Chapter 10
Chapter 9
Chapter 12
Ethics
Powerpoint
100

Which cybercrime is considered to be a form of harassment?

Pharming
Clickjacking
Cyber-stalking
Phishing 

Cyber-stalking

100

P2P networks are normally found in ________.

corporations

universities

homes

libraries

homes

100

The SDLC follows the development of a system from planning to the final stage, ________.

maintenance

implementation

analysis

design

maintenance

100

Jules has walked away from a lab computer without logging off. Trish sits down and, still logged in as Jules, sends inflammatory e-mail messages out to several students and posts similar messages on the class newsgroup.

Thou shall not use a computer to harm other people.

Thou shall not use other people's computer resources without authorization

Thou shall use a computer in ways that show consideration and respect.

Thou shall not use a computer to steal.  

Thou shall not use other people's computer resources without authorization

100

In this image, which feature did we most likely use to quickly change the background, fonts, and layout?
Themes
SmartArt Graphics
AutoLayout
Transitions

Themes

200

An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________.

pharming
cyber-stalking
cyberbullying
phishing  

phishing

200

Which of the following statements about P2P networks is false?

They can only support a small number of devices.

The services and security are centralized.

All computers are considered equal.

They can share a printer.

The services and security are centralized.

200

The SDLC, the traditional model for system development, is also called the ________ model.

spiral
whirlpool  
Gantt
waterfall  

waterfall

200

Lester sends an e-mail to the entire student body inviting them to a BYOB party at his house while his parents are out of town. Lester receives a message from a system administrator calling him in for a meeting with school officials. He objects because he feels that his e-mail is his own private business.

Thou shall not snoop around in other people's files

Thou shall not appropriate other people's intellectual output.

Thou shall think about the social consequences of the program you write.

Thou shall not interfere with other people's computer work.

Thou shall think about the social consequences of the program you write.

200

Suppose you're sharing a presentation with several coworkers, but you're not sure if they all have PowerPoint. What's the best way to ensure everyone will still be able to view your presentation?

Export as a PDF

Save as a Rich Text File  

Print handouts and mail them

Describe each slide over the phone

Export as a PDF

300

Clickjacking results in ________.

sending spam to your friends' email accounts

malware posting unwanted links on your Facebook page

you sending money to get more money in return

 your Facebook account being closed without your knowledge 

malware posting unwanted links on your Facebook page

300

Which of the following statements about P2P networks is false?

They can only support a small number of devices.

The services and security are centralized.

All computers are considered equal.

They can share a printer.

The services and security are centralized.

300

In what phase of the SDLC does testing occur?

Implementation
Analysis
Maintenance
Design

Implementation

300

It seems like every time Melanie logs on to her account, Stanley knows about it and sends messages that cover her screen with text. At first, she thinks it is funny, but now it's really starting to bother her. The messages reformat the text on her screen and, besides, its kind of creepy the way he always knows she’s logged on.

Thou shall not interfere with other people's computer work.

Thou shall think about the social consequences of the program you write.

Thou shall not use or copy commercial software for which you have not paid.

Thou shall not use a computer to harm other people.

Thou shall not interfere with other people's computer work.

300

In this image, we are clicking a button on the Quick Access Toolbar. What will happen after we click it?  

Export as a PDF

400

When a company pays people to hack into its own system, it calls in ________ hackers.

green hat

black hat

gray hat

white hat  

white hat

400

A ________ network is one that has at least one computer that provides centralized management, resources, and security.

homegroup

peer-to-peer

workgroup

client-server

client-server

400

In what phase of the SDLC does user training take place?

Analysis
Planning
Maintenance
Implementation

Implementation

400

A secretary on the campus of a tax-supported university has been requested to give her staff a password to her supervisor. The supervisor would like to check the secretary’s e-mail when she is not at work to see if departmental-related mail is coming in. The secretary is not comfortable giving her password to her supervisor but is afraid to say no.

Thou shall not snoop around in other people's files

Thou shall not appropriate other people's intellectual output.  

Thou shall not use a computer to bear false witness

Thou shall use a computer in ways that show consideration and respect.  

 Thou shall use a computer in ways that show consideration and respect.

400

Most slide layouts include at least one ________ by default.
transition
action button
placeholder
animation 

placeholder

500

Hacking to make a political statement is called ________.

politicking

sneaking

cracking

hacktivism

hacktivism

500

To connect peripherals at short ranges, you would use the ________ wireless technology.

ultraviolet

Bluetooth

infrared

RFID

Bluetooth

500

The ________ is a set of five steps that a programmer follows to create a computer program.

Software Design Lifecycle
Program Development Cycle
Program Design Lifecycle
Computer Programming Cycle

Program Development Cycle

500

Marla figures out that when she is logged into the server, she can look at others' directories, make copies of files, and deposit new files. The operating system was designed to allow this functionality so that people could share their work. Mr. Klausinsky objects when he observes Marla poking around in another student's directory. But Marla responds by saying, "If the system allows me to do it and there's no specific rule against it, what's the problem?"

Thou shall not snoop around in other people's files.

Thou shall not use a computer to bear false witness.

Thou shall not interfere with other people's computer work

Thou shall not use a computer to harm other people.

Thou shall not snoop around in other people's files.

500

The New Slide command on the Ribbon lets you choose ________.

slide layouts
transitions
print settings
slide dimensions  

slide layouts

M
e
n
u