Learning Online - Digital Citizenship

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which is the best description of a computer virus?

a program that can damage a computer

A credit given to an author for his or her work is called a(n)

citation.

Which piece of personal information do websites often require users to enter?

name

Rules that govern how to communicate online are known as

netiquette.

Finding and fixing a computer problem is known as

troubleshooting.

Any materials published before the year usually are not subject to copyright.

1923 [Vocab]

What leadership quality do the mayor's actions demonstrate?

A city is facing a budget shortfall and may have to raise taxes. Before taking this step, the mayor decides to form a task force of his supporters and opponents to study the issue and recommend solutions.

Which scenario describes a student filing a permission request for an online source?

David sends a letter to the owner of a source to ask if he can quote it.

How are digital learning and traditional learning different?

Digital learning exists mostly online, while traditional learning takes place in a classroom building.

What step should Samuel take next to stop the cyberbullying? Samuel loves playing the violin, but he feels embarrassed after a classmate posts a video on a social networking site making fun of him.

He should report the incident to the social networking site.

Which best explains why it is impossible to avoid inappropriate content online?

Inappropriate content can be accessed accidentally.

Which best describes how an operating system works with the BIOS?

It translates instructions for the BIOS.

Katarina is deciding whether to buy a desktop or a laptop computer. What will most likely help Katarina make her decision?

Laptops are portable devices, while desktops remain in one place.

Which task is completed in a digital learning environment?

Leon submits an application to his favorite college using the Internet.

Which scenario describes a student evaluating an online source?

Marta studies a source carefully to see whether or not it is credible.

Which example shows a student following intellectual property laws?

Pedro buys a subscription that allows him to watch movies online.

Melissa's computer frequently has trouble with viruses. How can she fix this problem?

She can install scanning software.

Which additional line further explains how digital communication enhanced the project? Read the excerpt from a student essay about an international project. The Atlantic Rising Project involved students from multiple countries who measured rising sea levels in coastal communities along the Atlantic Ocean. The students communicated with each other online. The report helped raise awareness of some problems stemming from climate change.

Students photographed, videotaped, and published the results online every time they measured sea levels.

Which is the best example of collaboration in a digital environment?

Students work together on a project from a distance.

Which digital team did the best job practicing netiquette?

Team 1 included ideas from all team members and gave a good presentation by giving everyone a job to do.

Which scenario best describes a combination of cyberbullying and cyber stalking?

Theo creates a website about a classmate named Enzo. He then uses that website to make up lies and stories about Enzo.

Which qualities show that Sofia is an effective digital leader? Check all that apply. Sophia is leading a project to help clean up a local river in her area. She creates an online forum where participants can communicate with each other and read the goals of the project. She encourages people to post ideas on this forum and sets up weekly web-conferencing meetings to move the project along.

[Multiple Answer] -She holds useful online meetings. -She encourages collaboration. -She is comfortable with technology. -She takes action to complete the job.

What are examples of common computer software problems? Check all that apply.

[Multiple Answers] -Programs suddenly quit or stop working. -Documents close without warning. -A video file stops playing unexpectedly. -A computer crashes and stops working.

Which of Sukant's traits show that she understands netiquette? Check all that apply. Sukant's professor asks her to take over his online class while he is away because she is an effective digital communicator.

[Multiple Answers] -She listens to others and is friendly in her messages. -She posts messages that avoid slang and text language. -She respects the privacy of others and avoids cyberbullying.

Where are some places that cyberbullying occurs? Check all that apply.

[Multiple Answers] -in text messages -on websites -on social media networks -in chat rooms

The firm's findings are best described as the The United Nations hires a global firm to study digital communications around the world. Here is what that firm wrote based on its research. Many people in the world have little experience with computers, and only one-fifth of the world's population has Internet access. The differences in the ability to use this technology make it challenging to reach people from around the world.

[NOT] Internet divide.

Tim is trying to explain to his aunt how her computer works, but she does not understand what a CPU does. Which description will most likely help Tim's aunt understand the CPU's role?

[NOT] The CPU stores data for the transfer of information.

What consequences could she face from school officials for her actions? Check all that apply. Zareen used a school computer to create a fake website where she posted pictures and rude comments about her former friend.

[NOT] [Multiple Answers] -She could have her technology privileges taken away. -She could face detention or suspension. -She could be denied access to certain websites.

Which are examples of copyrighted online materials? Check all that apply.

[NOT] [Multiple Answers] -an article from an Internet magazine -photos taken by a student on his blog -an illustration sold by an artist on her website (Those all seem correct, I think I may have just missed one. Probably 'an excerpt from a novel published in 1913" but I'm not certain.)

Which of these can expose a computer to a virus? Check all that apply.

[NOT] [Multiple Answers] -downloads -video chats -websites

Which are technology trends in science? Check all that apply.

[NOT] [Multiple Answers] -permitting doctors to communicate with patients online -enabling doctors to use robotics to perform surgeries -allowing chemists to conduct online experiments

Anti-bullying laws in most states are designed to provide

[NOT] advice for preventing online bullying.

A computer's BIOS is defined as the

[NOT] application software for hardware.

What is one way to try to solve an Internet access problem?

[NOT] inspecting the power cord

Collaboration online increases students' motivation by

[NOT] introducing them to others with different viewpoints.

Seventy-five percent of students admit to inappropriately using technology by

[NOT] posting a message online criticizing another student.

Nina has learned that the motherboard is considered the brain because it Nina is trying to learn more about how computers work. She has repeatedly read that the motherboard is the "brain" of the computer.

[NOT] stores all of the computer's information.

In order to learn more about a rare disease, a doctor uses a computer to talk to another doctor halfway around the world. This technology trend in medicine is known as

[NOT] telecare.

