Deck 14: Digital Ethics and Lifestyle

Full screen (f)
exit full mode
Question
Hunter has dyslexia and struggles to understand text when he reads it to himself. It seems assigned class readings always make more sense when someone else reads them to him. What tool can help Hunter study more independently?

A)Alternative keyboard
B)Screen reader
C)Alt text
D)Screen magnifier
Use Space or
up arrow
down arrow
to flip the card.
Question
Genevieve loves playing video games with friends on her Xbox connected to her TV. However, she's careful to get up, stretch, and walk around at least once every hour. What problem is this habit most likely helping her avoid?

A)Text neck
B)Technology addiction
C)Accidental falls
D)Repetitive strain injury
Question
Which of the following problematic behaviors relies on the use of digital technology?

A)Harassment
B)Cyberbullying
C)Repetitive strain injuries
D)Distracted driving
Question
When Hafsa writes a research paper for her psychology class, ________________ allow(s)her to quote small portions of a research study published by an industry leading expert without asking his permission first.

A)copyright
B)digital rights management (DRM)
C)intellectual property rights
D)the fair use doctrine
Question
Edward shares a blog post on social media that says the Centers for Disease Control (CDC)has changed their recommendation for flu shots. He is quickly bombarded by other people saying his information is wrong. What did Edward fail to do?

A)Check the blog post for bad grammar.
B)Post an opposing point of view to maintain balance.
C)Check the blog post for accessibility features, such as alt text.
D)Verify the content with an authoritative source.
Question
Bruce realizes he's getting a cramp in his neck after texting with his buddy for several minutes. He puts the phone down and takes his dog for a walk. This is an example of ____________.

A)digital literacy
B)digital etiquette
C)digital security
D)digital citizenship
Question
Josie is scrolling through her social media newsfeed when she sees a photo of her that a friend posted. The photo is embarrassing and was taken without Josie's knowledge when she was staying at the friend's house. Josie requests the photo be taken down. Josie is managing her own ___________.

A)public domain
B)digital footprint
C)data breach
D)netiquette
Question
Kristy just received a laptop from her employer so she can work from home. She wonders if she can also use the laptop for personal activity, such as streaming movies. What documentation should Kristy check to find the answer to her question?

A)Acceptable use policy (AUP)
B)Knowledge base
C)Code of conduct
D)Warranty
Question
Curtis decided to leave his smartphone in his car as he heads out for a day long hike. This is an example of a ______________.

A)digital detox
B)technology addiction
C)digital footprint
D)repetitive strain injury
Question
Brad donates his old phone to a nearby charity, which refurbishes phones and offers them at no cost to challenged populations in the area. These people can use the free phones to help them find housing, employment, and other community resources. This program supports ______________.

A)digital inclusion
B)the Internet of Things (IoT)
C)an acceptable use policy (AUP)
D)the digital divide
Question
Jason is reading a novel for school on his e-reader. He tries to print a portion of the novel so he can share it with a classmate who lost her copy. However, the e-reader will not allow the book to be printed. What content protection measure is preventing Jason from printing?

A)Digital rights management (DRM)
B)Public domain
C)Copyright
D)Fair use doctrine
Question
Maisie doesn't limit her time watching enjoyable and relaxing shows on her laptop in the evenings after work and on the weekends because technology has an entirely wholesome effect without any risks.
Question
Francis closely monitors customer reviews on Google for his landscaping business. Most customers post high praise for his work; however, today he discovered an extremely negative review posted by someone claiming the name "Superman." Clearly, this is a fake name, and Francis has no way of following up with the person to determine what he can do to resolve the problem or even to know if it's a real customer. This is an example of __________.

A)software piracy
B)spamming
C)plagiarism
D)catfishing
Question
A person who does not own a laptop or smartphone is not a digital citizen and so does not need to be concerned about digital ethics.
Question
Paige is designing a web page that will contain instructions for how to use a new web conferencing tool at her work. She formats best practice tips in green, and she formats warning information in red. Which employees might struggle with this formatting?

