Deck 14: Digital Ethics and Lifestyle

ملء الشاشة (f)
exit full mode
سؤال
Hunter has dyslexia and struggles to understand text when he reads it to himself. It seems assigned class readings always make more sense when someone else reads them to him. What tool can help Hunter study more independently?

A)Alternative keyboard
B)Screen reader
C)Alt text
D)Screen magnifier
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Genevieve loves playing video games with friends on her Xbox connected to her TV. However, she's careful to get up, stretch, and walk around at least once every hour. What problem is this habit most likely helping her avoid?

A)Text neck
B)Technology addiction
C)Accidental falls
D)Repetitive strain injury
سؤال
Which of the following problematic behaviors relies on the use of digital technology?

A)Harassment
B)Cyberbullying
C)Repetitive strain injuries
D)Distracted driving
سؤال
When Hafsa writes a research paper for her psychology class, ________________ allow(s)her to quote small portions of a research study published by an industry leading expert without asking his permission first.

A)copyright
B)digital rights management (DRM)
C)intellectual property rights
D)the fair use doctrine
سؤال
Edward shares a blog post on social media that says the Centers for Disease Control (CDC)has changed their recommendation for flu shots. He is quickly bombarded by other people saying his information is wrong. What did Edward fail to do?

A)Check the blog post for bad grammar.
B)Post an opposing point of view to maintain balance.
C)Check the blog post for accessibility features, such as alt text.
D)Verify the content with an authoritative source.
سؤال
Bruce realizes he's getting a cramp in his neck after texting with his buddy for several minutes. He puts the phone down and takes his dog for a walk. This is an example of ____________.

A)digital literacy
B)digital etiquette
C)digital security
D)digital citizenship
سؤال
Josie is scrolling through her social media newsfeed when she sees a photo of her that a friend posted. The photo is embarrassing and was taken without Josie's knowledge when she was staying at the friend's house. Josie requests the photo be taken down. Josie is managing her own ___________.

A)public domain
B)digital footprint
C)data breach
D)netiquette
سؤال
Kristy just received a laptop from her employer so she can work from home. She wonders if she can also use the laptop for personal activity, such as streaming movies. What documentation should Kristy check to find the answer to her question?

A)Acceptable use policy (AUP)
B)Knowledge base
C)Code of conduct
D)Warranty
سؤال
Curtis decided to leave his smartphone in his car as he heads out for a day long hike. This is an example of a ______________.

A)digital detox
B)technology addiction
C)digital footprint
D)repetitive strain injury
سؤال
Brad donates his old phone to a nearby charity, which refurbishes phones and offers them at no cost to challenged populations in the area. These people can use the free phones to help them find housing, employment, and other community resources. This program supports ______________.

A)digital inclusion
B)the Internet of Things (IoT)
C)an acceptable use policy (AUP)
D)the digital divide
سؤال
Jason is reading a novel for school on his e-reader. He tries to print a portion of the novel so he can share it with a classmate who lost her copy. However, the e-reader will not allow the book to be printed. What content protection measure is preventing Jason from printing?

A)Digital rights management (DRM)
B)Public domain
C)Copyright
D)Fair use doctrine
سؤال
Maisie doesn't limit her time watching enjoyable and relaxing shows on her laptop in the evenings after work and on the weekends because technology has an entirely wholesome effect without any risks.
سؤال
Francis closely monitors customer reviews on Google for his landscaping business. Most customers post high praise for his work; however, today he discovered an extremely negative review posted by someone claiming the name "Superman." Clearly, this is a fake name, and Francis has no way of following up with the person to determine what he can do to resolve the problem or even to know if it's a real customer. This is an example of __________.

A)software piracy
B)spamming
C)plagiarism
D)catfishing
سؤال
A person who does not own a laptop or smartphone is not a digital citizen and so does not need to be concerned about digital ethics.
سؤال
Paige is designing a web page that will contain instructions for how to use a new web conferencing tool at her work. She formats best practice tips in green, and she formats warning information in red. Which employees might struggle with this formatting?

