E-Ethics
Emerging Technologies
Principles of Computer Programming
Building & Maintaining a website
Web Ethics & Safety
100

T/F: Cyberbullying is Internet harassment

True

100

Which of the following was the first personal computer?

Scelbi

100

2048 Kilobytes is equal to how many megabytes?

2 Megabytes

100

What is the first step in the Web design process?

Plan your Website

100

What potential protection is available for Nike®’s slogan “Just Do It”?

Trademark
200

What is E-Ethics?

The study of moral values and rules in electronic media and the Internet. 

200

What is it called when a device is designed to act as a transmitter by converting sound waves to electronic waves and as a resistor by controlling electronic currents?

Transistor 

200

How many characters does ASCII allow?

128


200

T/F: HTML stands for Hyperspeed Markup Language. 

False

200

Victoria received a semi-nude picture of someone she knows through her cell phone. What is the first thing she should do?

Delete it immediately

300

What is the term used to describe the illegal stealing, copying or spreading of software, movies and music?

Pirating

300

What year was the first microprocessor with a built in mouse created?

1974

300

What binary code represents the number five?

0101

300

What does RSS stand for?

Really Simple Syndication

300

Sharron’s computer was infected by viruses. What could be the possible cause? 

Sharron downloaded free movies from the Internet.  

400

 Electronic searches and seizures are regulated by the ______ Amendment. 

Fourth

400

 What was Intel’s first product released in 1969 which gives computers memory space for open or running programs? 

RAM

400

The process of converting a vector graphic into a bit-map image is called?

Rendering

400

The big tradeoff involves trading bells and whistles, new features, reliability, and better technology in exchange for __________. 

Price

400

Allison has noticed her 16-year-old son, Jeffrey, has been spending a lot of time on the Internet recently. Which of the following should Allison do in order to protect Jeffrey from potential Internet dangers?  

Educate Jeffrey about internet dangers, use parental control software, and/or limit Jeffrey’s online access 

500

Small files stored on your computer which track the websites you visit are known as which of the following?

Cookies

500

The process of getting progressively smaller and more capable, which integrated circuits or microprocessors have gone through is known as _______?

 Microminiaturization

500

What is an advantage of using high-level programming languages?

Learning a high-level language takes less time than other types of computer languages 

500

What is a website bug?

A problem which occurs when a website does not function as expected. 

500

David’s friend told him she was cyberbullied. What should David do? 

Tell a trusted adult, offer help to his friend, and/or encourage his friend to defend herself