A)People with visual impairments using screen magnifiers
B)People reading the web page on their smartphones
C)People with color blindness
D)People with hearing impairments
Question
Laney just bought a new smartphone. She's already downloaded her contacts information and other data from the cloud. Now she's copying her photos from her old phone onto the new device. Once her new phone has all her data, what should she do next with the old phone?

A)Reset the old phone to factory settings.
B)Donate the old phone to a nonprofit organization for refurbishing.
C)Throw away the old phone.
D)Create a backup of all data on the old phone.
Question
During a regional state of emergency, an Internet service provider offered three months of free Internet access to anyone affected by the crisis. This effort was intended to help reduce the impact of ___________.

A)digital inclusion
B)data breaches
C)the digital divide
D)digital access
Question
Bailey reads wikis at the beginning of his research project to get his bearings on the topic. He switches to peer-reviewed journals and professional publications for his formal sources. Why does Bailey not use wikis as formal sources?

A)No one is familiar with wikis.
B)Wikis can be heavily biased.
C)Users can post false information in wikis.
D)Experienced editors verify changes made to wiki articles.
Question
Marley stayed up late to watch the planet Mars rise in the east. She had read online that Mars was unusually close to the Earth in its orbit and would look nearly as large as the moon. However, she only saw stars, and the next morning she ended up oversleeping because of her late bedtime. Marley was the victim of __________.

A)distracted driving
B)a data breach
C)a hoax
D)the digital divide
Question
What rules should guide your behavior when you interact with friends and coworkers on social media?

A)Netiquette
B)Code of conduct
C)Acceptable use policy (AUP)
D)Digital inclusion
Question
Nina wants to find a list of vegan restaurants in the city she is visiting over the weekend. Which of the following websites can she use to find this information?

A)Yahoo
B)Gmail
C)Encyclopedia Britannica
D)Wikipedia
Question
The direction in which text is printed on a page is called style. ?
Question
Which of the following statements is NOT true about network standards?

A)The way computers access a network is related to the network standard.
B)Network standards specify the types of hardware used.
C)Network standards determine data transmission speeds.
D)Computers and devices successfully communicate on networks regardless of the standards used.
Question
The technology field has become rather elite, only hiring those with extreme talent in game design and Internet security.
Question
For keywords pertaining to academic research, Google returns more relevant and reliable results than Google Scholar, since Google Scholar is a subsidiary of Google.
Question
Rita is designing a digital card on her cellphone for her mother's birthday. She wants to crop out certain portions of her mother's photograph to use on the card. Which of these apps can she use to do this?

A)Chrome
B)Google Docs
C)Excel
D)Fotor
Question
If you do not know how to code or design a website from scratch, then which of the following could you do instead?

A)Use a website builder such as Google Sites.
B)Use a search engine optimization tool to write the code for publication.
C)Contract with a vendor to use uptime for a true measure of your coding skills.
D)Use an FTP client with XML to transfer files from your home computer to your school work station to receive help.
Question
What type of cyberattack is used to trick a user into giving valuable information to an attacker?

A)Malware
B)Trojans
C)Cyberbullying
D)Social engineering
Question
Using speech recognition software, a device can identify the words in your speech and display them on the screen.
Question
Bernie is an aspiring video game developer. Learning which of the following software would benefit him the most?

A)Computer-aided design software
B)Sampling software
C)3-D animation software
D)System software
Question
A plugin is an enhanced text editor that has additional features to write code accurately and efficiently.
Question
If you want to be sure you are practicing green computing, which of the following would be something you would do?

A)Throw old computers away at the dump.
B)Get the latest smartphone when it is released.
C)Buy devices with high power consumption.
D)Shut down your computer overnight.
Question
You can use a cloud server to back up your data.
Question
Every program or app requires RAM, which is the volatile and temporary storage location for open apps and data.
Question
Which of the following is NOT a responsible way to dispose of an old smartphone after removing your data from the device?

