What to do on your own
Review of Basics
Intro to the Internet
Internet Searching
Security/Ethical Issues
100

True or False?

Paralegals often times find that attorneys are happy to adopt new technology (pg 551)

False
100

This type of software is commonly known as CPU and typically comes with your computer.

What is a central processing unit?

100

This is the shorthand for electronic mail. 

What is e-mail?

100

This internet tool crawls through a massive data base of information to provide search results based on a typed prompt. (pg 568)

What is a search engine?

100

These people are a type of criminal that seeks to gain unauthorized access to computer data. (pg 568)

What are hackers?

200

This type of internet education consists of videos and articeles showing the searcher how to undertake some online task, ie "Google Sheets ________" "Westlaw __________" (pg 551)

What is a tutorial?

200
Examples of this technology includes Microsoft Word and Word Perfect

What is a word processor?

200

This rhymes with a furry friend with a furry friend and is known as an intenet diary. 

What is a blog?

200

This domain is the most reliable of the six common internet domains to do legal research on. (pg 566)

What is .gov?

200

This type of malware is often hidden inside of pop-ups and monitors one's internet history, usually for advertising purposes. (pg 571) 

What is spyware?

300

This question is NOT a common question to be asked in an interview.

A. How skiller are you in Word?

B. What are your computer skills?

C. What social media do you have?

D. What operating systems have you used?

(pg 551)

The answer is C

300

This is NOT a catagory that would be included in a database at a law firm.

A. Email Address

B. Type of Case

C. Complaint

D. Case Number

What is C. Complaint

300

Examples of this type of internet tool include Internet Explorer, Google, Safari, and Firefox (pg 556)

What is a web browser?

300

This is the first aspect of statutory/case law you should check while searching free sites to ensure that the information is valid to use (pg 566)

What is the date?

300

This type of data contains information about an electronic document that isn't actually visible on the document. Sending documents without removing it could be a breach of confidentiality. (pg 571)

What is metadata?

400
IN association to law schools and local paralegal association, where can you look up upcoming events for paralegals? (pg 551)

What is the state bar association?

400

Also found in the sky, this part of the internet can obtain and update programs and read, store, and maintain data. 

What is the cloud?

400

This is the expected course of action if you get a suspicious email with only a link and a sentence saying "see attachment) (pg 583)

What is DO NOT CLICK THAT THERE'S MALWARE

400

This type of software combines multiple tasks in the control or management of a case. These tasks include calandering, document control and assembly. (pg 568)

What is case management?
400

This animal inspired type of malware refers to tricking the recipient of the e-mail into sending them personal information, i.e. this kind of scam. (pg 570) 

What is phishing?

500

According to Statsky, this is the amount of time per day that you should devote to learning new material (pg 551) 

What is 20 minutes a day?

500

How many bytes are in a petabyte?

One quadrillion. 

500

This is the best way to prevent getting malware on your computer. (pg 583)

What is operating system updates?

500

This type of investigation includes looking for information for uniform commercial code, bankruptcy filings, Dow Jones wires, and much more. (pg 568) 

What is due diligence? 

500

This animal inspired type of malware refers to a trojan that gives hackers direct control over your device. (pg 571)

What is a Remote Access Trojan (ratware)?

M
e
n
u