A)People with visual impairments using screen magnifiers
B)People reading the web page on their smartphones
C)People with color blindness
D)People with hearing impairments
سؤال
Laney just bought a new smartphone. She's already downloaded her contacts information and other data from the cloud. Now she's copying her photos from her old phone onto the new device. Once her new phone has all her data, what should she do next with the old phone?

A)Reset the old phone to factory settings.
B)Donate the old phone to a nonprofit organization for refurbishing.
C)Throw away the old phone.
D)Create a backup of all data on the old phone.
سؤال
During a regional state of emergency, an Internet service provider offered three months of free Internet access to anyone affected by the crisis. This effort was intended to help reduce the impact of ___________.

A)digital inclusion
B)data breaches
C)the digital divide
D)digital access
سؤال
Bailey reads wikis at the beginning of his research project to get his bearings on the topic. He switches to peer-reviewed journals and professional publications for his formal sources. Why does Bailey not use wikis as formal sources?

A)No one is familiar with wikis.
B)Wikis can be heavily biased.
C)Users can post false information in wikis.
D)Experienced editors verify changes made to wiki articles.
سؤال
Marley stayed up late to watch the planet Mars rise in the east. She had read online that Mars was unusually close to the Earth in its orbit and would look nearly as large as the moon. However, she only saw stars, and the next morning she ended up oversleeping because of her late bedtime. Marley was the victim of __________.

A)distracted driving
B)a data breach
C)a hoax
D)the digital divide
سؤال
What rules should guide your behavior when you interact with friends and coworkers on social media?

A)Netiquette
B)Code of conduct
C)Acceptable use policy (AUP)
D)Digital inclusion
سؤال
Nina wants to find a list of vegan restaurants in the city she is visiting over the weekend. Which of the following websites can she use to find this information?

A)Yahoo
B)Gmail
C)Encyclopedia Britannica
D)Wikipedia
سؤال
The direction in which text is printed on a page is called style. ?
سؤال
Which of the following statements is NOT true about network standards?

A)The way computers access a network is related to the network standard.
B)Network standards specify the types of hardware used.
C)Network standards determine data transmission speeds.
D)Computers and devices successfully communicate on networks regardless of the standards used.
سؤال
The technology field has become rather elite, only hiring those with extreme talent in game design and Internet security.
سؤال
For keywords pertaining to academic research, Google returns more relevant and reliable results than Google Scholar, since Google Scholar is a subsidiary of Google.
سؤال
Rita is designing a digital card on her cellphone for her mother's birthday. She wants to crop out certain portions of her mother's photograph to use on the card. Which of these apps can she use to do this?

A)Chrome
B)Google Docs
C)Excel
D)Fotor
سؤال
If you do not know how to code or design a website from scratch, then which of the following could you do instead?

A)Use a website builder such as Google Sites.
B)Use a search engine optimization tool to write the code for publication.
C)Contract with a vendor to use uptime for a true measure of your coding skills.
D)Use an FTP client with XML to transfer files from your home computer to your school work station to receive help.
سؤال
What type of cyberattack is used to trick a user into giving valuable information to an attacker?

A)Malware
B)Trojans
C)Cyberbullying
D)Social engineering
سؤال
Using speech recognition software, a device can identify the words in your speech and display them on the screen.
سؤال
Bernie is an aspiring video game developer. Learning which of the following software would benefit him the most?

A)Computer-aided design software
B)Sampling software
C)3-D animation software
D)System software
سؤال
A plugin is an enhanced text editor that has additional features to write code accurately and efficiently.
سؤال
If you want to be sure you are practicing green computing, which of the following would be something you would do?

A)Throw old computers away at the dump.
B)Get the latest smartphone when it is released.
C)Buy devices with high power consumption.
D)Shut down your computer overnight.
سؤال
You can use a cloud server to back up your data.
سؤال
Every program or app requires RAM, which is the volatile and temporary storage location for open apps and data.
سؤال
Which of the following is NOT a responsible way to dispose of an old smartphone after removing your data from the device?

