Test 2: Email, Blogs, Searches, Applications, Ethics, Laws

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Bfigueroa
B
Bfigueroa
Community Contributor
Quizzes Created: 1 | Total Attempts: 99
Questions: 27 | Attempts: 99

SettingsSettingsSettings
Test 2: Email, Blogs, Searches, Applications, Ethics, Laws - Quiz


This quiz will test the knowledge of Middle School students in email, blogging, internet safety, and Microsoft Office 2007 applications.


Questions and Answers
  • 1. 

    To start a new message click on Compose.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given correct answer is "True". This suggests that in order to start a new message, one needs to click on the "Compose" button. This implies that there is a specific action required to initiate the creation of a new message, which is clicking on the "Compose" option.

    Rate this question:

  • 2. 

    If your friend, Enzo, sent you a message and you want to send the message to another friend, Fred, click on reply.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because if Enzo sent you a message and you want to send it to Fred, you should click on "forward" instead of "reply". "Reply" is used to respond directly to the sender of the message, not to forward it to someone else.

    Rate this question:

  • 3. 

    To send a picture click on attach.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given answer is true because to send a picture, you need to click on the attach button. This implies that the action of sending a picture requires the user to click on the attach button in order to select and attach the desired picture file.

    Rate this question:

  • 4. 

    Today, copyright laws apply as soon as work is created.  There is no need to mark the work with a copyright symbol.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Copyright laws automatically protect original works of authorship as soon as they are created in a fixed form, such as writing, music, or art. The use of a copyright symbol (©) is not required for the work to be protected. Therefore, the statement that copyright laws apply as soon as work is created and there is no need to mark the work with a copyright symbol is true.

    Rate this question:

  • 5. 

    Copyright violators cannot be sued or prosecuted.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    This statement is false. Copyright violators can indeed be sued or prosecuted for their actions. Copyright laws are in place to protect the rights of creators and owners of original works, and violations of these laws can lead to legal consequences such as fines or imprisonment. Therefore, it is incorrect to say that copyright violators cannot be sued or prosecuted.

    Rate this question:

  • 6. 

    What is the box callled where you type your message?

    • A.

      Inbox

    • B.

      Message Box

    • C.

      Compose

    Correct Answer
    B. Message Box
    Explanation
    The box where you type your message is called the message box.

    Rate this question:

  • 7. 

    What two things can you do after you type your message?

    • A.

      Send or Save Draft

    • B.

      Send or Delete

    • C.

      Save Draft or Delete

    Correct Answer
    A. Send or Save Draft
    Explanation
    After typing a message, you have the option to either send it immediately or save it as a draft for later. This allows you to either send the message right away or save it and come back to it at a later time to review, edit, and send it. The option to delete the message is not mentioned, so it is not one of the available actions after typing the message.

    Rate this question:

  • 8. 

    Can other people comment back on blogs?

    • A.

      No

    • B.

      Yes

    • C.

      Yes, unless the website allows restrictions

    Correct Answer
    C. Yes, unless the website allows restrictions
    Explanation
    The answer is "Yes, unless the website allows restrictions" because in general, most blogs allow comments from other people. However, some websites may have restrictions in place that prevent users from commenting. These restrictions could be due to various reasons such as preventing spam, maintaining a certain level of content quality, or avoiding inappropriate or offensive comments. Therefore, while commenting on blogs is generally allowed, it ultimately depends on the specific website's policies and settings.

    Rate this question:

  • 9. 

    If you have a research project about UTSA and want to know the number of students who attend which is the best search option?

    • A.

      UTSA

    • B.

      UTSA Texas

    • C.

      Enrollment at UTSA

    Correct Answer
    C. Enrollment at UTSA
    Explanation
    Enrollment at UTSA is the best search option to find the number of students who attend the university. This search term specifically focuses on the enrollment aspect, which directly relates to the number of students. UTSA and UTSA Texas may provide general information about the university but may not specifically mention the enrollment numbers. Therefore, "Enrollment at UTSA" is the most suitable search option to obtain the desired information.

    Rate this question:

  • 10. 

    I can burn copies of computer software discs for others.

    • A.

      Legal

    • B.

      Illegal

    Correct Answer
    B. Illegal
    Explanation
    Burning copies of computer software discs for others is considered illegal because it violates copyright laws. Copying and distributing software without the proper authorization from the copyright holder is a form of piracy and is against the law. It is important to respect intellectual property rights and obtain legal copies of software to support the developers and protect their work.

    Rate this question:

  • 11. 

    I can share software by installing it on several computers.

    • A.

      Legal

    • B.

      Illegal

    Correct Answer
    B. Illegal
    Explanation
    Sharing software by installing it on multiple computers without proper licensing or permission from the software owner is considered illegal. It violates copyright laws and the terms of use of the software. Unauthorized distribution of software can result in legal consequences, including fines and penalties. It is important to respect intellectual property rights and obtain the necessary licenses or permissions when sharing software.

    Rate this question:

  • 12. 

    I can post copies of computer software, songs, movies, or other copyrighted works online through social networking sites.

