1.
You want to find out about a lawn mower repair. Which browser search result most likely has this information?
Correct Answer
C. Yard Maniacs (full repair service for broken lawn mowers)
Explanation
The browser search result that most likely has information about lawn mower repair is "Yard Maniacs (full repair service for broken lawn mowers)". This is because the description specifically mentions a full repair service for broken lawn mowers, indicating that they have the expertise and resources to repair lawn mowers. The other options, such as "Lawn Goat" and "Lawn Mower Castle", do not mention repair services, while "Concrete Lawn" suggests an alternative to grass and lawn mowers.
2.
Your work group is using the internet to share documents. A member tells you she has uploaded a document. What does that mean she did to the groups document?
Correct Answer
B. Posted it
Explanation
The member "posted" the document, which means that she uploaded it to the internet for the group to access and view.
3.
How might more use of digital cameras be a bad thing?
Correct Answer
C. Less Privacy
Explanation
More use of digital cameras can be a bad thing because it leads to less privacy. With the increasing use of digital cameras, it becomes easier for people to capture and share images without the knowledge or consent of others. This can result in a violation of personal privacy, as individuals may find themselves being photographed or recorded without their consent in various public and private settings. This lack of privacy can lead to discomfort, intrusion, and potential misuse of personal information.
4.
Which of these would be a hard password for someone to guess?
Correct Answer
A. A made-up word
Explanation
A made-up word would be a hard password for someone to guess because it is not a commonly used word and does not have any personal association with the individual. It is unique and unpredictable, making it difficult for others to guess or crack through brute force methods.
5.
What do you call a software program made to harm other software?
Correct Answer
B. A Virus
Explanation
A virus is a software program specifically designed to harm other software. It is typically created with malicious intent and can cause damage to computer systems by corrupting or deleting files, stealing personal information, or disrupting normal system operations. Viruses can spread from one computer to another, often through infected files or email attachments, and can be difficult to detect and remove without the use of antivirus software.
6.
What kind of website is MOST OFTEN used as an internet journal of your thoughts or interests?
Correct Answer
B. Blog
Explanation
A blog is the most commonly used website as an internet journal of thoughts or interests. A blog allows individuals to share their thoughts, opinions, and interests with a wider audience. It provides a platform for personal expression and can cover a wide range of topics such as travel, fashion, food, or even personal experiences. Blogs often include regular updates and allow readers to engage through comments and discussions.
7.
When is it always legal to make copies of computer software?
Correct Answer
A. If you have the permission from the company that owns it.
Explanation
Making copies of computer software is only legal if you have permission from the company that owns it. This means that you have obtained explicit consent to duplicate the software. Having a computer with a network connection, using it for personal use without reselling, or using it for school projects do not guarantee the legality of making copies. The key factor is obtaining permission from the software company, as they hold the rights to their intellectual property.
8.
Suppose you are writing a report for school. Which of these is OK?
Correct Answer
D. Cite websites in your report that agree with your ideas.
Explanation
Citing websites in your report that agree with your ideas is the correct option. This means you are using the information from those websites to support your own thoughts and arguments. It is important to properly cite your sources to give credit to the original authors and to avoid plagiarism. By doing this, you are showing that you have done research and are using credible sources to back up your claims.
9.
When would you use the Save command instead of Save As....?
Correct Answer
C. When you want to overwrite the existing copy of the file
Explanation
When you want to overwrite the existing copy of the file, you would use the Save command instead of Save As. This means that you want to save the changes made to the file and replace the previous version with the updated one. Using Save As would create a new file with a different name, while Save updates the existing file.
10.
What is an icon?
Correct Answer
B. A picture
Explanation
An icon is a small graphical representation that is used to represent a file, program, or function on a computer system. Icons are typically small images or symbols that are visually intuitive and represent a specific action or object. They are commonly used on computer desktops, software interfaces, and mobile devices to provide a visual representation of an application or feature. Icons are designed to be easily recognizable and help users navigate and interact with digital systems more efficiently.
11.
What does it mean if a document has copyright protection?
Correct Answer
B. It is a crime to copy it without permission.
Explanation
If a document has copyright protection, it means that copying it without permission is considered a crime. This indicates that the document is protected by legal rights, and anyone who copies or reproduces it without authorization can be held legally accountable. This protection ensures that the original creator or owner of the document has exclusive rights over its distribution, reproduction, and use, preventing others from using or profiting from their work without proper authorization.
12.
Bill created a file on a school computer. His home computer can't open the file. What might be the problem?
Correct Answer
B. His home computer doesn't use the same program.
Explanation
The problem might be that Bill's home computer doesn't use the same program as the school computer. Different programs have different file formats and compatibility issues can arise when trying to open files created in one program with a different program.
13.
Which of these would be most unsafe to tell other people in a chat-room conversation?
Correct Answer
C. What your home pHone number is.
Explanation
Sharing personal information such as your home phone number in a chat-room conversation can be highly unsafe. This information can be used by others for malicious purposes like identity theft, harassment, or unauthorized access to your personal accounts. It is important to prioritize online safety and avoid sharing sensitive information with strangers in order to protect your privacy and security.
14.
Putting your writing online is called publishing. Which Statement is TRUE about information that is published online?