A)Donate it to a charity.
B)Remove the battery and throw it in the trash.
C)Trade it for credit at a technology store.
D)Take it to a recycling facility.
سؤال
In which phase of the software development life cycle do you acquire the necessary hardware and programming languages for the project?

A)Planning
B)Implementation
C)Design
D)Support and security
سؤال
Which of the following is NOT computer hardware?

A)Printer
B)Device driver
C)Mouse
D)Central processing unit
سؤال
A scanner is a type of computer hardware.
سؤال
Development i s the process of creating programs and apps from the idea stage to distribution to users.
سؤال
What type of system software manages memory?

A)operating system
B)screen saver
C)memory stick
D)file manager
سؤال
Digital media content like animations, video, and audio are stored as bits and bytes.
سؤال
Technology is used today in manufacturing, health care, and the transportation industry, but education has not yet embraced it.
سؤال
Phishing emails are disguised as emails from a trusted source and sent by hackers; they deceive the recipient by getting them to reveal personal or financial information.
سؤال
Which of the following do not use a central processing unit for computation?

A)Laptop
B)Smartphone
C)Scanner
D)Tablet
سؤال
When you purchase a device, system software is already loaded on it. Which of the following system software settings can you customize?

A)Screen resolution
B)Amount of RAM and ROM
C)Keyboard width
D)Number of USB ports
سؤال
To develop a website, you can use the following technologies EXCEPT _____.

A)HTML
B)CSS
C)Microsoft Word
D)JavaScript
سؤال
What can you use to scramble information so that it cannot be read unless the user possesses a key?

A)A password
B)Encryption
C)Two-factor authentication
D)A digital certificate
سؤال
A webpage is an electronic document that can contain text, graphics, sound, video, and links to other webpages. ​
سؤال
Which of the following is an example of digital media?

A)X-Ray images
B)Virtual reality
C)Magazines
D)Camera photographic film
سؤال
The practice of social curation is when a website provides links to other relevant websites in its field.
سؤال
Which of the following is system software?

A)Operating system
B)Microsoft Office
C)Browser
D)Chat app
سؤال
A program is a set of coded instructions written for a computer or mobile device, such as an operating system program or an application program.
سؤال
Mya needs to make an online payment to buy a book on an e-commerce website that she accesses on the Chrome browser. Which of the following website features should make her question its security?

A)An icon that indicates a secure connection
B)"https" in the URL
C)Requirement to sign in with a username and password
D)Absence of a lock icon in her browser window
سؤال
Computer hardware includes internal and external electronic devices connected to the computer.
سؤال
To work with a web app, you use your browser on a computer or mobile device.
سؤال
Julio needs to write a report and develop a budget for his job. What type of apps should he use to complete these tasks?

A)Personal interest apps
B)Productivity apps
C)Device management apps
D)Navigation apps
سؤال
When you think about your typical day, which of the following tasks would NOT involve technology?

A)Using an app to order your coffee.
B)Turning off your alarm on your phone.
C)Running three miles with the dog.
D)Responding to your child's teacher's email.
سؤال
Once you save a file to a location, it is permanent and cannot be moved.
سؤال
The greatest risk in using computers and smartphones comes from electronic waste.
سؤال
Which of the following is true about video conferences?

A)A video conference involves only one-way communication.
B)A video conference opens with an About page that includes directions, an agenda, and a poll.
C)A video conference always allows participants to see and hear each other.
D)A video conference is easily identifiable by its domain name and provider.
سؤال
If someone has become very attached to their mobile device and feels anxious if they cannot connect to the Internet, what are they experiencing?

A)Technology anxiety
B)Technology addiction
C)Technology empathy
D)Technology overload
سؤال
Twitter, Tumblr, Facebook, Snapchat, and Instagram are all examples of microblogging websites.
سؤال
What device connects a network to the Internet through an Internet service provider?

A)A protocol
B)A modem
C)A hub
D)A server
سؤال
A webpage is a document that contains codes, or _____, written in HTML to describe the content on the page.

