PIT Unit 3 Review Question Preview (ID: 34336)


Midterm Review. TEACHERS: click here for quick copy question ID numbers.

Which company is responsible for the extension of copyright?
a) Disney
b) Facebook
c) Pixar
d) Microsoft

Which of the following is most likely to be the LEAST credible website domain?
a) .com
b) .edu
c) .gov
d) .org

Which of the following would be considered appropriate digital etiquette?
a) listening to music without headphones in public spaces
b) speaking loudly on speakerphone in Walmart
c) putting your phone down while talking to your friend
d) using your phone under the dinner table

Piracy is
a) the unauthorized use or reproduction of another's work
b) stealing treasure from other pirates
c) stealing DVDs, CDs, and software from the store
d) using sources without citing them

Which of the following is an example of irresponsible internet use?
a) e-mailing personal secure information to your friends
b) keeping your passwords a secret
c) setting up a password for your WiFi network
d) installing anti-virus software

Which of the following is not a web browser?
a) Google
b) Chrome
c) Safari
d) Explorer

Which of the following is not a Google search tip?
a) use capitalization to narrow the search
b) use quotations to find exact wording results
c) use ~ to include synonyms
d) use a minus sign to eliminate words from a search

Which of the following passwords would be the best choice?
a) 25Rock9n6RoLL
b) CharlieBrown123
c) Buddy123
d) CharlieBrown

Which of the following is a defense technique to protect computers from incoming risks?
a) use anti-virus software
b) click on all the hyperlinks on a web page
c) do not use any social networking platforms
d) turn the computer off at night

A web browsers is defined as:
a) software program retrieving and presenting data from the Internet
b) collection of networks linked together at a central location
c) web pages which are formatted similarly and linked together
d) equipment allowing information to be served to multiple computers

A bookmark is
a) used to view your browsing history
b) an application you can install onto your web browser
c) a saved specific website
d) your home page

Signs that an email might be phishing include:
a) All of these
b) misspelled words
c) request for urgent acino
d) lack of identifying information

A search engine is
a) software program that searches the Internet for information
b) the software that operates the navigator in a motor vehicle
c) an online chat window
d) a major piece of equipment in a motor vehicle

The letters URL stand for:
a) Uniform Resource Locator
b) Unity Resilience Later
c) Uniform Reliance Landing
d) Unify Resources Later

All of the following can be copyrighted except for:
a) An idea
b) A book
c) A dance
d) A picture

All of the following can be used to determine a sources credibility except:
a) Author's credentials
b) Cost
c) Type of website
d) Date of publication

Credible sources are defined as:
a) Any source that has an author
b) Sources that have been cited so that the original author receives credit
c) Any source that comes from the internet
d) Sources that can be trusted and contain reliable information

Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 34336 in the upper right hand corner or click here.

TEACHERS / EDUCATORS
Log In
| Sign Up / Register