Correct Answer
C. People are able to make copies of information that they see online.
Explanation
When information is published online, it becomes accessible to anyone with internet access. As a result, people have the ability to make copies of the information they come across online. This means that once something is published online, it can be easily replicated and shared by others.
15.
Which file ending is used for pictures?
Correct Answer
D. .jpg
Explanation
The file ending .jpg is used for pictures because it is a common file format for saving and displaying images. It is a compressed format that allows for high-quality images with relatively small file sizes. Other file endings such as .txt, .html, and .doc are used for text documents or webpages, while .jpg specifically indicates that the file contains a picture.
16.
Which one of these is an e-mail address?
ExplanationThe correct answer is
[email protected] because it follows the standard format for an email address, which consists of a username (sunshine) followed by the @ symbol and the domain name (example.net).
17.
If you wanted to create a search in the Library database to find all books about ogham, what type of search would you put it in?
Correct Answer
A. Subject Search
Explanation
ogham is an medieval form of writing.
18.
If you wanted to create a search in the Library database to find all books by Jerry Spinnelli, what type of search would you put it in?
Correct Answer
B. Author Search
Explanation
To find all books by Jerry Spinnelli in the Library database, you would use an Author Search. This type of search allows you to specifically search for books written by a particular author. By inputting "Jerry Spinnelli" as the search criteria, the database will retrieve all books written by him, making it easier to locate and access his works.
19.
If you wanted to create a search in the Library database to find all books from 1941, what type of search would you put it in?
Correct Answer
D. Date Published Search
Explanation
To find all books from 1941 in the Library database, you would use a "Date Published Search". This type of search allows you to specify a specific date or range of dates to filter the results and retrieve only the books published in 1941. By using this search option, you can easily narrow down the search results and find the desired books from the specified year.
20.
If you wanted to create a search in the Library database to find all books about penguins, what type of search would you put it in?
Correct Answer
A. Subject Search
Explanation
To find all books about penguins in the Library database, you would use a Subject Search. This type of search allows you to specifically search for books based on their subject matter, in this case, penguins. By using a Subject Search, you can narrow down the results to only include books that are relevant to the topic of penguins, making it easier to find the information you are looking for.
21.
If you wanted to create a search in the Library database to find the book Double Dutch, what type of search would you put it in?
Correct Answer
C. Title Search
Explanation
To find the book "Double Dutch" in the Library database, you would use a Title Search. This search type allows you to specifically search for books by their titles, making it the most appropriate option for locating a book with a known title like "Double Dutch". Subject Search would be used to find books related to a specific topic, Author Search to find books written by a particular author, and Date Published Search to find books published within a certain timeframe.
22.
If you wanted to create a search in the Library database to find all books by Kate Banks, what type of search would you put it in?
Correct Answer
B. Author Search
Explanation
To find all books by Kate Banks in the Library database, you would use an Author Search. This search allows you to specifically search for books written by a particular author. By entering "Kate Banks" as the search criteria, the database will retrieve all books authored by her, making it easier to find her works in the Library's collection.
23.
If you wanted to create a search in the Library database to find all books about Michael Jordan, what type of search would you put it in?
Correct Answer
A. Subject Search
Explanation
To find all books about Michael Jordan in the Library database, you would use a Subject Search. This type of search allows you to search for materials based on their subject or topic. By selecting the subject "Michael Jordan," you can retrieve all books that are specifically about him, regardless of the author, title, or date of publication.
24.
You are looking for information on Christopher Columbus and you enter his name in a Google search. Pretending that the answers below are links, click on the one that is probably the safest place to find information.
Correct Answer
B. CHRISTOpHER COLUMBUS ONLINE AT THE UNIVERSITY OF TEXAS
(use these professor-recommended links to explore the world of ChristopHer Columbus)
Explanation
The safest place to find information on Christopher Columbus would be the "CHRISTOPHER COLUMBUS ONLINE AT THE UNIVERSITY OF TEXAS" link. This is because it is mentioned that these are professor-recommended links, indicating that the information provided is likely to be reliable and accurate.
25.
Look at the browser below. Suppose you go to this web page by mistake. What would you click to go back to the previous page?
Correct Answer
A. A
Explanation
To go back to the previous page, you would click on the "A" button, which is typically represented by an arrow pointing to the left. This button is commonly used as the "back" or "previous" button in web browsers, allowing users to navigate to the previously visited page.
26.
Which button would you click below to make the highlighted list bulleted?
Correct Answer
D. D
Explanation
To make the highlighted list bulleted, you would click button D.
27.
What button would you push to make this list into a pie chart?
Correct Answer
C. C
Explanation
To make the list into a pie chart, you would need to use button C. This is because button C is most likely the option that corresponds to creating a pie chart. The other buttons, A and B, may have different functions such as creating a bar chart or a line graph. Button D is not mentioned in the question, so it is not clear what function it serves.
28.
What would you click to change the font size of the highlighted text to 25?
Correct Answer
D. D
Explanation
To change the font size of the highlighted text to 25, you would click on option D.
29.
What button would you click to make the highlighted text bold?
Correct Answer
A. A
Explanation
To make the highlighted text bold, you would click on button A.