In terms of technology, software is defined as

a computer's applications and programs.

A hacker is someone who

accesses someone's computer without permission.

Credible online sources are more likely to contain information that is

accurate.

What is an example of a source that is less likely to be copyrighted?

an acceptance speech by a presidential candidate

A problem that forces someone to make a decision between right and wrong is known as

an ethical dilemma.

Web browsers, word processing software, and e-mail clients are examples of

application software.

Javier is 13 years old. He heard about a new game that he really wants to download. He found it for free online. What is the next step Javier should take?

ask a trusted adult whether he can download the game

In phishing scams, a scam artist obtains the victim's personal information by

asking for it.

What does BIOS stand for?

basic input/output system

A reason improper use of netiquette can be risky is that users can

become vulnerable to online harassment.

During an online forum for his college geography class, Sunil types a message questioning the intelligence of his classmate Eric and asking the professor to avoid calling on him. The netiquette rule Sunil is breaking is

being considerate of others.

Which is the best response to receiving a threatening text from a classmate?

block the phone number, then contact his phone service provider

School codes of for computer usage provide a blueprint for digital ethics.

conduct [Vocab]

Which would a student most likely do in a digital laboratory?

conduct an experiment in chemistry

Part of performing routine computer maintenance includes

deleting Internet browsing history.

To help paint an accurate mural at school, a student should use a

digital graphics program to map out a design.

The best description of a strong leader is someone who

displays self-confidence and the ability to inspire others.

Which action taken by his teacher best illustrates a benefit of digital learning? After completing an internship at an architecture firm, Amit discovers he has a talent for computer-aided design. He wants to learn more at school and asks his favorite teacher for help.

enrolling Amit in an online course offered by a local college

To save and store data separate from a computer, it helps to have an

external hard drive.

People convicted of cyberbullying in most states

face varying degrees of punishment.

Based on the image, the leader is represented by the fish in the The image uses a school of fish to symbolize leadership.

front.

Digital leaders are people who others down a particular path.

guide [Vocab]

An effective password can help prevent

hackers from accessing information.

Inappropriate use of technology makes it easier for cyber bullies to others.

harass [Vocab]

Nina is 12 years old. She has just changed her password and wants to make sure she has it in case of emergency. With whom should she share her password?

her mother

Priya received an e-mail that appears to be from a social media website she has an account with. The e-mail asks her to confirm that she received the e-mail by replying with her password. What should Priya do?

ignore the e-mail and delete it

Sven steals Margot's social media password and begins sending inappropriate messages to Margot's friends, pretending to be Margot. This is a characteristic of cyberbullying known as

impersonation.

Someone who buys a song online and copies it for friends is violating

intellectual property rights.

When it comes to cyberbullying, "power imbalance" is the term used for

intimidating someone online with threats.

Hardware and software work to allow a user to perform a function.

jointly [Vocab]

Students who use text language in an online academic environment violate which rule of netiquette? The illustration shows different types of text language. "plz, ASAP, LOL, btw, ROTFL, BRB, thx, gr8" ((This lesson was dumb af))

keeping content appropriate

A student who might find digital learning challenging.

likes meeting other students [Vocab]

What is part of the first step in troubleshooting a computer problem?

locating the problem and identifying it

Riko is in search of an out-of-print book about eighteenth-century medicine for a school project. What is the best solution if she needs the information immediately?

logging on to a digital library

When students have computer trouble they usually are expected to

make any simple fixes on their own.

What does software alone enable a computer to do?

manage other software

It is safe to share personal information with strangers online.

never [Vocab]

In a survey of 43,000 students, how many admitted to committing plagiarism?

one out of three

Learning in a digital environment is also called learning.

online [Vocab]

A cyberbully is someone who invades another person's privacy by

posting mean-spirited messages.

Students who respond promptly to e-mails are following which netiquette rule?

respecting everyone's time

What is one step taken when solving a computer software problem?

scanning the computer and deleting any viruses

Hodaya missed several days of her online nursing class and needs to catch up. The most effective way she can do this while practicing netiquette is to

send an individual e-mail to her teacher for advice.

Using slang to communicate is usually acceptable on a

social media site.

Which type of evidence should victims collect to help officials catch cyber bullies?

social media usernames

If a computer reboots itself on its own, the computer might have a(n)

software problem.

The world is in a digital age because people rely on

technology to complete tasks in everyday life.

What information should David be prepared to give? David was working on his computer when an error message appeared onscreen. He decided to call a support line to seek help.

the code from the error message

In a student's paper, what should a citation for an online source include?

the name of the author of the source

What software controls a computer's basic functions?

the operating system

Computer hardware is best described as

the physical parts of a computer.

Why is it important for people to use privacy settings on social media sites?

to control who can see their activity

Which is the best reason for why it is important to keep personal information private online?

to prevent others from using it dishonestly

For what purpose is a screen name used?

to protect one's identity

A credible online source is less likely to include

unproven opinions.

What symbol indicates that material has been copyrighted?

©


Ensembles d'études connexes

GS ACCT 2302 Chapter 19 Cost Management Systems: Activity-Based, Just-in-Time, and Quality Management Systems

View Set

Microbiology Chapter 6 - Exam #1

View Set

Microeconomics: Canada in the Global Environment: CHAPTER 3Q1. What is the distinction between a money price and a relative price? The money price of a good is the dollar amount that must be paid for it. The relative price of a good is itUESTIONS REVIEW

View Set

international conflict exam 1, International Conflict, International Conflict Midterm, International Conflict Review, International Conflict Midterm, International Conflict Test 1, International Conflict Exam 1, International Conflict Midterm 1, Inte...

View Set