A)Donate it to a charity.
B)Remove the battery and throw it in the trash.
C)Trade it for credit at a technology store.
D)Take it to a recycling facility.
Question
In which phase of the software development life cycle do you acquire the necessary hardware and programming languages for the project?

A)Planning
B)Implementation
C)Design
D)Support and security
Question
Which of the following is NOT computer hardware?

A)Printer
B)Device driver
C)Mouse
D)Central processing unit
Question
A scanner is a type of computer hardware.
Question
Development i s the process of creating programs and apps from the idea stage to distribution to users.
Question
What type of system software manages memory?

A)operating system
B)screen saver
C)memory stick
D)file manager
Question
Digital media content like animations, video, and audio are stored as bits and bytes.
Question
Technology is used today in manufacturing, health care, and the transportation industry, but education has not yet embraced it.
Question
Phishing emails are disguised as emails from a trusted source and sent by hackers; they deceive the recipient by getting them to reveal personal or financial information.
Question
Which of the following do not use a central processing unit for computation?

A)Laptop
B)Smartphone
C)Scanner
D)Tablet
Question
When you purchase a device, system software is already loaded on it. Which of the following system software settings can you customize?

A)Screen resolution
B)Amount of RAM and ROM
C)Keyboard width
D)Number of USB ports
Question
To develop a website, you can use the following technologies EXCEPT _____.

A)HTML
B)CSS
C)Microsoft Word
D)JavaScript
Question
What can you use to scramble information so that it cannot be read unless the user possesses a key?

A)A password
B)Encryption
C)Two-factor authentication
D)A digital certificate
Question
A webpage is an electronic document that can contain text, graphics, sound, video, and links to other webpages. ​
Question
Which of the following is an example of digital media?

A)X-Ray images
B)Virtual reality
C)Magazines
D)Camera photographic film
Question
The practice of social curation is when a website provides links to other relevant websites in its field.
Question
Which of the following is system software?

A)Operating system
B)Microsoft Office
C)Browser
D)Chat app
Question
A program is a set of coded instructions written for a computer or mobile device, such as an operating system program or an application program.
Question
Mya needs to make an online payment to buy a book on an e-commerce website that she accesses on the Chrome browser. Which of the following website features should make her question its security?

A)An icon that indicates a secure connection
B)"https" in the URL
C)Requirement to sign in with a username and password
D)Absence of a lock icon in her browser window
Question
Computer hardware includes internal and external electronic devices connected to the computer.
Question
To work with a web app, you use your browser on a computer or mobile device.
Question
Julio needs to write a report and develop a budget for his job. What type of apps should he use to complete these tasks?

A)Personal interest apps
B)Productivity apps
C)Device management apps
D)Navigation apps
Question
When you think about your typical day, which of the following tasks would NOT involve technology?

A)Using an app to order your coffee.
B)Turning off your alarm on your phone.
C)Running three miles with the dog.
D)Responding to your child's teacher's email.
Question
Once you save a file to a location, it is permanent and cannot be moved.
Question
The greatest risk in using computers and smartphones comes from electronic waste.
Question
Which of the following is true about video conferences?

A)A video conference involves only one-way communication.
B)A video conference opens with an About page that includes directions, an agenda, and a poll.
C)A video conference always allows participants to see and hear each other.
D)A video conference is easily identifiable by its domain name and provider.
Question
If someone has become very attached to their mobile device and feels anxious if they cannot connect to the Internet, what are they experiencing?

A)Technology anxiety
B)Technology addiction
C)Technology empathy
D)Technology overload
Question
Twitter, Tumblr, Facebook, Snapchat, and Instagram are all examples of microblogging websites.
Question
What device connects a network to the Internet through an Internet service provider?

A)A protocol
B)A modem
C)A hub
D)A server
Question
A webpage is a document that contains codes, or _____, written in HTML to describe the content on the page.

