Edit Game
Tech Apps Midterm Review
 Delete

Use commas to add multiple tags

 Private  Unlisted  Public  Featured




Delimiter between question and answer:

Tips:

  • No column headers.
  • Each line maps to a question.
  • If the delimiter is used in a question, the question should be surrounded by double quotes: "My, question","My, answer"
  • The first answer in the multiple choice question must be the correct answer.






 Save   74  Close
A file that accompanies an email is called _____________?
attachment
Identify the icon in the photo.
more ellipses
What is the shortcut command to take a partial area screenshot?
Ctrl + Shift + Windows switcher
Being unknown or unrecognizable.
anonymous
Aggressive pressure or intimidation.
harassment
A measure of how much you value or respect yourself.
self-esteem
Something that makes the truth plain and clear. Proof is _______?
evidence
What is the shortcut command for CUT?
Ctrl + X
Copying a portion of a copyrighted material done for a limited purpose, such as to comment upon, criticize, or parody a copyrighted work. Can be done without permission of the copyright owner.
Fair Use Guidlines
A set of rules applied by the owner, creator, or administrator of a network, website or service, that restricts the ways in which you may use the network, website, or service; and sets guidelines as to how it should be used.
Acceptable Use Policy
Honest, fair, honorable, and good moral standards of conduct.
ethical
The correct or acceptable way of communicating on the internet.
netiquette
Direct or firsts-hand stories that come from a person who was there when the event happened.
primary source
Your right to be part of a group and take action within that group.
Freedom of Association
Your right to express your ideas and opinions through the things you say, write, and create.
Freedom of Expression
The way you tell your readers where certain material in your work came from another source.
citation
A new original product that includes aspects of pre-exsisting, already copyrighted work, such as remixing previously released music.
derivative work
Taking someone else's ideas or work and passing them off as your own.
plagiarism
A law that gives the owner of a work the right to say how other people can use it.
copyright
Creations of the mind, such as inventions; literary and artistic works; designs and symbols; names and images.
intellectual property
Belonging to or being available to the public as a whole, and not subject to copyright.
public domain
Any piece of software that was written with the malicious intent of damaging devices, stealing data, and generally causing a mess of someone's computer.
malware
When someone tries to get your personal data or information online by pretending to be someone else.
phishing
When you compare your life to others' social media posts and feel like your life is worse.
social comparison
When you feel the same emotions that you think someone else feels because it's on social media.
emotional contagion
Content that you did not create, but that you are sharing is called?
curated content
Ctrl + - is the shortcut command to do what?
zoom out
The words and icons at the top of a software program that allow you to complete various tasks is called?
toolbar
What Google software program is best used for organizing and sorting data?
Google Sheets
Google Docs is a software program best used for?
word processing
What is the line or block of text at the top of the page called?
header
Name 3 characteristics of a strong password?
1.) 8-16 characters; 2.) anagram or passphrase; 3.) a combination of letters, numbers and symbols
Where would you save and organize your favorite website links?
bookmark bar
What is the shortcut to PASTE?
Ctrl + V
What is the computer hardware item in this picture?
server
What is the shortcut to COPY?
Ctrl + C
What key would you use to indent a paragraph on a document?
tab
A non-profit organization that offers copyright licenses for digital work. Allows others to use created content as long as they credit the creator and license any new creations under the identical terms.
Creative Commons
Recording someone being harassed or bullied in a way that involves physical abuse, then posting the video online.
happy slapping
Using a fake online identity. Often a common way for cyberbullies to get information about their victims.
sock puppetry or catfishing
What does this shortcut command do?
partial screenshot
What is the shortcut to underline text?
Ctrl + U
What is the item in this picture?
wifi router
Sad feelings of worthlessness that can occur from being online too much.
depression
My Drive is where I _____________.
keep my files and folders organized.
What is the shortcut to open a new tab?
Ctrl + T
Which Google application would be best for typing a story?
Google Docs
What are the keys called where you place your fingers to rest?
home row keys
What is the shortcut to UNDO the last thing you did?
Ctrl + Z
What is the hardware in the picture?
monitor
Sending or posting hostile messages intended to inflame the emotions of others.
flaming and trolling
The use of technology to harrass, threaten, or intimidate someone.
cyberbullying
What is the hardware in the picture?
CPU
The address of a website that you type into the browser.
URL
To mark a webpage for future reference.
bookmark
To find your way around a website.
navigate
To make a copy of computer files in case of a computer problem.
back up
A software program that allows a user to locate, access, and display web pages.
web browser
a place where data is maintained, managed, backed up remotely, and made available to users over a network.
cloud storage
A group of computers, printers, and other devices that are connected together to exchange information is called a network. True or False
True
How would you move text or images from one place in a document to another?
Ctrl X - Ctrl V
Any piece of computer hardware which converts information into a readable form. For example, a monitor or speakers.
output device
Aggressive pressure or intimidation is known as _______________.
harassment
A measure of how much you value and respect yourself.
self-esteem
Something that makes the truth plain or clear; proof is ___________.
evidence
A piece of computer hardware equipment used to provide data and control signals to a computer. Includes keyboards, mouse, scanners, digital cameras, and microphones.
input device
Stealing someone's password and/or highjacking their online accounts to send or post humiliating pictures, videos, or information is called ______________.
identity theft
A collection of data or computer instructions that tell the computer how to work. It includes computer programs, libraries, online documentation and digital media.
software
Spreading gossip through email, text messaging, or social networking sites is called _____________.
rumor spreading
This is a trail of data you create while using the internet.
digital footprint
A secret series of characters that enables a user the access a file, computer, or program.
password
The physical, tangible parts or components of a computer, CPU, monitor, keyboard, speakers, or mouse.
hardware
Editing digital images so that the main subject is placed in an embarrassing situation is called _____________.
photo shopping
One who knows what is right and wrong, exhibits intelligent technology behavior, and makes good decisions online has good ___________.
digital citizenship