A)styles
B)tags
C)attributes
D)variables
سؤال
Malware can install itself only with your permission but once installed, it can damage or steal data on your computer or device.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/65
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Digital Ethics and Lifestyle
1
Hunter has dyslexia and struggles to understand text when he reads it to himself. It seems assigned class readings always make more sense when someone else reads them to him. What tool can help Hunter study more independently?

A)Alternative keyboard
B)Screen reader
C)Alt text
D)Screen magnifier
Screen reader
2
Genevieve loves playing video games with friends on her Xbox connected to her TV. However, she's careful to get up, stretch, and walk around at least once every hour. What problem is this habit most likely helping her avoid?

A)Text neck
B)Technology addiction
C)Accidental falls
D)Repetitive strain injury
Repetitive strain injury
3
Which of the following problematic behaviors relies on the use of digital technology?

A)Harassment
B)Cyberbullying
C)Repetitive strain injuries
D)Distracted driving
Cyberbullying
4
When Hafsa writes a research paper for her psychology class, ________________ allow(s)her to quote small portions of a research study published by an industry leading expert without asking his permission first.

A)copyright
B)digital rights management (DRM)
C)intellectual property rights
D)the fair use doctrine
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
5
Edward shares a blog post on social media that says the Centers for Disease Control (CDC)has changed their recommendation for flu shots. He is quickly bombarded by other people saying his information is wrong. What did Edward fail to do?

A)Check the blog post for bad grammar.
B)Post an opposing point of view to maintain balance.
C)Check the blog post for accessibility features, such as alt text.
D)Verify the content with an authoritative source.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
6
Bruce realizes he's getting a cramp in his neck after texting with his buddy for several minutes. He puts the phone down and takes his dog for a walk. This is an example of ____________.

A)digital literacy
B)digital etiquette
C)digital security
D)digital citizenship
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
7
Josie is scrolling through her social media newsfeed when she sees a photo of her that a friend posted. The photo is embarrassing and was taken without Josie's knowledge when she was staying at the friend's house. Josie requests the photo be taken down. Josie is managing her own ___________.

A)public domain
B)digital footprint
C)data breach
D)netiquette
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
8
Kristy just received a laptop from her employer so she can work from home. She wonders if she can also use the laptop for personal activity, such as streaming movies. What documentation should Kristy check to find the answer to her question?

A)Acceptable use policy (AUP)
B)Knowledge base
C)Code of conduct
D)Warranty
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
9
Curtis decided to leave his smartphone in his car as he heads out for a day long hike. This is an example of a ______________.

A)digital detox
B)technology addiction
C)digital footprint
D)repetitive strain injury
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
10
Brad donates his old phone to a nearby charity, which refurbishes phones and offers them at no cost to challenged populations in the area. These people can use the free phones to help them find housing, employment, and other community resources. This program supports ______________.

A)digital inclusion
B)the Internet of Things (IoT)
C)an acceptable use policy (AUP)
D)the digital divide
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
11
Jason is reading a novel for school on his e-reader. He tries to print a portion of the novel so he can share it with a classmate who lost her copy. However, the e-reader will not allow the book to be printed. What content protection measure is preventing Jason from printing?

A)Digital rights management (DRM)
B)Public domain
C)Copyright
D)Fair use doctrine
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
12
Maisie doesn't limit her time watching enjoyable and relaxing shows on her laptop in the evenings after work and on the weekends because technology has an entirely wholesome effect without any risks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
13
Francis closely monitors customer reviews on Google for his landscaping business. Most customers post high praise for his work; however, today he discovered an extremely negative review posted by someone claiming the name "Superman." Clearly, this is a fake name, and Francis has no way of following up with the person to determine what he can do to resolve the problem or even to know if it's a real customer. This is an example of __________.

A)software piracy
B)spamming
C)plagiarism
D)catfishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
14
A person who does not own a laptop or smartphone is not a digital citizen and so does not need to be concerned about digital ethics.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
15
Paige is designing a web page that will contain instructions for how to use a new web conferencing tool at her work. She formats best practice tips in green, and she formats warning information in red. Which employees might struggle with this formatting?

