1.
This is an image of the display on a computer screen.
Correct Answer
B. Screenshot
Explanation
The correct answer is "screenshot." A screenshot is an image capture of the display on a computer screen. It allows users to save and share what is currently being shown on their screen. This can be useful for various purposes such as troubleshooting, documentation, or sharing information with others. A screenshot can be taken by using specific keyboard shortcuts or using software tools that enable this functionality.
2.
You can use the snipping tool to capture an image of your test score.
Correct Answer
A. True
Explanation
The given correct answer is "True". This means that the statement or question being asked is true or accurate.
3.
This is an example of a web browser.
Correct Answer
B. Chrome
Explanation
This question is asking for a web browser, and the correct answer is Chrome. Chrome is a popular web browser developed by Google. It is known for its fast and efficient performance, user-friendly interface, and extensive features and extensions. Chrome allows users to browse the internet, access websites, and perform various online activities such as searching, streaming, and shopping.
4.
AUP stands for
Correct Answer
A. Acceptable Use Policy
Explanation
AUP stands for Acceptable Use Policy. This refers to a set of rules and guidelines that outline the acceptable and appropriate use of a system, network, or service. It helps to ensure that users understand their responsibilities and the limitations of their usage. An AUP typically covers areas such as privacy, security, legal compliance, and prohibited activities. It is important for organizations to have an AUP in place to promote safe and responsible use of their resources.
5.
Select the proper procedure for logging off the computer
Correct Answer
D. Go to start and click "log off"
Explanation
The correct answer is "Go to start and click 'log off'." This is the proper procedure for logging off the computer because it ensures that all applications and processes are properly closed before shutting down the system. Simply hitting the power button or unplugging the computer can lead to data loss and potential damage to the system. It is important to follow the appropriate steps to log off in order to maintain the stability and security of the computer.
6.
You can get into trouble for being a bystander to cyberbullying?
Correct Answer
A. True
Explanation
By answering "True," it implies that being a bystander to cyberbullying can indeed lead to trouble. This is because bystanders who witness cyberbullying but choose to do nothing about it can be seen as condoning or enabling the behavior. In some cases, there may even be legal consequences for not reporting or intervening in cyberbullying incidents. It is important to take a stand against cyberbullying and support the victims.
7.
Any computer parts you can touch are called
Correct Answer
A. Hardware
Explanation
Computer hardware refers to the physical components of a computer that can be touched and interacted with, such as the monitor, keyboard, mouse, and CPU. These components are tangible and can be physically manipulated or replaced. Software, on the other hand, refers to the programs and instructions that run on the hardware, enabling it to perform specific tasks. Platforms and systems are broader terms that encompass both hardware and software, referring to the combination of components and programs that work together to provide a particular computing environment. However, in the context of the question, the term "computer parts you can touch" specifically points to hardware.
8.
A good password contains:
Correct Answer
D. Numbers, capital and lowercase letters
Explanation
A good password should include a combination of numbers, capital letters, and lowercase letters. This combination increases the complexity of the password, making it harder for others to guess or crack. Including personal information like your name, birthdate, or pet's name and age can make the password easier to guess, as these details may be known or easily found by others. Therefore, it is recommended to avoid using personal information in passwords to enhance security.
9.
A USB flash drive is:
Correct Answer
D. A storage device
Explanation
A USB flash drive is a storage device that is commonly used to store and transfer digital data. It is a portable device that uses flash memory to store data and can be easily connected to computers or other devices via a USB port. USB flash drives are popular due to their small size, high storage capacity, and ease of use. They are commonly used for backing up important files, transferring data between devices, and carrying files on the go.
10.
You are working on a new graphic organizer and need to add a "child" bubble. How do you add a sub-category, or child bubble to your organizer?
Correct Answer
A. Click on the bottom of the last bubble or press enter
Explanation
To add a sub-category or child bubble to the graphic organizer, you can click on the bottom of the last bubble or press enter. This action will create a new bubble connected below the last one, indicating that it is a sub-category or child bubble.
11.
How can a person quickly distinguish the parent bubble from the child or sibling bubbles?
