1.
To start a new message click on Compose.
Correct Answer
A. True
Explanation
The given correct answer is "True". This suggests that in order to start a new message, one needs to click on the "Compose" button. This implies that there is a specific action required to initiate the creation of a new message, which is clicking on the "Compose" option.
2.
If your friend, Enzo, sent you a message and you want to send the message to another friend, Fred, click on reply.
Correct Answer
B. False
Explanation
The statement is false because if Enzo sent you a message and you want to send it to Fred, you should click on "forward" instead of "reply". "Reply" is used to respond directly to the sender of the message, not to forward it to someone else.
3.
To send a picture click on attach.
Correct Answer
A. True
Explanation
The given answer is true because to send a picture, you need to click on the attach button. This implies that the action of sending a picture requires the user to click on the attach button in order to select and attach the desired picture file.
4.
Today, copyright laws apply as soon as work is created. There is no need to mark the work with a copyright symbol.
Correct Answer
A. True
Explanation
Copyright laws automatically protect original works of authorship as soon as they are created in a fixed form, such as writing, music, or art. The use of a copyright symbol (©) is not required for the work to be protected. Therefore, the statement that copyright laws apply as soon as work is created and there is no need to mark the work with a copyright symbol is true.
5.
Copyright violators cannot be sued or prosecuted.
Correct Answer
B. False
Explanation
This statement is false. Copyright violators can indeed be sued or prosecuted for their actions. Copyright laws are in place to protect the rights of creators and owners of original works, and violations of these laws can lead to legal consequences such as fines or imprisonment. Therefore, it is incorrect to say that copyright violators cannot be sued or prosecuted.
6.
What is the box callled where you type your message?
Correct Answer
B. Message Box
Explanation
The box where you type your message is called the message box.
7.
What two things can you do after you type your message?
Correct Answer
A. Send or Save Draft
Explanation
After typing a message, you have the option to either send it immediately or save it as a draft for later. This allows you to either send the message right away or save it and come back to it at a later time to review, edit, and send it. The option to delete the message is not mentioned, so it is not one of the available actions after typing the message.
8.
Can other people comment back on blogs?
Correct Answer
C. Yes, unless the website allows restrictions
Explanation
The answer is "Yes, unless the website allows restrictions" because in general, most blogs allow comments from other people. However, some websites may have restrictions in place that prevent users from commenting. These restrictions could be due to various reasons such as preventing spam, maintaining a certain level of content quality, or avoiding inappropriate or offensive comments. Therefore, while commenting on blogs is generally allowed, it ultimately depends on the specific website's policies and settings.
9.
If you have a research project about UTSA and want to know the number of students who attend which is the best search option?
Correct Answer
C. Enrollment at UTSA
Explanation
Enrollment at UTSA is the best search option to find the number of students who attend the university. This search term specifically focuses on the enrollment aspect, which directly relates to the number of students. UTSA and UTSA Texas may provide general information about the university but may not specifically mention the enrollment numbers. Therefore, "Enrollment at UTSA" is the most suitable search option to obtain the desired information.
10.
I can burn copies of computer software discs for others.
Correct Answer
B. Illegal
Explanation
Burning copies of computer software discs for others is considered illegal because it violates copyright laws. Copying and distributing software without the proper authorization from the copyright holder is a form of piracy and is against the law. It is important to respect intellectual property rights and obtain legal copies of software to support the developers and protect their work.
11.
I can share software by installing it on several computers.
Correct Answer
B. Illegal
Explanation
Sharing software by installing it on multiple computers without proper licensing or permission from the software owner is considered illegal. It violates copyright laws and the terms of use of the software. Unauthorized distribution of software can result in legal consequences, including fines and penalties. It is important to respect intellectual property rights and obtain the necessary licenses or permissions when sharing software.
12.
I can post copies of computer software, songs, movies, or other copyrighted works online through social networking sites.