A)styles
B)tags
C)attributes
D)variables
Question
Malware can install itself only with your permission but once installed, it can damage or steal data on your computer or device.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/65
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Digital Ethics and Lifestyle
1
Hunter has dyslexia and struggles to understand text when he reads it to himself. It seems assigned class readings always make more sense when someone else reads them to him. What tool can help Hunter study more independently?

A)Alternative keyboard
B)Screen reader
C)Alt text
D)Screen magnifier
Screen reader
2
Genevieve loves playing video games with friends on her Xbox connected to her TV. However, she's careful to get up, stretch, and walk around at least once every hour. What problem is this habit most likely helping her avoid?

A)Text neck
B)Technology addiction
C)Accidental falls
D)Repetitive strain injury
Repetitive strain injury
3
Which of the following problematic behaviors relies on the use of digital technology?

A)Harassment
B)Cyberbullying
C)Repetitive strain injuries
D)Distracted driving
Cyberbullying
4
When Hafsa writes a research paper for her psychology class, ________________ allow(s)her to quote small portions of a research study published by an industry leading expert without asking his permission first.

A)copyright
B)digital rights management (DRM)
C)intellectual property rights
D)the fair use doctrine
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
5
Edward shares a blog post on social media that says the Centers for Disease Control (CDC)has changed their recommendation for flu shots. He is quickly bombarded by other people saying his information is wrong. What did Edward fail to do?

A)Check the blog post for bad grammar.
B)Post an opposing point of view to maintain balance.
C)Check the blog post for accessibility features, such as alt text.
D)Verify the content with an authoritative source.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
6
Bruce realizes he's getting a cramp in his neck after texting with his buddy for several minutes. He puts the phone down and takes his dog for a walk. This is an example of ____________.

A)digital literacy
B)digital etiquette
C)digital security
D)digital citizenship
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
7
Josie is scrolling through her social media newsfeed when she sees a photo of her that a friend posted. The photo is embarrassing and was taken without Josie's knowledge when she was staying at the friend's house. Josie requests the photo be taken down. Josie is managing her own ___________.

A)public domain
B)digital footprint
C)data breach
D)netiquette
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
8
Kristy just received a laptop from her employer so she can work from home. She wonders if she can also use the laptop for personal activity, such as streaming movies. What documentation should Kristy check to find the answer to her question?

A)Acceptable use policy (AUP)
B)Knowledge base
C)Code of conduct
D)Warranty
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
9
Curtis decided to leave his smartphone in his car as he heads out for a day long hike. This is an example of a ______________.

A)digital detox
B)technology addiction
C)digital footprint
D)repetitive strain injury
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
10
Brad donates his old phone to a nearby charity, which refurbishes phones and offers them at no cost to challenged populations in the area. These people can use the free phones to help them find housing, employment, and other community resources. This program supports ______________.

A)digital inclusion
B)the Internet of Things (IoT)
C)an acceptable use policy (AUP)
D)the digital divide
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
11
Jason is reading a novel for school on his e-reader. He tries to print a portion of the novel so he can share it with a classmate who lost her copy. However, the e-reader will not allow the book to be printed. What content protection measure is preventing Jason from printing?

A)Digital rights management (DRM)
B)Public domain
C)Copyright
D)Fair use doctrine
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
12
Maisie doesn't limit her time watching enjoyable and relaxing shows on her laptop in the evenings after work and on the weekends because technology has an entirely wholesome effect without any risks.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
13
Francis closely monitors customer reviews on Google for his landscaping business. Most customers post high praise for his work; however, today he discovered an extremely negative review posted by someone claiming the name "Superman." Clearly, this is a fake name, and Francis has no way of following up with the person to determine what he can do to resolve the problem or even to know if it's a real customer. This is an example of __________.

A)software piracy
B)spamming
C)plagiarism
D)catfishing
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
14
A person who does not own a laptop or smartphone is not a digital citizen and so does not need to be concerned about digital ethics.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
15
Paige is designing a web page that will contain instructions for how to use a new web conferencing tool at her work. She formats best practice tips in green, and she formats warning information in red. Which employees might struggle with this formatting?