A)People with visual impairments using screen magnifiers
B)People reading the web page on their smartphones
C)People with color blindness
D)People with hearing impairments
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
16
Laney just bought a new smartphone. She's already downloaded her contacts information and other data from the cloud. Now she's copying her photos from her old phone onto the new device. Once her new phone has all her data, what should she do next with the old phone?

A)Reset the old phone to factory settings.
B)Donate the old phone to a nonprofit organization for refurbishing.
C)Throw away the old phone.
D)Create a backup of all data on the old phone.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
17
During a regional state of emergency, an Internet service provider offered three months of free Internet access to anyone affected by the crisis. This effort was intended to help reduce the impact of ___________.

A)digital inclusion
B)data breaches
C)the digital divide
D)digital access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
18
Bailey reads wikis at the beginning of his research project to get his bearings on the topic. He switches to peer-reviewed journals and professional publications for his formal sources. Why does Bailey not use wikis as formal sources?

A)No one is familiar with wikis.
B)Wikis can be heavily biased.
C)Users can post false information in wikis.
D)Experienced editors verify changes made to wiki articles.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
19
Marley stayed up late to watch the planet Mars rise in the east. She had read online that Mars was unusually close to the Earth in its orbit and would look nearly as large as the moon. However, she only saw stars, and the next morning she ended up oversleeping because of her late bedtime. Marley was the victim of __________.

A)distracted driving
B)a data breach
C)a hoax
D)the digital divide
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
20
What rules should guide your behavior when you interact with friends and coworkers on social media?

A)Netiquette
B)Code of conduct
C)Acceptable use policy (AUP)
D)Digital inclusion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
21
Nina wants to find a list of vegan restaurants in the city she is visiting over the weekend. Which of the following websites can she use to find this information?

A)Yahoo
B)Gmail
C)Encyclopedia Britannica
D)Wikipedia
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
22
The direction in which text is printed on a page is called style. ?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following statements is NOT true about network standards?

A)The way computers access a network is related to the network standard.
B)Network standards specify the types of hardware used.
C)Network standards determine data transmission speeds.
D)Computers and devices successfully communicate on networks regardless of the standards used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
24
The technology field has become rather elite, only hiring those with extreme talent in game design and Internet security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
25
For keywords pertaining to academic research, Google returns more relevant and reliable results than Google Scholar, since Google Scholar is a subsidiary of Google.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
26
Rita is designing a digital card on her cellphone for her mother's birthday. She wants to crop out certain portions of her mother's photograph to use on the card. Which of these apps can she use to do this?

A)Chrome
B)Google Docs
C)Excel
D)Fotor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
27
If you do not know how to code or design a website from scratch, then which of the following could you do instead?

A)Use a website builder such as Google Sites.
B)Use a search engine optimization tool to write the code for publication.
C)Contract with a vendor to use uptime for a true measure of your coding skills.
D)Use an FTP client with XML to transfer files from your home computer to your school work station to receive help.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
28
What type of cyberattack is used to trick a user into giving valuable information to an attacker?

A)Malware
B)Trojans
C)Cyberbullying
D)Social engineering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
29
Using speech recognition software, a device can identify the words in your speech and display them on the screen.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
30
Bernie is an aspiring video game developer. Learning which of the following software would benefit him the most?

A)Computer-aided design software
B)Sampling software
C)3-D animation software
D)System software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
31
A plugin is an enhanced text editor that has additional features to write code accurately and efficiently.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
32
If you want to be sure you are practicing green computing, which of the following would be something you would do?

A)Throw old computers away at the dump.
B)Get the latest smartphone when it is released.
C)Buy devices with high power consumption.
D)Shut down your computer overnight.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
33
You can use a cloud server to back up your data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
34
Every program or app requires RAM, which is the volatile and temporary storage location for open apps and data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which of the following is NOT a responsible way to dispose of an old smartphone after removing your data from the device?

