Emerging Technologies
Web Ethics and Safety
Internet Basics
Principles of Computer Programming
E-Ethics
100

What year was the first microprocessor  with a built in mouse created ?

1974

100

  Davids friend told him she was cyber bullied.What should DAVID NOT do?

 Post mean comments to attack the bully 

100

What was the initial purpose  of the internet in the 1960s ?

To aid leaders during the cold war

100

 HTML is an example of which of the following types of computer languages?

Web page Language 

100

Small files stored on your computer which track the websites you visit are known 

as which of the following? 

cookies

200

The process of getting progressively smaller and more capable,which integrated circuits or microprocesors have gone through is known as which of the following?

Microminiaturizarion 

200

Eric just purchased a new computer and would like to protect his computer from viruses. What action should Eric take?

Install an anti virus software 

200

Mobile connections depend on the location of the cell phone and the speed of the 

internet connection varies based on the service provider's data plans.

TRUE OR FALSE 

True 

200

 2048 Kilobytes is equal to which of the following?  

2 megabytes 

200

To obtain copyright protection, you must file the appropriate documents with a 

U.S. copyright office

TRUE OR FALSE 

False 

300

Paul Allen and Bill Gates first designed which program from the Altair 8800,which led them to starts Microsoft?

BASIC 

300

Victoria received a semi nude picture of someone she knows through her cell phone. What is a appropriate action 

Delete it immediately  

300

Researching online can be more effective by capitalizing important words for better 

recognition by search engines. 


TRUE OR FALSE 

False 

300

How many characters does ASCII allow?

128
300

Cyberbullying is Internet harassment. 

TRUE OR FALSE

True 

400

Adobe created what images to be replicated on a computer screen and printed 

PDF

400

Sharron's computer was infected by viruses .What could be a possible cause?

Sharron downloaded free movies from the internet 

400

 

  Complex passwords do NOT significantly contribute to improving security against 

hackers.

TRUE OR FALSE 

False

400

The process of converting a vector graphic into a bit-map image is called which 

of the following?

Rendering 

400

What is the term used to describe the illegal stealing, copying or spreading of 

software, movies and music? 

Pirating 

500

What was the first Intel's first product released in 1969 which gives computers memory space for open or running programs?

RAM

500

What can provide protections to Nike's slogan "Just Do It"

Trademark 

500

What is not a web browser ?

google 

500

What is not an example of high level language?

Binary Code 

500

 Electronic searches and seizures are regulated by the ______ Amendment.  

Fourth

M
e
n
u