Correct Answer
B. Illegal
Explanation
Posting copies of computer software, songs, movies, or other copyrighted works online without proper authorization from the copyright holder is considered illegal. Copyright laws protect the rights of creators and owners of original works, and distributing their works without permission infringes upon those rights.
13.
I can use excerpts from a copyrighted work in a school paper without obtaining the copyright holder's permission.
Correct Answer
A. Legal
Explanation
Using excerpts from a copyrighted work in a school paper without obtaining the copyright holder's permission is considered legal under certain circumstances. This falls under the "fair use" doctrine, which allows limited use of copyrighted material for purposes such as criticism, comment, news reporting, teaching, scholarship, or research. However, the extent of the excerpts used and the purpose of their use should be considered. It is important to properly cite the source and give credit to the copyright holder.
14.
Illegally downloading and illegal file-sharing of software, music, and movies can result in:
Correct Answer
A. Loss of your hard drive and all files from viruses attached to illegal downloads.
Explanation
Illegally downloading and file-sharing software, music, and movies can result in the loss of your hard drive and all files due to viruses attached to these illegal downloads. Viruses can be hidden within the files you download, and when you open or execute them, they can infect your computer and cause damage to your hard drive and files. This is a common risk associated with engaging in illegal downloading and file-sharing activities.
15.
A piece of programming code designed to damage a wide network of computers.
Correct Answer
C. Worm
Explanation
A worm is a type of malicious computer program that is designed to replicate and spread across a network of computers. Unlike viruses, worms do not need to attach themselves to existing files or programs in order to spread. Instead, they exploit vulnerabilities in computer systems to self-replicate and spread to other computers. This makes them highly effective at quickly infecting and damaging a wide network of computers.
16.
A piece of programming code designed to seize control of a personal computer.
Correct Answer
A. Zombie-Bot
Explanation
A Zombie-Bot is a piece of programming code that is designed to seize control of a personal computer. It is a type of malware that infects a computer and turns it into a part of a larger network of infected computers, known as a botnet. Once a computer is infected, it can be controlled remotely by a hacker or cybercriminal to carry out various malicious activities, such as sending spam emails, launching DDoS attacks, or stealing sensitive information. Unlike a worm, which is a self-replicating malware, a Zombie-Bot requires an initial infection to spread and gain control over other computers.
17.
Any piece of programming code designed to harm a system.
Correct Answer
B. Malware
Explanation
Malware refers to any piece of programming code designed to harm a system. It is a general term that encompasses various types of malicious software, including viruses, worms, trojans, ransomware, and spyware. These programs are created with the intention of causing damage, stealing sensitive information, or gaining unauthorized access to a system. Malware can be distributed through various means, such as email attachments, malicious websites, or infected software downloads. Once installed, it can perform a range of harmful activities, such as deleting files, corrupting data, or disrupting system operations.
18.
A piece of programming code designed to disable a computer system.
Correct Answer
C. Virus
Explanation
A virus is a type of programming code that is designed to disable a computer system. It can replicate itself and spread to other computers, causing damage to files, corrupting data, and disrupting the normal functioning of the system. Unlike keyloggers and time bombs, viruses have the ability to self-replicate and spread, making them particularly harmful and dangerous.
19.
Malicious software disguised as a useful program or computer file.
Correct Answer
B. Trojan Horse
Explanation
A Trojan Horse is a type of malicious software that appears to be a useful program or file, but actually contains hidden harmful code. It tricks users into installing or executing it, giving the attacker unauthorized access to the user's computer. Unlike a keylogger, which records keystrokes, or a time bomb, which is a type of malware that is triggered at a specific time, a Trojan Horse disguises itself to deceive users and gain access to their system.
20.
A piece of programming code designed to record and report a computer user's keystrokes.
Correct Answer
A. Keylogger
Explanation
A keylogger is a type of programming code that is specifically designed to record and report a computer user's keystrokes. It is often used for malicious purposes, such as stealing sensitive information like passwords or credit card details. Keyloggers can be installed on a computer without the user's knowledge and can operate silently in the background, recording every keystroke made by the user. This information is then sent to the attacker, who can use it for their own malicious intentions.