A)People with visual impairments using screen magnifiers
B)People reading the web page on their smartphones
C)People with color blindness
D)People with hearing impairments
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
16
Laney just bought a new smartphone. She's already downloaded her contacts information and other data from the cloud. Now she's copying her photos from her old phone onto the new device. Once her new phone has all her data, what should she do next with the old phone?

A)Reset the old phone to factory settings.
B)Donate the old phone to a nonprofit organization for refurbishing.
C)Throw away the old phone.
D)Create a backup of all data on the old phone.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
17
During a regional state of emergency, an Internet service provider offered three months of free Internet access to anyone affected by the crisis. This effort was intended to help reduce the impact of ___________.

A)digital inclusion
B)data breaches
C)the digital divide
D)digital access
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
18
Bailey reads wikis at the beginning of his research project to get his bearings on the topic. He switches to peer-reviewed journals and professional publications for his formal sources. Why does Bailey not use wikis as formal sources?

A)No one is familiar with wikis.
B)Wikis can be heavily biased.
C)Users can post false information in wikis.
D)Experienced editors verify changes made to wiki articles.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
19
Marley stayed up late to watch the planet Mars rise in the east. She had read online that Mars was unusually close to the Earth in its orbit and would look nearly as large as the moon. However, she only saw stars, and the next morning she ended up oversleeping because of her late bedtime. Marley was the victim of __________.

A)distracted driving
B)a data breach
C)a hoax
D)the digital divide
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
20
What rules should guide your behavior when you interact with friends and coworkers on social media?

A)Netiquette
B)Code of conduct
C)Acceptable use policy (AUP)
D)Digital inclusion
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
21
Nina wants to find a list of vegan restaurants in the city she is visiting over the weekend. Which of the following websites can she use to find this information?

A)Yahoo
B)Gmail
C)Encyclopedia Britannica
D)Wikipedia
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
22
The direction in which text is printed on a page is called style. ?
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following statements is NOT true about network standards?

A)The way computers access a network is related to the network standard.
B)Network standards specify the types of hardware used.
C)Network standards determine data transmission speeds.
D)Computers and devices successfully communicate on networks regardless of the standards used.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
24
The technology field has become rather elite, only hiring those with extreme talent in game design and Internet security.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
25
For keywords pertaining to academic research, Google returns more relevant and reliable results than Google Scholar, since Google Scholar is a subsidiary of Google.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
26
Rita is designing a digital card on her cellphone for her mother's birthday. She wants to crop out certain portions of her mother's photograph to use on the card. Which of these apps can she use to do this?

A)Chrome
B)Google Docs
C)Excel
D)Fotor
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
27
If you do not know how to code or design a website from scratch, then which of the following could you do instead?

A)Use a website builder such as Google Sites.
B)Use a search engine optimization tool to write the code for publication.
C)Contract with a vendor to use uptime for a true measure of your coding skills.
D)Use an FTP client with XML to transfer files from your home computer to your school work station to receive help.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
28
What type of cyberattack is used to trick a user into giving valuable information to an attacker?

A)Malware
B)Trojans
C)Cyberbullying
D)Social engineering
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
29
Using speech recognition software, a device can identify the words in your speech and display them on the screen.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
30
Bernie is an aspiring video game developer. Learning which of the following software would benefit him the most?

A)Computer-aided design software
B)Sampling software
C)3-D animation software
D)System software
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
31
A plugin is an enhanced text editor that has additional features to write code accurately and efficiently.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
32
If you want to be sure you are practicing green computing, which of the following would be something you would do?

A)Throw old computers away at the dump.
B)Get the latest smartphone when it is released.
C)Buy devices with high power consumption.
D)Shut down your computer overnight.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
33
You can use a cloud server to back up your data.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
34
Every program or app requires RAM, which is the volatile and temporary storage location for open apps and data.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following is NOT a responsible way to dispose of an old smartphone after removing your data from the device?