    • A.

      Legal

    • B.

      Illegal

    Correct Answer
    B. Illegal
    Explanation
    Posting copies of computer software, songs, movies, or other copyrighted works online without proper authorization from the copyright holder is considered illegal. Copyright laws protect the rights of creators and owners of original works, and distributing their works without permission infringes upon those rights.

    Rate this question:

  • 13. 

    I can use excerpts from a copyrighted work in a school paper without obtaining the copyright holder's permission.

    • A.

      Legal

    • B.

      Illegal

    Correct Answer
    A. Legal
    Explanation
    Using excerpts from a copyrighted work in a school paper without obtaining the copyright holder's permission is considered legal under certain circumstances. This falls under the "fair use" doctrine, which allows limited use of copyrighted material for purposes such as criticism, comment, news reporting, teaching, scholarship, or research. However, the extent of the excerpts used and the purpose of their use should be considered. It is important to properly cite the source and give credit to the copyright holder.

    Rate this question:

  • 14. 

    Illegally downloading and illegal file-sharing of software, music, and movies can result in:

    • A.

      Loss of your hard drive and all files from viruses attached to illegal downloads.

    • B.

      Loss of your monitor.

    • C.

      Loss of your keyboard.

    Correct Answer
    A. Loss of your hard drive and all files from viruses attached to illegal downloads.
    Explanation
    Illegally downloading and file-sharing software, music, and movies can result in the loss of your hard drive and all files due to viruses attached to these illegal downloads. Viruses can be hidden within the files you download, and when you open or execute them, they can infect your computer and cause damage to your hard drive and files. This is a common risk associated with engaging in illegal downloading and file-sharing activities.

    Rate this question:

  • 15. 

    A piece of programming code designed to damage a wide network of computers.

    • A.

      Virus

    • B.

      Spyware

    • C.

      Worm

    Correct Answer
    C. Worm
    Explanation
    A worm is a type of malicious computer program that is designed to replicate and spread across a network of computers. Unlike viruses, worms do not need to attach themselves to existing files or programs in order to spread. Instead, they exploit vulnerabilities in computer systems to self-replicate and spread to other computers. This makes them highly effective at quickly infecting and damaging a wide network of computers.

    Rate this question:

  • 16. 

    A piece of programming code designed to seize control of a personal computer.

    • A.

      Zombie-Bot

    • B.

      Worm

    • C.

      Keylogger

    Correct Answer
    A. Zombie-Bot
    Explanation
    A Zombie-Bot is a piece of programming code that is designed to seize control of a personal computer. It is a type of malware that infects a computer and turns it into a part of a larger network of infected computers, known as a botnet. Once a computer is infected, it can be controlled remotely by a hacker or cybercriminal to carry out various malicious activities, such as sending spam emails, launching DDoS attacks, or stealing sensitive information. Unlike a worm, which is a self-replicating malware, a Zombie-Bot requires an initial infection to spread and gain control over other computers.

    Rate this question:

  • 17. 

    Any piece of programming code designed to harm a system.

    • A.

      Keylogger

    • B.

      Malware

    • C.

      Time Bomb

    Correct Answer
    B. Malware
    Explanation
    Malware refers to any piece of programming code designed to harm a system. It is a general term that encompasses various types of malicious software, including viruses, worms, trojans, ransomware, and spyware. These programs are created with the intention of causing damage, stealing sensitive information, or gaining unauthorized access to a system. Malware can be distributed through various means, such as email attachments, malicious websites, or infected software downloads. Once installed, it can perform a range of harmful activities, such as deleting files, corrupting data, or disrupting system operations.

    Rate this question:

  • 18. 

    A piece of programming code designed to disable a computer system.

    • A.

      Keylogger

    • B.

      Time Bomb

    • C.

      Virus

    Correct Answer
    C. Virus
    Explanation
    A virus is a type of programming code that is designed to disable a computer system. It can replicate itself and spread to other computers, causing damage to files, corrupting data, and disrupting the normal functioning of the system. Unlike keyloggers and time bombs, viruses have the ability to self-replicate and spread, making them particularly harmful and dangerous.

    Rate this question:

  • 19. 

    Malicious software disguised as a useful program or computer file.

    • A.

      Keylogger

    • B.

      Trojan Horse

    • C.

      Time Bomb

    Correct Answer
    B. Trojan Horse
    Explanation
    A Trojan Horse is a type of malicious software that appears to be a useful program or file, but actually contains hidden harmful code. It tricks users into installing or executing it, giving the attacker unauthorized access to the user's computer. Unlike a keylogger, which records keystrokes, or a time bomb, which is a type of malware that is triggered at a specific time, a Trojan Horse disguises itself to deceive users and gain access to their system.

    Rate this question:

  • 20. 

    A piece of programming code designed to record and report a computer user's keystrokes.

    • A.

      Keylogger

    • B.

      Trojan Horse

    • C.