21.
A piece of programming code disigned to damage a computer system at some point in the future.
Correct Answer
C. Time Bomb
Explanation
A time bomb is a type of malicious code that is designed to damage a computer system at a specific future time or date. It is programmed to remain dormant until the predetermined time is reached, at which point it may execute destructive actions, such as deleting files, corrupting data, or even rendering the entire system inoperable. Unlike other types of malware, a time bomb does not actively spread or replicate itself, but rather lies dormant within a system until its trigger conditions are met. This makes it a particularly dangerous and stealthy form of attack, as it can remain undetected until it is too late.
22.
A piece of programming code designed to snoop on a computer system.
Correct Answer
A. Spyware
Explanation
Spyware refers to a type of malicious programming code that is specifically designed to secretly monitor and gather information from a computer system without the user's consent. It is often installed without the user's knowledge and can track activities, collect personal data, and transmit it to a third party. Unlike worms and keyloggers, spyware primarily focuses on covertly spying on the user rather than spreading itself or capturing keystrokes. Therefore, the correct answer for this question is spyware.
23.
Which application would you use to create a For Sale sign?
Correct Answer
C. Desktop Publishing
Explanation
Desktop Publishing software is commonly used to create visually appealing documents such as brochures, flyers, and signs. It provides a wide range of tools and features to design and layout text, images, and graphics in a professional manner. Therefore, to create a For Sale sign that is visually attractive and eye-catching, one would use Desktop Publishing software. Spreadsheet and Database applications are not designed for creating visual designs and layouts, but rather for organizing and analyzing data.
24.
Which application would you use to write a story about your dream car?
Correct Answer
C. Word Processing
Explanation
A word processing application is the most suitable choice for writing a story about your dream car. Word processing software provides a range of tools and features specifically designed for creating and editing text-based documents. It allows users to easily format text, add images, and organize content. In contrast, a spreadsheet application is primarily used for organizing and analyzing numerical data, while a database application is used for storing and managing large amounts of structured information. Therefore, a word processing application is the most appropriate choice for writing a story.
25.
Which application would you use to balance your allowance?
Correct Answer
A. Spreadsheet
Explanation
A spreadsheet application would be the best choice for balancing your allowance. Spreadsheets are designed to handle numerical data and perform calculations easily. You can create a budget sheet, input your income and expenses, and use formulas to calculate your remaining balance. Additionally, spreadsheets allow you to organize and track your financial transactions efficiently. Unlike a word processing application, which is primarily used for creating documents, or a database application, which is more suited for storing and retrieving large amounts of structured data, a spreadsheet provides the necessary tools for managing and balancing your allowance effectively.
26.
Which application would you use to keep an address book of your friends and family?
Correct Answer
B. Database
Explanation
A database would be the appropriate application to keep an address book of friends and family. Databases are designed to store and manage large amounts of structured data, making it easier to organize and search for specific information. With a database, you can create tables to store different types of data such as names, addresses, phone numbers, and other relevant details. Additionally, databases offer functionalities like sorting, filtering, and querying data, which can be helpful when managing and updating an address book. Spreadsheet and word processing applications are not specifically designed for this purpose and may not provide the same level of efficiency and organization.
27.
Which application would you use to create a table of your TAKS scores each year and include a chart?
Correct Answer
A. Spreadsheet
Explanation
A spreadsheet application would be the most suitable choice for creating a table of TAKS scores each year and including a chart. Spreadsheets allow users to organize and analyze data in a tabular format, making it easy to input and manipulate scores. Additionally, spreadsheets often have built-in charting tools that enable users to create visual representations of the data, such as charts and graphs. This makes it convenient to present the TAKS scores in a visually appealing and easily understandable manner. A database application is more appropriate for storing and managing large amounts of structured data, while desktop publishing is used for creating documents with complex layouts and designs.