Learning Online - Digital Citizenship

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which task is completed in a digital learning environment?

Leon submits an application to his favorite college using the Internet.

When writing a research paper, in-text citations should be used for which of the following? Check all that apply.

direct quotations ideas from others paraphrases

The best description of a strong leader is someone who

displays self-confidence and the ability to inspire others.

People convicted of cyberbullying in most states

face varying degrees of punishment.

Digital leaders are people who others down a particular path.

guide [Vocab]

An effective password can help prevent

hackers from accessing information.

Inappropriate use of technology makes it easier for cyber bullies to others.

harass [Vocab]

Priya received an e-mail that appears to be from a social media website she has an account with. The e-mail asks her to confirm that she received the e-mail by replying with her password. What should Priya do?

ignore the e-mail and delete it

Sven steals Margot's social media password and begins sending inappropriate messages to Margot's friends, pretending to be Margot. This is a characteristic of cyberbullying known as

impersonation.

A source mainly provides from a text or piece of media.

information

Someone who buys a song online and copies it for friends is violating

intellectual property rights.

When it comes to cyberbullying, "power imbalance" is the term used for

intimidating someone online with threats.

Hardware and software work to allow a user to perform a function.

jointly [Vocab]

Students who use text language in an online academic environment violate which rule of netiquette? The illustration shows different types of text language. "plz, ASAP, LOL, btw, ROTFL, BRB, thx, gr8" ((This lesson was dumb af))

keeping content appropriate

A student who might find digital learning challenging.

likes meeting other students [Vocab]

What is part of the first step in troubleshooting a computer problem?

locating the problem and identifying it

Riko is in search of an out-of-print book about eighteenth-century medicine for a school project. What is the best solution if she needs the information immediately?

logging on to a digital library

What does software alone enable a computer to do?

manage other software

Which piece of personal information do websites often require users to enter?

name

It is safe to share personal information with strangers online.

never [Vocab]

In a survey of 43,000 students, how many admitted to committing plagiarism?

one out of three

Learning in a digital environment is also called learning.

online [Vocab]

Students who respond promptly to e-mails are following which netiquette rule?

respecting everyone's time

What is one step taken when solving a computer software problem?

scanning the computer and deleting any viruses

Hodaya missed several days of her online nursing class and needs to catch up. The most effective way she can do this while practicing netiquette is to

send an individual e-mail to her teacher for advice.

Using slang to communicate is usually acceptable on a

social media site.

If a computer reboots itself on its own, the computer might have a(n)

software problem.

Which best describes what a works-cited list includes?

sources cited in a paper

The world is in a digital age because people rely on

technology to complete tasks in everyday life.

In a student's paper, what should a citation for an online source include?

the name of the author of the source

What software controls a computer's basic functions?

the operating system

Computer hardware is best described as

the physical parts of a computer.

Why is it important to know the risks that exist on the Internet?

to be able to stay safe online

Why is it important for people to use privacy settings on social media sites?

to control who can see their activity

Andres wants to use a direct quotation in his history report. What is the best reason for including the quotation?

to help illustrate an important point

Which is the best reason for why it is important to keep personal information private online?

to prevent others from using it dishonestly

A credible online source is less likely to include

unproven opinions.

The excerpt is a sample works-cited list. Based on MLA standards, how could this list be improved?

use hanging indents in the second line

When paraphrasing a passage in her book report, Tali should

use her own words.

Plagiarism occurs when writers

use others' ideas and writing as their own.

What symbol indicates that material has been copyrighted?

©

Kelly has always used "P4ssw0rd" as her password on her online accounts. Why should she change this? Check all that apply.

- It could be easily guessed. - Passwords should be changed regularly

Which of these can expose a computer to a virus? Check all that apply.

- downloads - e-mails - websites

What leadership quality do the mayor's actions demonstrate?

A city is facing a budget shortfall and may have to raise taxes. Before taking this step, the mayor decides to form a task force of his supporters and opponents to study the issue and recommend solutions.

In addition to MLA, what are some other widely used style guides? Check all that apply.

American Psychological Association Associated Press Chicago Manual of Style

Which book citation is correctly formatted according to MLA standards?

Collins, Suzanne. The Hunger Games. New York: Scholastic, 2008. Print.

Which scenario describes a student filing a permission request for an online source?

David sends a letter to the owner of a source to ask if he can quote it.

How are digital learning and traditional learning different?

Digital learning exists mostly online, while traditional learning takes place in a classroom building.

What step should Samuel take next to stop the cyberbullying? Samuel loves playing the violin, but he feels embarrassed after a classmate posts a video on a social networking site making fun of him.

He should report the incident to the social networking site.

Which best explains why it is impossible to avoid inappropriate content online?

Inappropriate content can be accessed accidentally.

Which best describes why plagiarism can have legal consequences, such as lawsuits and fines?

It is considered a form of stealing.

Which scenario describes a student evaluating an online source?

Marta studies a source carefully to see whether or not it is credible.

Which website citation is correctly formatted according to MLA standards?

MyPlate. United States Department of Agriculture, 30 May 2012. Web. 7 June 2013.

Which example shows a student following intellectual property laws?

Pedro buys a subscription that allows him to watch movies online.

Jana keeps receiving friend requests from strangers on a social media site. This is making her uncomfortable. What should Jana do?

She should talk about it with a trusted adult.

Which is the best example of collaboration in a digital environment?

Students work together on a project from a distance.

Which digital team did the best job practicing netiquette?

Team 1 included ideas from all team members and gave a good presentation by giving everyone a job to do.

