Question
Question 1 (2 points)
What is the main contributor to your digital identity?
Question 1 options:
Data stored on your computer that allows you to log in to a secure website through a secure account.
The information you post on social networking sites, blogs, and forums.
For each site or service you use, your username and password.
Documents stored on your computer.
Question 2 (2 points)
Which statement about the differences between wired and wireless networking is True.
Question 2 options:
An encrypted Wi-Fi connection is more secure than an Ethernet connection.
Wi-Fi connections typically have fewer data transmission delays than Ethernet connections.
An Ethernet connection typically provides faster network connection speeds than a Wi-Fi connection.
Question 3 (2 points)
Which two methods do websites use to track visitors' online browsing habits? (Choose 2.)
Select 2 correct answer(s)
Question 3 options:
VPN tunneling
Facial recognition
First-party cookies
Third-party cookies
Question 4 (2 points)
Read each statement about images that are protected by Creative Commons licenses and not in the public domain. Select two True statements.
Select 2 correct answer(s)
Question 4 options:
You can use the image for free.
You can use the image unconditionally.
If you use the image, you must cite its source.
Question 5 (2 points)
You post a funny and embarrassing photo of your friend on social media. How long will the information stay on the internet?
Question 5 options:
7 years
Until your friend deletes it
24 hours
Forever, even after you delete it
Question 6 (2 points)
You plan to purchase a portable computing device. The device must be able to run on battery power and must have a built-in physical keyboard. Which devices meet the requirements? (Choose 2.)
Select 2 correct answer(s)
Question 6 options:
Android tablet
Mac Desktop Computer
Windows laptop computer
Android smartphone
Chromebook
Windows All-in-One computer
Question 7 (2 points)
Select two true statements.
Select 2 correct answer(s)
Question 7 options:
If you do not cite your sources, you are guilty of plagiarism.
In written work, you must use footnotes to cite your sources.
Plagiarism is the unauthorized and uncredited use of another person's idea or creative work.
You must cite your sources only when you use someone else's work exactly as it was originally created.
Question 8 (2 points)
Which hardware component does a desktop computer use for long-term data storage?
Question 8 options:
Central processing unit (CPU)
Motherboard
Hard disk drive
USB flash drive
Question 9 (2 points)
What is spyware?
Question 9 options:
Content that tricks you into revealing account codes and passwords by pretending to be legitimate.
A program that can copy itself and spead to other computers.
A program that is designed to look harmless but allows unathourized access to your computer.
A program that installs itself on your system without your knowledge and tracks your online habits.
Question 10 (2 points)
What is a computer virus?
Question 10 options:
A program that is designed to look harmless but allows unathourized access to your computer.
Content that tricks you into revealing account codes and passwords by pretending to be legitimate.
A program that installs itself on your system without your knowledge and tracks your computer usage.
A program that can copy itself and spread to other programs and files.
What is the main contributor to your digital identity?
Question 1 options:
Data stored on your computer that allows you to log in to a secure website through a secure account.
The information you post on social networking sites, blogs, and forums.
For each site or service you use, your username and password.
Documents stored on your computer.
Question 2 (2 points)
Which statement about the differences between wired and wireless networking is True.
Question 2 options:
An encrypted Wi-Fi connection is more secure than an Ethernet connection.
Wi-Fi connections typically have fewer data transmission delays than Ethernet connections.
An Ethernet connection typically provides faster network connection speeds than a Wi-Fi connection.
Question 3 (2 points)
Which two methods do websites use to track visitors' online browsing habits? (Choose 2.)
Select 2 correct answer(s)
Question 3 options:
VPN tunneling
Facial recognition
First-party cookies
Third-party cookies
Question 4 (2 points)
Read each statement about images that are protected by Creative Commons licenses and not in the public domain. Select two True statements.
Select 2 correct answer(s)
Question 4 options:
You can use the image for free.
You can use the image unconditionally.
If you use the image, you must cite its source.
Question 5 (2 points)
You post a funny and embarrassing photo of your friend on social media. How long will the information stay on the internet?
Question 5 options:
7 years
Until your friend deletes it
24 hours
Forever, even after you delete it
Question 6 (2 points)
You plan to purchase a portable computing device. The device must be able to run on battery power and must have a built-in physical keyboard. Which devices meet the requirements? (Choose 2.)
Select 2 correct answer(s)
Question 6 options:
Android tablet
Mac Desktop Computer
Windows laptop computer
Android smartphone
Chromebook
Windows All-in-One computer
Question 7 (2 points)
Select two true statements.
Select 2 correct answer(s)
Question 7 options:
If you do not cite your sources, you are guilty of plagiarism.
