Technology Test
Sarah is using a new social networking site. She wants to create a digital representation of herself that includes her screen name. What would she need to create?
a blog
a mashup
an avatar
a widget
Lucy has subscribed to several blogs and news feeds. What type of website would allow her to keep track of all this information by gathering the most recently published information?
blogosphere
widget
wiki
aggregator
Johnny is planning to visit Europe this summer. He will have Internet access during the trip and would like to post entries about his travel so that friends and family can see what he's doing. Which Web 2.0 tool would best suit his needs?
blog
wiki
widget
podcast
Sam graduated from high school a few years ago and would like to reconnect with some old friends. What type of Web 2.0 application should Sam use?
Social bookmakring
Social networking
widget
blog
A page that is wider than it is tall, is in what orientation?
Portrait
Vertical
Landscape
Horizontal
What do the letters on a spreadsheet represent?
Rows
Columns
Cells
Ranges
Jenny has several web sites that she visits on a regular basis to complete her homework. Where should Jenny save these web sites so that she can go to them quickly?
Home Page
Address Bar
Favorites and Bookmarks
Internet Options
When using a spreadsheet, the cell in which you are entering data into is called what?
Cell heading
Active Cell
Range
Formula Bar
Jimmy wants to keep track of his monthly expenses. He wants to use the data for various calculations and to make charts and graphs. Which productivity tool should Jimmy use?
Publisher
Power Point
Word
Excel
The guidelines that explain how one should act online are called what?
Manners
Etiquette
Cyberbullying
Netiquette
Abby is giving a presentation in her science class. She wants to show the class text and visuals. Which productivity tool would best help Abby?
Microsoft Word
Microsoft OneNote
Microsoft PowerPoint
Microsoft Excel
On a spreadsheet, the intersection of a row and a column is called a what?
Range
Cell
Formula
Heading
A program code that is loaded on your computer without your knowledge and can cause damage to your computer system is what?
Freeware
Virus
Shareware
Firewall
What do the numbers on a spreadsheet represent?
Rows
Columns
Cells
Range
The items in the image below are examples of what?
Software
Operating Systems
Hardware
Mobile Device
Microsoft Word, Mircrosoft PowerPoint, Photoshop, KidPix and PrintShop are all examples of what?
Software
Hardware
Operating Systems
Freeware
To find out what you are allowed to do on your school's network you should read what?
Network Policy
Usage Plan
Acceptable Use Policy
Technology Plan
Ben has written a paper for his English class. After reading over the paper, he realizes he has used the word GREAT too many times. What word processing feature can Ben use to find another word that has the same meaning as GREAT?
Spell Check
Search and Replace
Help
Thesaurus
Sydney has a CD-ROM that contains files with .bmp, .gif, jpg. and .png extensions. What type of files are on Sydney's CD-ROM?
Music Files
Picture Files
Video Files
Executable Files
Mrs. Johnson wants to create a formula in the spreadsheet below that will calculate each student's final grade. What formula should Mrs. Johnson enter in H5?
=B5+C5+D5+E5+F5+G5
=(90+100+96+95+95+8)/6
=AVERAGE (B5:G5)
=SUM(B5:G5)
Mrs. Johnson has entered a formula in G5 to calculate Abby's average. What feature should Mrs. Johnson use to quickly enter the formula for the remaining students?
Find and Replace
Fill Down
Fill Right
Fill Up
You are researching the effects of global warming for a presentation in science class. Based on the web address alone, which web site should provide you with the MOST reliable information?
http://www.savetheearth.com/
http://cleanair.blogspot.com/
http://www.epa.gov
http://stopglobalwarming.wikispaces.com
Suzie downloads a document from Kentucky Vitrual Library. The document had a .pdf extension. What program will Suzie need on her computer to view this file?
Notepad
Microsoft Word
Adobe Reader
Microsoft OneNote
__________ is a broadcast that is uploaded on a regular basis that includes audio and sometimes video. They can be played on a computer or a mobile device such as an ipod or MP3 player.
Webcast
Podcast
Blog
Video Conference
A friend of yours comes to you upset that someone is posting mean, hurtful comments about him on Facebook. This is an example of what?
Cyberbullying
Social Networking
Netiquette
DNormal behavior
Chris is "friends" with someone he met in a chat room about his favorite video game. During one of their chats, his "friends" asks him several questions? Which questions should Chris not answer?
"What is your favorite TV show?"
"I want to send you something in the mail. What is your address?"
"Are you reading any good books right now?"
"Did you watch the game last night? It was GREAT!'
Caleb's father realized that someone had used his personal information to apply for a credit card in his name. They had used the credit card and charged thousands of dollars to it. What is Caleb's father a victim of?
Cyberbullying
Identity Theft
Cyberstalking
Piracy
Below you will find two different passwords. Look over the passwords and then choose the statement that best decribes them. Password #1 ColbyBaseball Password #2 CO1byB@s3b@11
Password #1 is the strongest password because it has both upper and lowercase letters and contains two different words.
Password #2 is the strongest because it combines letters and special characters.
Both passwords are strong.
Neither password is strong.
Sam is a basketball player for his school. In the last game, he missed what could have been the winning shot. Several of the other players were very upset with Sam after the game. When he got home and checked his Facebook page, one of the other teammates posted very mean comments about Sam. Sam is a victim of what?
Cyberstalking
Identify Theft
Cyberbullying
Piracy
Which of the following would be an appropriate closing to an email you sent to your teacher?
Later, Phil
TTYL, Phil
Thank you, Phil
Peace, Phil
Katie's friend told her about a website where you can download free music and movies. Katie doesn't have any money but wants the new song from her favorite band. She visits the website and downloads a copy of the song to her comptuer. What activity is Katie doing?
Plagiarism
Piracy
Phishing
Ethical behavior
Shelby is reseaching genetics for a biology project. She found a website but isn't sure if the information is reliable or not? Which of the following should caution Shelby about using the information found?
The information has been posted for 2 months.
Shelby can't determine the author of his/her qualifications.
The web address ends with ".org:
The website includes pictures.
Digital citizenship is ......
using digital technologies responsibly, ethically and safely.
any information that has been posted about you on the Internet.
making fun of someone on your Facebook page.
an online membership you must pay for.
Submit
Should be Empty: