Study

Tech Apps Midterm Review

  •   0%
  •  0     0     0

  • Something that makes the truth plain and clear. Proof is _______?
    evidence
  • Belonging to or being available to the public as a whole, and not subject to copyright.
    public domain
  • Using a fake online identity. Often a common way for cyberbullies to get information about their victims.
    sock puppetry or catfishing
  • A group of computers, printers, and other devices that are connected together to exchange information is called a network. True or False
    True
  • When you feel the same emotions that you think someone else feels because it's on social media.
    emotional contagion
  • Aggressive pressure or intimidation.
    harassment
  • What key would you use to indent a paragraph on a document?
    tab
  • My Drive is where I _____________.
    keep my files and folders organized.
  • Name 3 characteristics of a strong password?
    1.) 8-16 characters; 2.) anagram or passphrase; 3.) a combination of letters, numbers and symbols
  • Copying a portion of a copyrighted material done for a limited purpose, such as to comment upon, criticize, or parody a copyrighted work. Can be done without permission of the copyright owner.
    Fair Use Guidlines
  • Your right to express your ideas and opinions through the things you say, write, and create.
    Freedom of Expression
  • What is the shortcut to COPY?
    Ctrl + C
  • Being unknown or unrecognizable.
    anonymous
  • The address of a website that you type into the browser.
    URL
  • What is the shortcut to underline text?
    Ctrl + U
  • When you compare your life to others' social media posts and feel like your life is worse.
    social comparison
  • Any piece of computer hardware which converts information into a readable form. For example, a monitor or speakers.
    output device
  • Direct or firsts-hand stories that come from a person who was there when the event happened.
    primary source
  • Sending or posting hostile messages intended to inflame the emotions of others.
    flaming and trolling
  • Honest, fair, honorable, and good moral standards of conduct.
    ethical
  • A law that gives the owner of a work the right to say how other people can use it.
    copyright
  • Sad feelings of worthlessness that can occur from being online too much.
    depression
  • Identify the icon in the photo.
    more ellipses
  • What Google software program is best used for organizing and sorting data?
    Google Sheets
  • Which Google application would be best for typing a story?
    Google Docs
  • Something that makes the truth plain or clear; proof is ___________.
    evidence
  • The correct or acceptable way of communicating on the internet.
    netiquette
  • Stealing someone's password and/or highjacking their online accounts to send or post humiliating pictures, videos, or information is called ______________.
    identity theft
  • The use of technology to harrass, threaten, or intimidate someone.
    cyberbullying
  • A measure of how much you value or respect yourself.
    self-esteem
  • A non-profit organization that offers copyright licenses for digital work. Allows others to use created content as long as they credit the creator and license any new creations under the identical terms.
    Creative Commons
  • Creations of the mind, such as inventions; literary and artistic works; designs and symbols; names and images.
    intellectual property
  • What is the computer hardware item in this picture?
    server
  • What does this shortcut command do?
    partial screenshot
  • A new original product that includes aspects of pre-exsisting, already copyrighted work, such as remixing previously released music.
    derivative work
  • Your right to be part of a group and take action within that group.
    Freedom of Association
  • What is the shortcut command to take a partial area screenshot?
    Ctrl + Shift + Windows switcher
  • The words and icons at the top of a software program that allow you to complete various tasks is called?
    toolbar
  • Any piece of software that was written with the malicious intent of damaging devices, stealing data, and generally causing a mess of someone's computer.
    malware
  • The physical, tangible parts or components of a computer, CPU, monitor, keyboard, speakers, or mouse.
    hardware
  • A measure of how much you value and respect yourself.
    self-esteem
  • One who knows what is right and wrong, exhibits intelligent technology behavior, and makes good decisions online has good ___________.
    digital citizenship
  • To mark a webpage for future reference.
    bookmark
  • When someone tries to get your personal data or information online by pretending to be someone else.
    phishing
  • Taking someone else's ideas or work and passing them off as your own.
    plagiarism
  • a place where data is maintained, managed, backed up remotely, and made available to users over a network.
    cloud storage
  • A file that accompanies an email is called _____________?
    attachment
  • What is the hardware in the picture?
    monitor
  • This is a trail of data you create while using the internet.
    digital footprint
  • Editing digital images so that the main subject is placed in an embarrassing situation is called _____________.
    photo shopping
  • A piece of computer hardware equipment used to provide data and control signals to a computer. Includes keyboards, mouse, scanners, digital cameras, and microphones.
    input device
  • Recording someone being harassed or bullied in a way that involves physical abuse, then posting the video online.
    happy slapping
  • A collection of data or computer instructions that tell the computer how to work. It includes computer programs, libraries, online documentation and digital media.
    software
  • The way you tell your readers where certain material in your work came from another source.
    citation
  • Content that you did not create, but that you are sharing is called?
    curated content
  • To make a copy of computer files in case of a computer problem.
    back up
  • Spreading gossip through email, text messaging, or social networking sites is called _____________.
    rumor spreading
  • What is the item in this picture?
    wifi router
  • What is the shortcut to UNDO the last thing you did?
    Ctrl + Z
  • What is the shortcut to open a new tab?
    Ctrl + T
  • What is the shortcut to PASTE?
    Ctrl + V
  • Ctrl + - is the shortcut command to do what?
    zoom out
  • What is the line or block of text at the top of the page called?
    header
  • A secret series of characters that enables a user the access a file, computer, or program.
    password
  • What is the shortcut command for CUT?
    Ctrl + X
  • How would you move text or images from one place in a document to another?
    Ctrl X - Ctrl V
  • A software program that allows a user to locate, access, and display web pages.
    web browser
  • What are the keys called where you place your fingers to rest?
    home row keys
  • A set of rules applied by the owner, creator, or administrator of a network, website or service, that restricts the ways in which you may use the network, website, or service; and sets guidelines as to how it should be used.
    Acceptable Use Policy
  • Where would you save and organize your favorite website links?
    bookmark bar
  • To find your way around a website.
    navigate
  • What is the hardware in the picture?
    CPU
  • Google Docs is a software program best used for?
    word processing
  • Aggressive pressure or intimidation is known as _______________.
    harassment