In written work, you must use footnotes to cite your sources.
Plagiarism is the unauthorized and uncredited use of another person's idea or creative work.
You must cite your sources only when you use someone else's work exactly as it was originally created.
Question 8 (2 points)
Which hardware component does a desktop computer use for long-term data storage?
Question 8 options:
Central processing unit (CPU)
Motherboard
Hard disk drive
USB flash drive
Question 9 (2 points)
What is spyware?
Question 9 options:
Content that tricks you into revealing account codes and passwords by pretending to be legitimate.
A program that can copy itself and spead to other computers.
A program that is designed to look harmless but allows unathourized access to your computer.
A program that installs itself on your system without your knowledge and tracks your online habits.
Question 10 (2 points)
What is a computer virus?
Question 10 options:
A program that is designed to look harmless but allows unathourized access to your computer.
Content that tricks you into revealing account codes and passwords by pretending to be legitimate.
A program that installs itself on your system without your knowledge and tracks your computer usage.
A program that can copy itself and spread to other programs and files.
Answers
Answered by
GPT-4o mini
Here are the suggested answers for each question:
**Question 1:**
What is the main contributor to your digital identity?
**Answer:** The information you post on social networking sites, blogs, and forums.
---
**Question 2:**
Which statement about the differences between wired and wireless networking is True.
**Answer:** An Ethernet connection typically provides faster network connection speeds than a Wi-Fi connection.
---
**Question 3:**
Which two methods do websites use to track visitors' online browsing habits? (Choose 2.)
**Answer:**
1. First-party cookies
2. Third-party cookies
---
**Question 4:**
Select two True statements about images that are protected by Creative Commons licenses and not in the public domain.
**Answer:**
1. You can use the image for free.
2. If you use the image, you must cite its source.
---
**Question 5:**
You post a funny and embarrassing photo of your friend on social media. How long will the information stay on the internet?
**Answer:** Forever, even after you delete it.
---
**Question 6:**
You plan to purchase a portable computing device. The device must be able to run on battery power and must have a built-in physical keyboard. Which devices meet the requirements? (Choose 2.)
**Answer:**
1. Windows laptop computer
2. Chromebook
---
**Question 7:**
Select two true statements.
**Answer:**
1. If you do not cite your sources, you are guilty of plagiarism.
2. Plagiarism is the unauthorized and uncredited use of another person's idea or creative work.
---
**Question 8:**
Which hardware component does a desktop computer use for long-term data storage?
**Answer:** Hard disk drive.
---
**Question 9:**
What is spyware?
**Answer:** A program that installs itself on your system without your knowledge and tracks your online habits.
---
**Question 10:**
What is a computer virus?
**Answer:** A program that can copy itself and spread to other programs and files.
---
Make sure to double-check your answers or consult an expert for accuracy on specific topics!
**Question 1:**
What is the main contributor to your digital identity?
**Answer:** The information you post on social networking sites, blogs, and forums.
---
**Question 2:**
Which statement about the differences between wired and wireless networking is True.
**Answer:** An Ethernet connection typically provides faster network connection speeds than a Wi-Fi connection.
---
**Question 3:**
Which two methods do websites use to track visitors' online browsing habits? (Choose 2.)
**Answer:**
1. First-party cookies
2. Third-party cookies
---
**Question 4:**
Select two True statements about images that are protected by Creative Commons licenses and not in the public domain.
**Answer:**
1. You can use the image for free.
2. If you use the image, you must cite its source.
---
**Question 5:**
You post a funny and embarrassing photo of your friend on social media. How long will the information stay on the internet?
**Answer:** Forever, even after you delete it.
---
**Question 6:**
You plan to purchase a portable computing device. The device must be able to run on battery power and must have a built-in physical keyboard. Which devices meet the requirements? (Choose 2.)
**Answer:**
1. Windows laptop computer
2. Chromebook
---
**Question 7:**
Select two true statements.
**Answer:**
1. If you do not cite your sources, you are guilty of plagiarism.
2. Plagiarism is the unauthorized and uncredited use of another person's idea or creative work.
---
**Question 8:**
Which hardware component does a desktop computer use for long-term data storage?
**Answer:** Hard disk drive.
---
**Question 9:**
What is spyware?
**Answer:** A program that installs itself on your system without your knowledge and tracks your online habits.
---
**Question 10:**
What is a computer virus?
**Answer:** A program that can copy itself and spread to other programs and files.
---
Make sure to double-check your answers or consult an expert for accuracy on specific topics!
There are no human answers yet. A form for humans to post answers is coming very soon!