placeholder image to represent content

Computer 6 - Quiz No. 1 (2nd Qtr)

Quiz by Keyceelyn E. Albarina

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
20 questions
Show answers
  • Q1
    It refers to the rules or principles that deals with the right or wrong way of using the compute together with the moral duty and obligation of computer users.
    Computer Ethics
    Unethical Use of Computer
    Ethical Use of Computer
    30s
  • Q2
    Never use other people's documents without their permission.
    Respect Privacy
    Remember the Human Ware
    Follow House Rules
    30s
  • Q3
    Accessing one's computer or network illegally just to mess up with their files.
    Plagiarism
    Software Privacy
    Computer Hacking
    30s
  • Q4
    Parents and adults should set rules for their children in using the computer and internet and this policy should be respected and obeyed.
    Follow House Rules
    Remember the Human Ware
    Respect Privacy
    30s
  • Q5
    Is duplicating the language and thoughts of other people without any consent or permission. It is the same as stealing their works.
    Software
    Computer Hacking
    Plagiarism
    30s
  • Q6
    It is an object that contains multiple documents which is used to organize files. This is where you can store and manage files.
    Folder
    Filename Extension
    File
    30s
  • Q7
    It is a collection of data stored in one unit, identified by a filename and a file extension. It can be a document, picture, audio or video stream, data library, application, or other collection of data.
    Filename Extension
    Folder
    File
    30s
  • Q8
    A suffix to the name of a computer file applied to indicate the encoding convention (file format) of its contents.
    File
    Folder
    Filename Extension
    30s
  • Q9
    As a good computer user, you must respect other person's privacy. You should not look at other people's documents or e-mail messages without asking permission. Never share passwords.
    Remember the Human Ware
    Respect Privacy
    Follow House Rules
    30s
  • Q10
    Copying and using commercial software which is illegally purchased.
    Computer Hacking
    Software piracy
    Passing along spam and pyramid e-mails
    30s
  • Q11
    Creates overloading of e-mail accounts which can lead to destroy other people's important files.
    Passing along spam and pyramid e-mails
    Plagiarism
    Computer Hacking
    30s
  • Q12
    It can be encoded in MPEG, Windows Media Video (WMV), or Digital Video (DV) formats.
    Audio Files
    Pictures
    Video Files
    30s
  • Q13
    Include text files, such as a word documents, Rich Text Format (RTF) documents, Portable Document Format (PDF), Web pages, and others.
    Documents
    Audio Files
    Pictures
    30s
  • Q14
    Give files logical, specific names and include dates in file names if possible. The goal when naming files is to be able to tell what the file is about without having to open it.
    Keep names short.
    One place for all.
    Be specific.
    30s
  • Q15
    Place all documents in the My Documents folder and no where else. This will make it easier to fine things and to find things and to run backups.
    One place for all.
    Organize by file types
    Order your files by your convenience
    30s

Teachers give this quiz to your class