A)Donate it to a charity.
B)Remove the battery and throw it in the trash.
C)Trade it for credit at a technology store.
D)Take it to a recycling facility.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
36
In which phase of the software development life cycle do you acquire the necessary hardware and programming languages for the project?

A)Planning
B)Implementation
C)Design
D)Support and security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following is NOT computer hardware?

A)Printer
B)Device driver
C)Mouse
D)Central processing unit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
38
A scanner is a type of computer hardware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
39
Development i s the process of creating programs and apps from the idea stage to distribution to users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
40
What type of system software manages memory?

A)operating system
B)screen saver
C)memory stick
D)file manager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
41
Digital media content like animations, video, and audio are stored as bits and bytes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
42
Technology is used today in manufacturing, health care, and the transportation industry, but education has not yet embraced it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
43
Phishing emails are disguised as emails from a trusted source and sent by hackers; they deceive the recipient by getting them to reveal personal or financial information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
44
Which of the following do not use a central processing unit for computation?

A)Laptop
B)Smartphone
C)Scanner
D)Tablet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
45
When you purchase a device, system software is already loaded on it. Which of the following system software settings can you customize?

A)Screen resolution
B)Amount of RAM and ROM
C)Keyboard width
D)Number of USB ports
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
46
To develop a website, you can use the following technologies EXCEPT _____.

A)HTML
B)CSS
C)Microsoft Word
D)JavaScript
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
47
What can you use to scramble information so that it cannot be read unless the user possesses a key?

A)A password
B)Encryption
C)Two-factor authentication
D)A digital certificate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
48
A webpage is an electronic document that can contain text, graphics, sound, video, and links to other webpages. ​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which of the following is an example of digital media?

A)X-Ray images
B)Virtual reality
C)Magazines
D)Camera photographic film
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
50
The practice of social curation is when a website provides links to other relevant websites in its field.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
51
Which of the following is system software?

A)Operating system
B)Microsoft Office
C)Browser
D)Chat app
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
52
A program is a set of coded instructions written for a computer or mobile device, such as an operating system program or an application program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
53
Mya needs to make an online payment to buy a book on an e-commerce website that she accesses on the Chrome browser. Which of the following website features should make her question its security?

A)An icon that indicates a secure connection
B)"https" in the URL
C)Requirement to sign in with a username and password
D)Absence of a lock icon in her browser window
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
54
Computer hardware includes internal and external electronic devices connected to the computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
55
To work with a web app, you use your browser on a computer or mobile device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
56
Julio needs to write a report and develop a budget for his job. What type of apps should he use to complete these tasks?

A)Personal interest apps
B)Productivity apps
C)Device management apps
D)Navigation apps
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
57
When you think about your typical day, which of the following tasks would NOT involve technology?

A)Using an app to order your coffee.
B)Turning off your alarm on your phone.
C)Running three miles with the dog.
D)Responding to your child's teacher's email.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
58
Once you save a file to a location, it is permanent and cannot be moved.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
59
The greatest risk in using computers and smartphones comes from electronic waste.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
60
Which of the following is true about video conferences?

A)A video conference involves only one-way communication.
B)A video conference opens with an About page that includes directions, an agenda, and a poll.
C)A video conference always allows participants to see and hear each other.
D)A video conference is easily identifiable by its domain name and provider.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
61
If someone has become very attached to their mobile device and feels anxious if they cannot connect to the Internet, what are they experiencing?

A)Technology anxiety
B)Technology addiction
C)Technology empathy
D)Technology overload
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
62
Twitter, Tumblr, Facebook, Snapchat, and Instagram are all examples of microblogging websites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
63
What device connects a network to the Internet through an Internet service provider?

A)A protocol
B)A modem
C)A hub
D)A server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
64
A webpage is a document that contains codes, or _____, written in HTML to describe the content on the page.

A)styles
B)tags
C)attributes
D)variables
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
65
Malware can install itself only with your permission but once installed, it can damage or steal data on your computer or device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 65 في هذه المجموعة.