PIT U3 Test Review Part 2 Question Preview (ID: 33127)


Questions.[print questions]

Cathy is a high school science teacher and wants to copy some online educational materials to distribute to her students. Which of the following materials can Cathy NOT make copies of?
a) The entire Astronomy Today book
b) An article from National Geographic magazine
c) A graph from the American Scientist magazine
d) A chapter from the Cosmos book.

Which of the following can provide protections to Nike's slogan Just Do It?
a) Trademark
b) Copyright
c) Patent
d) Industry design right

brenhamisd is the
a) name of the organization
b) extension
c) protocol
d) location of the site

.net is the
a) name of the organization
b) extension
c) protocol
d) location of the site

http:// is the
a) name of the organization
b) extension
c) protocol
d) location of the site

www. is the
a) name of the organization
b) extension
c) protocol
d) location of the site

A .mil website is a ___ website
a) network
b) organization
c) government
d) military

A .org website is a ___ website
a) network
b) organization
c) government
d) educational institution

A .net website is a ___ website
a) network
b) organization
c) educational institution
d) commercial

A .gov website is a ___ website
a) government
b) educational institution
c) commercial
d) military

A .com website is a ___ website
a) network
b) organization
c) government
d) commercial

A .edu website is a ___ website
a) network
b) organization
c) educational institution
d) commercial

What is the granted legal right which gives the creator of an original work exclusive rights to reproduce, publish, sell, or distribute their production?
a) Copyright
b) Intellectual Property
c) Patent
d) Trademark

Which of the following passwords would be the best choice?
a) CharlieBrown123
b) Buddy123
c) 25Rock9N6RoLL
d) CharlieBrown

Which of the following methods is appropriate to use to prevent predators from finding you online?
a) Keep private information private
b) Accept strangers as friends on Facebook®
c) Avoid talking about predators
d) Arrange a meeting with a stranger from the Internet

Signs that an email might be phishing include:
a) Misspelled words
b) Lack of identifying information
c) Request for urgent action
d) All of these

Which of the following is a defense technique to protect computers from incoming risks?
a) Turn the computer off at night
b) Do not use any social networking platforms
c) Use anti-virus software
d) Click on all the hyperlinks on a web page

Which of the following is NOT considered an Internet risk?
a) Hacker
b) Identity theft
c) Virus
d) Educational research

All of the following are proven health risks of using technology except:
a) Cancer
b) Anxiety
c) Phantom Vibrations
d) Back and Neck Pain

Which of the following information would be considered safe to share online?
a) Your home address
b) Your passwords
c) Your first name
d) Your vacation status

Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 33127 in the upper right hand corner or click here.

TEACHERS / EDUCATORS
Log In
| Sign Up / Register