Question

Question 1 (1 point)
Juliana takes photos with her phone for the school yearbook. She takes more than 50 photographs each day. Juliana needs to use the quickest and most reliable method to back up the photos so she can delete them from her phone each day. What should Juliana do?

Question 1 options:

Email the photos to her teacher


Delete only the photos she doesn't want to use


Download the photos to a USB flash drive


Sync her phone to cloud storage

Question 2 (1 point)
A boy in your art class posts a phot of a pig with your head pasted onto it on a social media site. What should you do?

Question 2 options:

Understand that the post is an indirect criticism of your weight and go on a diet.


Respond to the original post with a neutral comment so the boy knows you've seen it.


Screenshot the photo and talk to an adult about it.


Post a photo on the same social media site of apiece of bacon with the boy's face on it.

Question 3 (1 point)
You are conducting online research. You need to refine your search results that are more relevant to your research subject. Which two techniques should you use?

Select 2 correct answer(s)
Question 3 options:

Search for root words and exclude suffixes.


Capitlize important terms.


Enclose multi-word search terms in quotation marks.


Search for generic terms.

Question 4 (1 point)
Which two methods should you use to avoid computer-related injuries?

Select 2 correct answer(s)
Question 4 options:

Take frequent short breaks during which you walk around.

Use a mouse with a switch to adjust the DPI when needed.

Use an ergonomic keyboard so your wrists are in a more natural position.

Upgrade to a high-end graphics card to reduce eye strain.
Question 5 (1 point)
Which two statements are true?

Select 2 correct answer(s)
Question 5 options:

If you do not cite your sources, you are guilty of plagiarism.

In written work, you must use footnotes to cite your sources.

Plagiarism is the unauthorized and uncredited use of another person's idea or creative work.

You must cite your sources only when you use someone else's work exactly as it was originally created.
Question 6 (1 point)
What is the definition of an AI chatbot?
Question 6 options:

A system that analyzes complex mathematical problems.


A tool that automates data entry tasks.


A computer program designed to simulate human interaction.


A program that generates realistic images.

Question 7 (1 point)
You are researching information in a long document. Select two statements that can work if you use the Find feature to complete the task.

Select 2 correct answer(s)
Question 7 options:

Locate a keyword or phrase within the document.

Change the format of all citations in your document.

Identify pages that include references by a specific author.
Question 8 (1 point)
Which hardware component does a desktop computer use for long-term data storage?

Question 8 options:

Central processing unit (CPU)

Motherboard

Hard disk drive


USB flash drive
Question 9 (1 point)
You are writing a research paper. You need to add references to your work. For each scenario, select the one that does not need a reference.

Question 9 options:

You use an idea from a news article.

You write something new and original.

You copy a paragraph from a webpage.

You paraphrase content from a magazine article.
Question 10 (1 point)
What are two negative effects of posting a derogatory meme on social media?

Select 2 correct answer(s)
Question 10 options:

Various viewers might interpret the meme differently.

It showcases your wit and digital artistry skills.

It remains available after the event that inspired you to post it.

You can easily address a group of people who hold specific beliefs.
Question 11 (1 point)
What is spyware?
Question 11 options:

Content that tricks you into revealing account codes and passwords by pretending to be legitimate.

A program that can copy itself and spead to other computers.

A program that is designed to look harmless but allows unathourized access to your computer.

A program that installs itself on your system without your knowledge and tracks your online habits.
Question 12 (1 point)
What is a computer virus?

Question 12 options:

A program that is designed to look harmless but allows unathourized access to your computer.

Content that tricks you into revealing account codes and passwords by pretending to be legitimate.

A program that installs itself on your system without your knowledge and tracks your computer usage.

A program that can copy itself and spead to other programs and files.
Question 13 (1 point)
Read each statement about the differences between internet and intranet. Select the statement that is True.

Question 13 options:

The internet is privately owned by a consortium of companies.


An intranet connection is more secure than an internet connection.


An intranet has an unlimited number of users and can be accessed by anyone.
Question 14 (1 point)
You have been troubled by a lot of malware infecting your computer. After cleaning the malware off your computer, you want to better your digital privacy and increase your security. Which of the following will protect your digital privacy and increase your security when browsing websites?

Question 14 options:

A Creative Commons license


Clearing your browser history


Switch to an open source browser


Anti-tracking browser extension

Question 15 (1 point)
Bluetooth transfers data at a maximum rate of ____ megabits per second.

Question 15 options:

five


three


two


four

Question 16 (1 point)
Which can store a computer's operating system? Choose two.

Select 2 correct answer(s)
Question 16 options:

Hard drive


USB drive


Cloud storage


Solid-state drive

Question 17 (1 point)
What is a safe way to send personally identifiable information (PII) via email?

Question 17 options:

By decrypting an email


By never sending emails


By only emailing PII to relatives


By encrypting an email

Question 18 (1 point)
Which hardware is used to connect a computer to another computer or server over a LAN?

Question 18 options:

Router


Network adapter


DSL


Modem

Question 19 (1 point)
Which is true of cloud storage? Choose three answers.

Select 3 correct answer(s)
Question 19 options:

It stores files in a remote physical location.


Storage space is unlimited.


Users access the files via the internet from any device.


It allows users to send messages quickly.


Users must have an account and be logged in to view or save files.

Question 20 (1 point)
All the recipients on the To or Cc lines of an email can see who was Bcc'd.

Question 20 options:
True
False

Answers

Answered by GPT-4o mini
Here are the answers for the questions you provided:

**Question 1:**
Sync her phone to cloud storage

**Question 2:**
Screenshot the photo and talk to an adult about it.

**Question 3:**
- Enclose multi-word search terms in quotation marks.
- Search for root words and exclude suffixes.

**Question 4:**
- Take frequent short breaks during which you walk around.
- Use an ergonomic keyboard so your wrists are in a more natural position.

**Question 5:**
- If you do not cite your sources, you are guilty of plagiarism.
- Plagiarism is the unauthorized and uncredited use of another person's idea or creative work.

**Question 6:**
A computer program designed to simulate human interaction.

**Question 7:**
- Locate a keyword or phrase within the document.
- Identify pages that include references by a specific author.

**Question 8:**
Hard disk drive

**Question 9:**
You write something new and original.

**Question 10:**
- Various viewers might interpret the meme differently.
- It remains available after the event that inspired you to post it.

**Question 11:**
A program that installs itself on your system without your knowledge and tracks your online habits.

**Question 12:**
A program that can copy itself and spread to other programs and files.

**Question 13:**
An intranet connection is more secure than an internet connection.

**Question 14:**
Anti-tracking browser extension

**Question 15:**
two

**Question 16:**
- Hard drive
- Solid-state drive

**Question 17:**
By encrypting an email

**Question 18:**
Network adapter

**Question 19:**
- It stores files in a remote physical location.
- Users access the files via the internet from any device.
- Users must have an account and be logged in to view or save files.

**Question 20:**
False

Related Questions