Correct Answer
C. Each category of bubble is a different color
Explanation
By making each category of bubble a different color, it becomes easier for a person to quickly distinguish the parent bubble from the child or sibling bubbles. This visual distinction allows for a more efficient and effective understanding of the relationships between the bubbles. Reading each bubble individually would be time-consuming and may not provide a clear differentiation, while the statement "You can't tell the difference" is incorrect as the color difference helps in distinguishing the bubbles.
12.
What is a QR code?
Correct Answer
D. A two dimensional bar code
Explanation
A QR code is a two-dimensional bar code that consists of black squares arranged on a white background. It is used to store information such as website URLs, contact information, or product details. Unlike traditional barcodes, QR codes can store much more data and can be scanned using a smartphone or QR code reader. They are commonly used for marketing purposes, ticketing, and inventory management.
13.
With what do you scan a QR code?
Correct Answer
B. Your mobile device
Explanation
A QR code is typically scanned using a mobile device. This is because most mobile devices have built-in cameras that can capture the QR code image, and there are various QR code scanning apps available for download on mobile devices. These apps can decode the QR code and provide relevant information or perform specific actions associated with the code. Scanning a QR code with a computer, calculator, or TV remote is not a common practice as these devices do not have the necessary hardware or software to interpret QR codes.
14.
Your teacher asks you to save your work in the cloud. Where does she want you to save your work?
Correct Answer
C. Online
Explanation
The teacher wants the student to save their work online, which means storing it on the internet rather than on a physical device like a computer hard drive or USB drive. Saving work online allows for easy access from any device with an internet connection and provides a backup in case the physical device is lost or damaged.
15.
When a picture is uploaded to the cloud you can view the picture on the internet every where except?
Correct Answer
D. On a digital camera that does not connect to the internet
Explanation
When a picture is uploaded to the cloud, it can be accessed and viewed from any device that has an internet connection. This includes tablets, smartphones, and computers. However, a digital camera that does not have internet connectivity cannot access the cloud and therefore cannot view the uploaded picture.
16.
Why it is a good idea to save work in the cloud?
Correct Answer
D. All of the above
Explanation
Saving work in the cloud is a good idea because it provides multiple benefits. Firstly, the cloud backs up your work, ensuring that it is safe and can be easily recovered in case of any device failure or data loss. Secondly, it allows you to easily share your work with friends or colleagues, promoting collaboration and convenience. Lastly, by saving your work in the cloud, you have multiple copies stored in different locations, providing an additional layer of security and accessibility. Therefore, all of the mentioned reasons make it a good idea to save work in the cloud.
17.
What is a visual image such as a chart or a diagram to represent information
Correct Answer
D. All of the above
Explanation
The correct answer is "all of the above" because a visual image such as a chart, a diagram, a graphic organizer, or an infographic can all be used to represent information visually. These visual representations help to convey information in a clear and organized manner, making it easier for the audience to understand and interpret the data being presented.
18.
Google Drive allows you to share and comment on a document
Correct Answer
A. True
Explanation
Google Drive is a cloud-based storage platform that enables users to store and share documents. One of the key features of Google Drive is the ability to share documents with others and allow them to comment on the document. This allows for collaboration and easy communication between multiple users. Therefore, the statement that Google Drive allows you to share and comment on a document is true.
19.
On the drop-down menu, which option do you choose to insert an image?
Correct Answer
B. Insert
Explanation
To insert an image, you would choose the "Insert" option from the drop-down menu. This option allows you to add various elements, such as images, into your document or project. By selecting "Insert," you can easily incorporate an image into the desired location, enhancing the visual appeal and content of your work.
20.
Google drive or Microsoft Word allow you to share documents with others?
Correct Answer
A. True
Explanation
Google Drive and Microsoft Word both allow users to share documents with others.
21.
What is the shortcut for selecting "All"
Correct Answer
A. Ctrl-A
Explanation
The shortcut for selecting "All" is Ctrl-A. This shortcut is commonly used in various applications and text editors to quickly select all the content in a document or a specific area. By pressing Ctrl-A, users can easily highlight and manipulate the entire text or data without having to manually select it. This shortcut is efficient and time-saving, especially when dealing with large amounts of information.
