NAME

Question types


Start with


Question limit

of 225 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. favorite
  2. online harassment
  3. http://
  4. unauthorized use
  5. kernel
  1. a When you type a URL into the Address bar and press the Enter key, Internet Explorer automatically adds _______ to the URL and then displays the page.
    Select one:
    a. html::80
    b. IE10://
    c. TCP/IP
    d. http://
  2. b A _______ is a shortcut to a Web page saved in a list in the Internet Explorer desktop application.
    Select one:
    a. Slice
    b. favorite
    c. frequent
    d. histogram
  3. c An employee using a company computer to check personal email is an example of ____.
    Select one:
    a. fair use
    b. unauthorized use
    c. unauthorized access
    d. hacking
  4. d The core of the computer's operating system is called the ____.
    Select one:
    a. boot sector
    b. node
    c. shell
    d. kernel
  5. e Case-Based Critical Thinking Questions

    Case 6-1
    You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing.

    A relative of yours is in junior high school and has been subjected to a lot of bullying via text messages and social networking sites. You want to help, so you start to read up on the state laws and school rules that deal with ____.
    Select one:
    a. cyberterrorism
    b. identity theft
    c. online harassment
    d. cyberstalking

5 Multiple choice questions

  1. Presenting someone else's work as your own is ____.
    Select one:
    a. libel
    b. trademark infringement
    c. plagiarism
    d. unethical but not illegal
  2. If you point to an application button on the desktop taskbar, _____.
    Select one:
    a. a thumbnail of the application window appears
    b. the application becomes active
    c. the application is maximized
    d. a shortcut menu appears
  3. When a software program is purchased, ____.
    Select one:
    a. the buyer is buying the software
    b. the buyer can modify and resell the software
    c. the buyer may always install the software on as many systems as he or she wishes
    d. the buyer acquires a software license specifying the terms of use
  4. Case-Based Critical Thinking Questions

    Case 4-1
    Clarice is a network consultant, fielding questions from clients during the day, and navigating a wired and wireless world both at the office and at home.

    Clarice sometimes accesses her work computer at home via the Internet. She does so knowing that her connection is secure and private. The connection path she uses is an example of a(n) ____.
    Select one:
    a. intranet
    b. extranet
    c. VPN
    d. supranet
  5. The latest version of the Windows operating system is ____.
    Select one:
    a. Windows XP
    b. Windows 10
    c. Windows Vista
    d. Windows 8

5 True/False questions

  1. hardware and software companiesCase-Based Critical Thinking Questions

    Case 5-1
    The world of the Internet can be overwhelming. You take some time to break it down in your mind, understanding the community and its players. For each of the following questions, look at the organizations, businesses, or individuals listed, and then determine what they represent as a whole.

    Router manufacturer, maker of the latest Web browser, computer designer are ____.
    Select one:
    a. ASPs
    b. key Internet organizations
    c. hardware and software companies
    d. users

          

  2. CPUTo select nonadjacent files, press and hold the _____ key while selecting individual files.
    Select one:
    a. Shift
    b. Tab
    c. Ctrl
    d. Windows

          

  3. a starAny fact or set of facts, such as the words in a letter to a friend or the notes in a song, can become computer ____.
    Select one:
    a. data
    b. information
    c. networks
    d. hardware

          

  4. worms, Trojan horsesUnlike ____, ____ cannot replicate themselves.
    Select one:
    a. Trojan horses, worms
    b. viruses, worms
    c. worms, Trojan horses
    d. worms, viruses

          

  5. virusA ____ is a program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.
    Select one:
    a. worm
    b. Trojan horse
    c. virus
    d. DDoS

          

Create Set