
Computer 6 - Quiz No. 1 (2nd Qtr)
Quiz by Keyceelyn E. Albarina
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
20 questions
Show answers
- Q1It refers to the rules or principles that deals with the right or wrong way of using the compute together with the moral duty and obligation of computer users.Computer EthicsUnethical Use of ComputerEthical Use of Computer30s
- Q2Never use other people's documents without their permission.Respect PrivacyRemember the Human WareFollow House Rules30s
- Q3Accessing one's computer or network illegally just to mess up with their files.PlagiarismSoftware PrivacyComputer Hacking30s
- Q4Parents and adults should set rules for their children in using the computer and internet and this policy should be respected and obeyed.Follow House RulesRemember the Human WareRespect Privacy30s
- Q5Is duplicating the language and thoughts of other people without any consent or permission. It is the same as stealing their works.SoftwareComputer HackingPlagiarism30s
- Q6It is an object that contains multiple documents which is used to organize files. This is where you can store and manage files.FolderFilename ExtensionFile30s
- Q7It is a collection of data stored in one unit, identified by a filename and a file extension. It can be a document, picture, audio or video stream, data library, application, or other collection of data.Filename ExtensionFolderFile30s
- Q8A suffix to the name of a computer file applied to indicate the encoding convention (file format) of its contents.FileFolderFilename Extension30s
- Q9As a good computer user, you must respect other person's privacy. You should not look at other people's documents or e-mail messages without asking permission. Never share passwords.Remember the Human WareRespect PrivacyFollow House Rules30s
- Q10Copying and using commercial software which is illegally purchased.Computer HackingSoftware piracyPassing along spam and pyramid e-mails30s
- Q11Creates overloading of e-mail accounts which can lead to destroy other people's important files.Passing along spam and pyramid e-mailsPlagiarismComputer Hacking30s
- Q12It can be encoded in MPEG, Windows Media Video (WMV), or Digital Video (DV) formats.Audio FilesPicturesVideo Files30s
- Q13Include text files, such as a word documents, Rich Text Format (RTF) documents, Portable Document Format (PDF), Web pages, and others.DocumentsAudio FilesPictures30s
- Q14Give files logical, specific names and include dates in file names if possible. The goal when naming files is to be able to tell what the file is about without having to open it.Keep names short.One place for all.Be specific.30s
- Q15Place all documents in the My Documents folder and no where else. This will make it easier to fine things and to find things and to run backups.One place for all.Organize by file typesOrder your files by your convenience30s