shared and copied. A. True B. False 6. Commercial software is protected by a copyright. It cannot be shared and copied. A. True 7. It's okay to read an article on the Internet and then copy it into your research paper for Social Studies class. A. True B. False 7. It's okay to read an article on the Internet and then copy it into your research paper for Social Studies class. B. False 8. Emailing chain letters to all your friends _____ . A. Slows down the network B. Is NOT an acceptable way to use school technology C. Is NOT educational D. All of the above 8. Emailing chain letters to all your friends _____ . D. All of the above 9. Turning in a signed Acceptable Use Policy allows you to _____ . A. Check out books in the library B. Use the network and the Internet at school C. Have your picture on your school’s web site D. Go on field trips 9. Turning in a signed Acceptable Use Policy allows you to _____ . B. Use the network and the Internet at school. 10. You get a CD in the mail with some games on it. Since the games are freeware, you can give the CD to your friends so they can install the games on their computers too. A. True B. False 10. You get a CD in the mail with some games on it. Since the games are freeware, you can give the CD to your friends so they can install the games on their computers too. A. True 11. © is the _____ symbol. A. B. C. D. Email Citation Telecommunication Copyright 11. © is the _____ symbol. D. Copyright 12. It is not acceptable to use inappropriate language or "cuss words" in emails or web pages. This type of language is called _____ . A. B. C. D. Profanity Bullying Illegal Citing 12. It is not acceptable to use inappropriate language or "cuss words" in emails or web pages. This type of language is called _____ . A.Profanity 13. Looking at a web site about insects during Science class is a good example of using the Internet for an educational project. A. True B. False 13. Looking at a web site about insects during Science class is a good example of using the Internet for an educational project. A. True 14. Hurting someone's feelings by saying or writing something about their race, religion, or heritage is called _____ A. B. C. D. Profanity Bullying Illegal Citing 14. Hurting someone's feelings by saying or writing something about their race, religion, or heritage is called _____ B. Bullying 15. If you use a photograph or a picture from the Internet in a research project, you _____ . A. only need to tell your teacher where you got the picture B. don’t have to cite it because it is just a picture C. cite your source on the same page as the photograph or picture D. all of the above 15. If you use a photograph or a picture from the Internet in a research project, you _____ . C. cite your source on the same page as the photograph or picture 16. An inappropriate or offensive web site _____ . A. Might make you feel uncomfortable B. Uses proper language and attractive graphics C. Is okay to look at in school D. Does not need to be reported to an adult 16. An inappropriate or offensive web site _____ . A. Might make you feel uncomfortable 17. Software that can't be copied and shared because it is protected by a copyright is called _____ . A. B. C. D. Shareware Freeware Pirated software Commercial software 17. A Software that copied and shared it is protected copyright is called can't be because by a _____ . D. Commercial Software 18. You got an email message that insulted your school. You did not put any insults into the message you wrote back. You did the right thing A.True B.False 18. You got an email message that insulted your school. You did not put any insults into the message you wrote back. You did the right thing A.True 19. Cite means _____ . A. To copy information from a source on the Internet B. To identify the source of your information C. To view a group of web pages that are linked together D. All of the above 19. Cite means _____ . B. To identify the source of your information 20. After Bill download a file, nothing seemed to work right on his computer. The file might have had a _____ A. Virus B. Security Problem C. Copyright D. Citation 20. After Bill download a file, nothing seemed to work right on his computer. The file might have had a _____ A.Virus 21. When you cite a source in a research project, you _____ . A. Email a friend about a good web site B. Give credit to the web site where you found your information C. Write ideas and thoughts in your own words D. Copy pictures from a web site and use them in a project 21. When you cite a source in a research project, you _____ . B. Give credit to the web site where you found your information 22. Copying or sharing copyrighted software is software theft. This crime is also called _____ . A. B. C. D. Cheating Piracy Stealing Speeding 22. Copying or sharing copyrighted software is software theft. This crime is also called _____ . B. Piracy 23. Which of these are expectations of the JCPS Net Acceptable Use Policy? A. Students will not use profanity or insults. B. Students will use the network for educational projects C. Students will respect other people's work and honor their privacy. D. All of the above 23. Which of these are expectations of the JCPS Net Acceptable Use Policy? D. All of the above 24. You bought a commercial keyboarding program that was really good! Since it was educational, it would be okay for you to give a copy of the program to your Computer Teacher for your school's computers. A. True B. False 24. You bought a commercial keyboarding program that was really good! Since it was educational, it would be okay for you to give a copy of the program to your Computer Teacher for your school's computers. B. False 25. A secure network ___. A. Is easy for computer hackers to break into B. Is protected by passwords so that data can't be read or changed C. Does not need to use virus protection software D. All of the above 25. A secure network ___. B. Is protected by passwords so that data can't be read or changed 26. What does a copyright do? A. It protects your software from a virus. B. It gives a company the right to copy and sell its software. C. It guarantees that the software you are buying will work. D. It identifies the source of your information. 26. What does a copyright do? B. It gives a company the right to copy and sell its software. 27. Our school district, JCPS, protects us from inappropriate and offensive web sites. A. True B. False 27. Our school district, JCPS, protects us from inappropriate and offensive web sites. A.True 28. Which of these is not permitted by a signed JCPS Net Acceptable Use Policy? A. B. C. D. Using the Internet for research Visiting web sites Installing software Using email 28. Which of these is not permitted by a signed JCPS Net Acceptable Use Policy? C. Installing Software 29. Jackie and Brandon are writing a report about Abraham Lincoln. They got a picture of President Lincoln from the Internet. Jackie says they need to cite their source. Brandon disagrees because he says that everything on the Internet is free. Who is right? A. Jackie B. Brandon 29. Jackie and Brandon are writing a report about Abraham Lincoln. They got a picture of President Lincoln from the Internet. Jackie says they need to cite their source. Brandon disagrees because he says that everything on the Internet is free. Who is right? A.Jackie 30. Students who do not respect other people's work by deleting files or using inappropriate file names _____ . A. are not using the school's network in an acceptable manner B. Are invading other people's privacy C. Will not be allowed to work on the school's computers D. All of the above 30. Students who do not respect other people's work by deleting files or using inappropriate file names _____ . D. All of the above Great Job!