A)Donate it to a charity.
B)Remove the battery and throw it in the trash.
C)Trade it for credit at a technology store.
D)Take it to a recycling facility.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
36
In which phase of the software development life cycle do you acquire the necessary hardware and programming languages for the project?

A)Planning
B)Implementation
C)Design
D)Support and security
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is NOT computer hardware?

A)Printer
B)Device driver
C)Mouse
D)Central processing unit
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
38
A scanner is a type of computer hardware.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
39
Development i s the process of creating programs and apps from the idea stage to distribution to users.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
40
What type of system software manages memory?

A)operating system
B)screen saver
C)memory stick
D)file manager
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
41
Digital media content like animations, video, and audio are stored as bits and bytes.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
42
Technology is used today in manufacturing, health care, and the transportation industry, but education has not yet embraced it.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
43
Phishing emails are disguised as emails from a trusted source and sent by hackers; they deceive the recipient by getting them to reveal personal or financial information.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following do not use a central processing unit for computation?

A)Laptop
B)Smartphone
C)Scanner
D)Tablet
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
45
When you purchase a device, system software is already loaded on it. Which of the following system software settings can you customize?

A)Screen resolution
B)Amount of RAM and ROM
C)Keyboard width
D)Number of USB ports
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
46
To develop a website, you can use the following technologies EXCEPT _____.

A)HTML
B)CSS
C)Microsoft Word
D)JavaScript
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
47
What can you use to scramble information so that it cannot be read unless the user possesses a key?

A)A password
B)Encryption
C)Two-factor authentication
D)A digital certificate
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
48
A webpage is an electronic document that can contain text, graphics, sound, video, and links to other webpages. ​
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following is an example of digital media?

A)X-Ray images
B)Virtual reality
C)Magazines
D)Camera photographic film
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
50
The practice of social curation is when a website provides links to other relevant websites in its field.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following is system software?

A)Operating system
B)Microsoft Office
C)Browser
D)Chat app
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
52
A program is a set of coded instructions written for a computer or mobile device, such as an operating system program or an application program.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
53
Mya needs to make an online payment to buy a book on an e-commerce website that she accesses on the Chrome browser. Which of the following website features should make her question its security?

A)An icon that indicates a secure connection
B)"https" in the URL
C)Requirement to sign in with a username and password
D)Absence of a lock icon in her browser window
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
54
Computer hardware includes internal and external electronic devices connected to the computer.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
55
To work with a web app, you use your browser on a computer or mobile device.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
56
Julio needs to write a report and develop a budget for his job. What type of apps should he use to complete these tasks?

A)Personal interest apps
B)Productivity apps
C)Device management apps
D)Navigation apps
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
57
When you think about your typical day, which of the following tasks would NOT involve technology?

A)Using an app to order your coffee.
B)Turning off your alarm on your phone.
C)Running three miles with the dog.
D)Responding to your child's teacher's email.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
58
Once you save a file to a location, it is permanent and cannot be moved.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
59
The greatest risk in using computers and smartphones comes from electronic waste.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following is true about video conferences?

A)A video conference involves only one-way communication.
B)A video conference opens with an About page that includes directions, an agenda, and a poll.
C)A video conference always allows participants to see and hear each other.
D)A video conference is easily identifiable by its domain name and provider.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
61
If someone has become very attached to their mobile device and feels anxious if they cannot connect to the Internet, what are they experiencing?

A)Technology anxiety
B)Technology addiction
C)Technology empathy
D)Technology overload
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
62
Twitter, Tumblr, Facebook, Snapchat, and Instagram are all examples of microblogging websites.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
63
What device connects a network to the Internet through an Internet service provider?

A)A protocol
B)A modem
C)A hub
D)A server
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
64
A webpage is a document that contains codes, or _____, written in HTML to describe the content on the page.

A)styles
B)tags
C)attributes
D)variables
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
65
Malware can install itself only with your permission but once installed, it can damage or steal data on your computer or device.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 65 flashcards in this deck.