22.
Each time you log into the Internet you leave a digital trail of your Internet activity.
Correct Answer
A. True
Explanation
When you log into the Internet, your activity is recorded by various entities such as internet service providers, websites, and online platforms. This digital trail includes information such as your IP address, browsing history, search queries, and interactions with websites. This data is often collected and used for various purposes such as targeted advertising, improving user experience, and monitoring online behavior. Therefore, it is true that each time you log into the Internet, you leave a digital trail of your activity.
23.
Your digital footprint grows each time you do searches online, post pictures online, or/and use your cell phone GPS.
Correct Answer
A. True
Explanation
Your digital footprint refers to the trail of data that you leave behind while using the internet or digital devices. This data includes your online searches, posts, and location information collected through your cell phone GPS. Each time you engage in these activities, your digital footprint grows, as more data about your online presence is generated and stored. Therefore, the statement "Your digital footprint grows each time you do searches online, post pictures online, or/and use your cell phone GPS" is true.
24.
At your current age it is not important to think about a "professional" web presence.
Correct Answer
A. True
Explanation
At a certain age, it may not be necessary or important to have a professional web presence. This could be because the individual is still young and in the early stages of their career, or they may not have a need for an online presence in their current profession or personal life. Additionally, building and maintaining a professional web presence requires time, effort, and resources, which may not be a priority for someone at their current age. Therefore, it is true that at their current age, it is not important to think about a professional web presence.
25.
What is a blog?
Correct Answer
C. A discussion website
Explanation
A blog is a type of website where an individual or a group of individuals share their thoughts, opinions, and experiences on various topics. It allows for interactive discussions through comments and feedback from readers. Unlike a PowerPoint with lots of writing on it or a piece of wood, a blog is specifically designed for online discussions and content sharing. It is not a popular game on the Internet, as it primarily focuses on written content rather than interactive gameplay.
26.
Is it possible to delete your digital presence on the web?
Correct Answer
B. False
Explanation
It is not possible to completely delete one's digital presence on the web. Once information is uploaded or shared online, it can be stored, copied, and distributed by others. Even if someone deletes their social media accounts or removes certain information, traces of their digital presence may still exist in various databases, archives, and backups. Additionally, search engines may still index and display cached versions of deleted content. Therefore, it is difficult to completely erase all digital footprints and have a completely clean slate on the web.
27.
The definition of digital citizenship is:
Correct Answer
C. Norms of appropriate, responsible behavior with regards to technology use.
Explanation
The correct answer is "norms of appropriate, responsible behavior with regards to technology use." This answer accurately defines digital citizenship as the expected standards of behavior when using technology. It encompasses the idea of using technology responsibly and appropriately, including aspects such as online etiquette, privacy, and security. It goes beyond social network etiquette or playground behavior, as digital citizenship extends to all aspects of technology use, not just specific platforms or locations.
28.
Internet safety includes:
Correct Answer
D. All of the above
Explanation
The correct answer is "all of the above". Internet safety includes not being stalkworthy, which means not sharing too much personal information online that could make us an easy target for stalkers or predators. It also includes keeping personal information private, such as not sharing our full name, address, or phone number on public platforms. Additionally, it is important to tell an adult when something we read online makes us uncomfortable, as they can help us navigate any potentially harmful situations. Therefore, all of these actions contribute to maintaining internet safety.
29.
Computer viruses are
Correct Answer
D. Programs developed by malicious users referred to as hackers
Explanation
Computer viruses are programs developed by malicious users referred to as hackers. These programs are designed to infect and damage computer systems, steal sensitive information, or disrupt normal operations. They can be spread through various means, including the internet and email. Computer viruses are a serious threat to computer security and can cause significant harm if not detected and removed promptly.
30.
You push the power button on the computer and it does nothing. You should do
Correct Answer
D. All of the above
Explanation
If pushing the power button on the computer does nothing, it suggests that there may be a problem with the power supply. Checking the power cord is important because it ensures that the computer is receiving power from the outlet. Checking the cable connection is necessary to ensure that the power cord is properly connected to the computer. Lastly, checking the cables into the monitor is important because if the monitor is not receiving power, it will not display anything. Therefore, all of the above steps should be taken to troubleshoot and resolve the issue.