      Time Bomb

    Correct Answer
    A. Keylogger
    Explanation
    A keylogger is a type of programming code that is specifically designed to record and report a computer user's keystrokes. It is often used for malicious purposes, such as stealing sensitive information like passwords or credit card details. Keyloggers can be installed on a computer without the user's knowledge and can operate silently in the background, recording every keystroke made by the user. This information is then sent to the attacker, who can use it for their own malicious intentions.

    Rate this question:

  • 21. 

    A piece of programming code disigned to damage a computer system at some point in the future.

    • A.

      Keylogger

    • B.

      Trojan Horse

    • C.

      Time Bomb

    Correct Answer
    C. Time Bomb
    Explanation
    A time bomb is a type of malicious code that is designed to damage a computer system at a specific future time or date. It is programmed to remain dormant until the predetermined time is reached, at which point it may execute destructive actions, such as deleting files, corrupting data, or even rendering the entire system inoperable. Unlike other types of malware, a time bomb does not actively spread or replicate itself, but rather lies dormant within a system until its trigger conditions are met. This makes it a particularly dangerous and stealthy form of attack, as it can remain undetected until it is too late.

    Rate this question:

  • 22. 

    A piece of programming code designed to snoop on a computer system.

    • A.

      Spyware

    • B.

      Worm

    • C.

      Keylogger

    Correct Answer
    A. Spyware
    Explanation
    Spyware refers to a type of malicious programming code that is specifically designed to secretly monitor and gather information from a computer system without the user's consent. It is often installed without the user's knowledge and can track activities, collect personal data, and transmit it to a third party. Unlike worms and keyloggers, spyware primarily focuses on covertly spying on the user rather than spreading itself or capturing keystrokes. Therefore, the correct answer for this question is spyware.

    Rate this question:

  • 23. 

    Which application would you use to create a For Sale sign?

    • A.

      Spreadsheet

    • B.

      Database

    • C.

      Desktop Publishing

    Correct Answer
    C. Desktop Publishing
    Explanation
    Desktop Publishing software is commonly used to create visually appealing documents such as brochures, flyers, and signs. It provides a wide range of tools and features to design and layout text, images, and graphics in a professional manner. Therefore, to create a For Sale sign that is visually attractive and eye-catching, one would use Desktop Publishing software. Spreadsheet and Database applications are not designed for creating visual designs and layouts, but rather for organizing and analyzing data.

    Rate this question:

  • 24. 

    Which application would you use to write a story about your dream car?

    • A.

      Spreadsheet

    • B.

      Database

    • C.

      Word Processing

    Correct Answer
    C. Word Processing
    Explanation
    A word processing application is the most suitable choice for writing a story about your dream car. Word processing software provides a range of tools and features specifically designed for creating and editing text-based documents. It allows users to easily format text, add images, and organize content. In contrast, a spreadsheet application is primarily used for organizing and analyzing numerical data, while a database application is used for storing and managing large amounts of structured information. Therefore, a word processing application is the most appropriate choice for writing a story.

    Rate this question:

  • 25. 

    Which application would you use to balance your allowance?

    • A.

      Spreadsheet

    • B.

      Database

    • C.

      Word Processing

    Correct Answer
    A. Spreadsheet
    Explanation
    A spreadsheet application would be the best choice for balancing your allowance. Spreadsheets are designed to handle numerical data and perform calculations easily. You can create a budget sheet, input your income and expenses, and use formulas to calculate your remaining balance. Additionally, spreadsheets allow you to organize and track your financial transactions efficiently. Unlike a word processing application, which is primarily used for creating documents, or a database application, which is more suited for storing and retrieving large amounts of structured data, a spreadsheet provides the necessary tools for managing and balancing your allowance effectively.

    Rate this question:

  • 26. 

    Which application would you use to keep an address book of your friends and family?

    • A.

      Spreadsheet

    • B.

      Database

    • C.

      Word Processing

    Correct Answer
    B. Database
    Explanation
    A database would be the appropriate application to keep an address book of friends and family. Databases are designed to store and manage large amounts of structured data, making it easier to organize and search for specific information. With a database, you can create tables to store different types of data such as names, addresses, phone numbers, and other relevant details. Additionally, databases offer functionalities like sorting, filtering, and querying data, which can be helpful when managing and updating an address book. Spreadsheet and word processing applications are not specifically designed for this purpose and may not provide the same level of efficiency and organization.

    Rate this question:

  • 27. 

    Which application would you use to create a table of your TAKS scores each year and include a chart?

    • A.

      Spreadsheet

    • B.

      Database

    • C.

      Desktop Publishing

    Correct Answer
    A. Spreadsheet
    Explanation
    A spreadsheet application would be the most suitable choice for creating a table of TAKS scores each year and including a chart. Spreadsheets allow users to organize and analyze data in a tabular format, making it easy to input and manipulate scores. Additionally, spreadsheets often have built-in charting tools that enable users to create visual representations of the data, such as charts and graphs. This makes it convenient to present the TAKS scores in a visually appealing and easily understandable manner. A database application is more appropriate for storing and managing large amounts of structured data, while desktop publishing is used for creating documents with complex layouts and designs.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 14, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 04, 2010
    Quiz Created by
    Bfigueroa
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.