1-5
6-10
11-15
16-20
21-25
100

To use a graphic without violating copyright laws, a student must

Cite its original source

100

Purposefully using infected software on a flashdrive (or USB) to make an entire network crash is an example of 

Acceptable Use Policy Violation

100

Which of the following is NOT an example of computer hardware?

Antivirus

100

Most websites are ready to respond to millions of requests a day, but if you hit them with billion or trillions of requests coming from different places, computers get overloaded and will stop responding. This can happen when hackers overwhelm a website with too many requests, where the attack is coming from various computers all at once. This is known as:

Distributed denial of service

100

Jimmy guessed Rex's password to change Rex's instagram profile picture to an embarrassing photo. This can be considered all of the following except:

Piracy

200

Gabriel is creating an online account. He is concerned about sharing his private identity information. Which information is best for Gabriel to exclude from his account?

His social security number

200

An example of both an input and an output device

USB

200

Which key lets you type uppercase letters without using the "Caps Lock" 

Shift

200

Sam is working on creating a logo for school for his graphic design class. The assignment was to create a logo for the school's key club, which is about "setting a vision for the future."

Sam looks on an online website where he looks for inspiration on different business logos, and creates a logo.

Which of the following statements could be said about Sam's graphic design logo?

Sam needs to redesign his logo because it is too similar to the inspirational logo

200

The moment that you post something online, it becomes a part of your digital footprint for how long?

Forever

300

Anti-malware programs are used to monitor and detect --

Viruses

300

Based on the image (Reference Question) 

This tweet is considered to be a phishing scam, which phishing clues did this particular scammer use?

Spelling and grammar errors, too good to be true, and shortened URL

300

On Lucy's social media profile, she says that she is older than she really is, she also says that she likes rock music, even though she actually doesn't. Which of the following might be a possible consequence of how Lucy presents herself online?

Lucy might get attention from older people who think she is as old as she posted she is

300

Sandy has an instagram account and a YouTube channel. When she uses Google Chrome, she looks up different ideas on Pinterest to see how she can do better makeup tutorials. When she scrolls on her instagram and clicks on the explore feature, she notices there are lots of other posts from different makeup artists. 

When she clicks on a YouTube video, she notices the ads are lots of makeup brands. What allows Sandy to see all the makeup advertisements and specialized features?

Cookies

300

Which of the following is NOT one of the four factors of fair use?

Standards

400

Which of the following statements best describes the definition of a computer?

A computer is a device that manipulates information and data

400

Which of the following is considered to be an input device?

Keyboard

400

Laila and Arjun are on a group chat with friends from school. A friend in the group chat, starts to make fun of Laila's favorite sports team, other friends in the group think this is funny and add to the comments. What could Arjun do to de-escalate the situation?

Arjun cold add a positive comment or change the topic.

400

Alicia and James are working on a computer project together. They have to make a video about their community. They found a short video someone made of their neighborhood using a drone. They want to use the full video and record their voices over it. 

What advice would you give Alicia and James?

Use only a small clip or get permission from the creator to use the video

400

Which of the following situations is least likely to be fair use?

A sports fan using a team logo to make his own souvenirs to sell

500

Paige fell at the skating rink and was really embarrased. Her friend recorded her fall on her cell phone and posted it online for others to see. Several people added negative comments to the online video. This activity is considered:

Cyberbullying

500

Which of the following statements is true?

Computer systems are based on a binary number system. 

500

What is one essential fact about viruses on computers and how they attack computers?

A virus usually infects a computer when someone unintentionally downloads an executable file. 

500

Which of the following passwords is the most secure?

Th3@rC@n@

500

The monitor of a computer displays what is seen on the screen. A user can open an application and it portrays the application they are using such as a website or a word document. The monitor is an example of:

An output device