31.
Copyright protects the creator of original work.
Correct Answer
A. True
Explanation
Copyright is a legal protection that grants exclusive rights to the creator of original work, such as literary, artistic, musical, or dramatic creations. This protection ensures that the creator has the sole right to reproduce, distribute, display, or perform their work, and prevents others from using it without permission. Therefore, it is true that copyright protects the creator of original work.
32.
What does the hyperlink look like on the menu bar?
Correct Answer
C. A chain
Explanation
The hyperlink on the menu bar typically appears as a chain symbol. This symbol is commonly used to represent a link or connection between different web pages or sections within a website. Clicking on the chain symbol allows users to navigate to the linked page or section.
33.
At your age it is NOT important to think about a professional web presence?
Correct Answer
B. False
Explanation
The statement suggests that at a certain age, it is not important to consider having a professional web presence. However, this is incorrect. In today's digital age, having a professional web presence is important regardless of age. It allows individuals to showcase their skills, experience, and accomplishments, and can be beneficial for networking, job opportunities, and personal branding. Therefore, the correct answer is false.
34.
Internet Safety includes:
Correct Answer
D. All of the above
Explanation
The correct answer is "all of the above" because internet safety encompasses all the mentioned aspects. Not being stalkworthy means being cautious about the information you share online to avoid attracting unwanted attention. Keeping personal information private is crucial to protect oneself from identity theft or online scams. Lastly, telling an adult when feeling uncomfortable with something online is important to seek guidance and ensure a safe online experience. Therefore, all these practices contribute to internet safety.
35.
What is the action or process of moving, saving files or data and information to another computer system or server?
Correct Answer
C. Upload
Explanation
Upload refers to the action or process of transferring files, data, or information from a local computer system or device to another computer system or server. It involves selecting and sending files from one location to another, typically using a network connection or the internet. This process allows users to share, store, or backup their files and data on remote servers or systems.
36.
The picture of your current web presence is called a digital map?
Correct Answer
A. True
Explanation
A digital map refers to a visual representation of your online presence, including websites, social media profiles, and other digital platforms. It helps you understand and navigate your online footprint. Therefore, the statement "The picture of your current web presence is called a digital map" is true because it accurately describes the concept of a digital map.
37.
You can use the following online tools to craft a digital footprint that is appealing to employers:
Correct Answer
D. All of the above
Explanation
Crafting a digital footprint that is appealing to employers can be done through various online tools. Twitter can be used to showcase your professional interests and engage with industry experts. A personal website allows you to create an online portfolio and highlight your skills and experiences. A blog provides a platform to share your knowledge and expertise in a specific field. Therefore, using all of the mentioned tools - Twitter, personal website, and blog - can help create a comprehensive and impressive digital footprint for potential employers.
38.
Your upset with a classmate because of something they said about you. The most appropriate way to communicate about your feelings would be:
Correct Answer
A. Face-to-face talk
Explanation
Face-to-face talk is the most appropriate way to communicate about your feelings with a classmate who upset you. This method allows for direct and personal communication, which can help to clarify any misunderstandings and resolve conflicts more effectively. It also allows for nonverbal cues, such as body language and facial expressions, to be observed and understood, enhancing the overall communication experience. Additionally, face-to-face communication promotes empathy and understanding between individuals, fostering a more positive and constructive resolution to the issue at hand.
39.
Items displayed on a web page such as images, headings, and text are called?
Correct Answer
C. Elements
Explanation
The correct answer is "Elements". On a web page, items such as images, headings, and text are referred to as elements. These elements are the building blocks that make up the content and structure of the page. They can be styled and arranged using HTML and CSS to create the desired layout and design.
40.
Why is it important to troubleshoot computer problems?
Correct Answer
D. All of the above
Explanation
It is important to troubleshoot computer problems because there is not always someone available to help you. By troubleshooting on your own, you can save money by not having to hire a professional technician. Additionally, by developing troubleshooting skills, you can also help others who may be facing similar computer issues.