Which scenario best describes a combination of cyberbullying and cyber stalking?

Theo creates a website about a classmate named Enzo. He then uses that website to make up lies and stories about Enzo.

Which qualities show that Sofia is an effective digital leader? Check all that apply. Sophia is leading a project to help clean up a local river in her area. She creates an online forum where participants can communicate with each other and read the goals of the project. She encourages people to post ideas on this forum and sets up weekly web-conferencing meetings to move the project along.

[Multiple Answer] -She holds useful online meetings. -She encourages collaboration. -She is comfortable with technology. -She takes action to complete the job.

Which of Sukant's traits show that she understands netiquette? Check all that apply. Sukant's professor asks her to take over his online class while he is away because she is an effective digital communicator.

[Multiple Answers] -She listens to others and is friendly in her messages. -She posts messages that avoid slang and text language. -She respects the privacy of others and avoids cyberbullying.

Where are some places that cyberbullying occurs? Check all that apply.

[Multiple Answers] -in text messages -on websites -on social media networks -in chat rooms

To help paint an accurate mural at school, a student should use a

digital graphics program to map out a design.

Scott does not use privacy settings on his social media account. He includes all his contact details on his profile and posts lots of selfies. Why is this unsafe? Check all that apply.

[NOT] - Strangers will know where he lives. -Strangers will know his likes and interests. - Strangers will see what he looks like. - Strangers may use this information dishonestly.

The firm's findings are best described as the The United Nations hires a global firm to study digital communications around the world. Here is what that firm wrote based on its research. Many people in the world have little experience with computers, and only one-fifth of the world's population has Internet access. The differences in the ability to use this technology make it challenging to reach people from around the world.

[NOT] Internet divide.

Tim is trying to explain to his aunt how her computer works, but she does not understand what a CPU does. Which description will most likely help Tim's aunt understand the CPU's role?

[NOT] The CPU stores data for the transfer of information.

What consequences could she face from school officials for her actions? Check all that apply. Zareen used a school computer to create a fake website where she posted pictures and rude comments about her former friend.

[NOT] [Multiple Answers] -She could have her technology privileges taken away. -She could face detention or suspension. -She could be denied access to certain websites.

Which are examples of copyrighted online materials? Check all that apply.

[NOT] [Multiple Answers] -an article from an Internet magazine -photos taken by a student on his blog -an illustration sold by an artist on her website (Those all seem correct, I think I may have just missed one. Probably 'an excerpt from a novel published in 1913" but I'm not certain.)

Which of these can expose a computer to a virus? Check all that apply.

[NOT] [Multiple Answers] -downloads -video chats -websites

Which are technology trends in science? Check all that apply.

[NOT] [Multiple Answers] -permitting doctors to communicate with patients online -enabling doctors to use robotics to perform surgeries -allowing chemists to conduct online experiments

Anti-bullying laws in most states are designed to provide

[NOT] advice for preventing online bullying.

A computer's BIOS is defined as the

[NOT] application software for hardware.

What is one way to try to solve an Internet access problem?

[NOT] inspecting the power cord

Collaboration online increases students' motivation by

[NOT] introducing them to others with different viewpoints.

Seventy-five percent of students admit to inappropriately using technology by

[NOT] posting a message online criticizing another student.

Nina has learned that the motherboard is considered the brain because it Nina is trying to learn more about how computers work. She has repeatedly read that the motherboard is the "brain" of the computer.

[NOT] stores all of the computer's information.

In order to learn more about a rare disease, a doctor uses a computer to talk to another doctor halfway around the world. This technology trend in medicine is known as

[NOT] telecare.

In terms of technology, software is defined as

a computer's applications and programs.

A hacker is someone who

accesses someone's computer without permission.

Credible online sources are more likely to contain information that is

accurate.

Which best describes what a bibliography includes?

all resources consulted during research

What is an example of a source that is less likely to be copyrighted?

an acceptance speech by a presidential candidate

A problem that forces someone to make a decision between right and wrong is known as

an ethical dilemma.

Web browsers, word processing software, and e-mail clients are examples of

application software.

Style guides advise writers on which issues? Check all that apply.

applying consistent standards citing sources formatting text

Javier is 13 years old. He heard about a new game that he really wants to download. He found it for free online. What is the next step Javier should take?

ask a trusted adult whether he can download the game

Where is a bibliography or works-cited list placed within a paper or report?

at the end

What does BIOS stand for?

basic input/output system

A reason improper use of netiquette can be risky is that users can

become vulnerable to online harassment.

During an online forum for his college geography class, Sunil types a message questioning the intelligence of his classmate Eric and asking the professor to avoid calling on him. The netiquette rule Sunil is breaking is

being considerate of others.

Which elements of an MLA citation appear in italics? Check all that apply.

book titles magazine titles newspaper titles website names

A credit given to an author for his or her work is called a(n)

citation.

To summarize means to

condense the main idea into a few words.

School codes of for computer usage provide a blueprint for digital ethics.

conduct [Vocab]

Which would a student most likely do in a digital laboratory?

conduct an experiment in chemistry

Part of performing routine computer maintenance includes

deleting Internet browsing history.


Ensembles d'études connexes

Ch.10 Depressive and Bipolar Disorders

View Set

SIE (Garrity) Test #2 Review: (Part 2)

View Set

4520 test 1 review (TRA/TPB, self-efficacy, personality and exercise)

View Set

NUR 2092 Pharmacology Ch 58 Drugs affecting GI motility

View Set

Pretest: Mental Health and Community Health Issues

View Set