Vous êtes sur la page 1sur 8

EOC STUDY GUIDE

Computing Essentials:
1. Which step is part of the computing cycle?
a. Data
b. Import
c. Output
d. Software
2. Which term describes the collection of physical equipment within a computer
system?
a. User
b. Data
c. Software
d. Hardware
3. Which of the following is an input device?
a. Monitor
b. Projector
c. Speakers
d. Keyboard
4. Which of the following is an output device?
a. Mouse
b. Monitor
c. Keyboard
d. Microphone
5. Which of the following is a storage device?
a. Monitor
b. Scanner
c. Speakers
d. Flash drive
6. Identify the most common type of connector for a keyboard and mouse.
a. USB
b. VGA
c. RJ-45
d. DB-25

Internet Safety
7. Which term describes a set of rules for appropriate behavior while on the
Internet?
a. Identity
b. Netiquette
c. Cybersecurity
d. Social network

8. If you are leaving traces of personal information about yourself online,


available for anyone to obtain, then you are damaging your:
a. grades.
b. friendships.

EOC STUDY GUIDE


c. gaming record.
d. digital footprint.
9. One of the most popular online activities and one that poses the greatest
risk to your privacy is:
a. online gaming.
b. watching movies.
c. social networking.
d. checking e-mail messages
10.What is cyberbullying?
a. A person who is ignoring people he doesn't like
b. A bully who is embarrassing people during gym class
c. Any online behavior that embarrasses or hurts feelings
d. A school website that allows posting of cruel messages
11.While walking toward the gym, Emma noticed a group of girls laughing and
making hurtful remarks to the new girl. Emma didnt want to be known as a
tattletale, so she walked away without taking any action. Which term best
describes Emma?
a. Friend
b. Bystander
c. Upstander
d. Cyberbully
12.Which term means sending or receiving nude or sexually explicit photographs
or messages via text messaging?
a. Sexting
b. Phone sex
c. Harassment
d. Cyberbullying
13.What is the worst consequence that can happen to someone who is sexting?
a. They can be charged with the crime of child pornography.
b. Everyone will know what they look like naked.
c. People will lose respect for them.
d. They can catch a disease.
14.Which of the following is a threat that you need to beware of when gaming
online?
a. Humiliation of losing the game
b. No learning opportunities
c. No social interaction
d. Online predators

15.Which of the following protects the original work a person has created and
requires others to obtain permission if they want to use it?
a. Fair use
b. Password
c. Copyright
d. Plagiarism

EOC STUDY GUIDE


16.Which of the following is considered fair use of copyrighted material?
a. Using 100% of the lyrics of a copyrighted song in your video
b. Commenting about a music video on a social networking site
c. Reworking small parts of an original song to use it for a school project
d. Downloading a song from the Internet and making copies for your
family
17.Creative Commons is a set of licenses that automatically give you
_____________ to do various things with other people's creations, such as reuse
and distribute them.
a. permission
b. passwords
c. ownership
d. software
18.You can use other people's copyrighted materials if you:
a. obtain a copy from your school library.
b. are able to copy and paste it from the Internet.
c. download the content from the Internet for free.
d. pay a fee, obtain permission, or follow Fair Use guidelines
19.Which term means copying someone elses work and claiming it is your own?
a. Fair use
b. Plagiarism
c. Homework
d. Creative Commons
20.File sharing and downloading music without paying for it is:
a. illegal.
b. ethical.
c. fair use.
d. plagiarism
21.Sam created a video documentary about his life for a school project. He used
30 seconds of a copyrighted pop song for the introduction to his video. This is
legal under:
a. fair use.
b. school policy.
c. copyright law.
d. public domain
22.When visiting a website, you notice a lock icon in the lower-right corner of the
browser window. What does the lock represent?
a. A link to open another site
b. A webpage that has a secure connection
c. A program that prevents you from leaving the page
d. A warning that you are not allowed to view this webpage
23.Which term describes a self-replicating program that damages the normal
operation of a computer?
a. Worm
b. Phishing
c. Virus
d. Plagiarism
24.Viruses, worms and trojans are common security threats that are often used
in spreading:

EOC STUDY GUIDE


a. scams.
b. malware.
c. downloads.
d. passwords.
25.You are creating a new online account. What piece of information that you
supply should be strong and hard to break?
a. A password
b. A user name
c. An e-mail address
d. A picture of yourself

Web Research
26.___________ protects the creator of an original work.
a. Fair use
b. Copyright
c. Plagiarism
d. Public domain
27.What is the public domain?
a. Copyrighted works that are posted on the Internet
b. Copyrighted works that are printed in publicly available books
c. Works that are not restricted by copyright and do not require a license
or fee to use
d. Copyrighted works that can be copied on a limited basis for
educational and research purposes
28.What is copyright infringement?
a. Obtaining permission from a copyright owner to use his or her work
b. Using copyrighted works without the copyright owner's permission
c. Paying the author a fee to use his or her copyrighted works
d. Citing copyrighted material in a bibliography
29.Copyrighted material can be used if you:
a. include a reference to the author.
b. do not see a copyright symbol.
c. are using the material for a school assignment.
d. pay a fee, obtain permission or follow Fair Use guidelines.

30.Boolean operators are used with ________ in a search engine to refine a


search.
a. symbols
b. keywords
c. an image
d. a password

Web Design
31.Consider the following web address: http://www.mywebsite.com. Which
portion of the web address indicates the top-level domain?

EOC STUDY GUIDE


a. mywebsite
b. http
c. .com
d. www
32.What are the three most common website structures?
a. Linear, vertical, hierarchical
b. Horizontal, vertical, random
c. Hierarchical, linear, random
d. Random, hierarchal, horizontal
33.What is the term for a sketch displaying the skeletal blueprint of a webpage
structure?
a. Wireframe
b. Mind map
c. Card sort
d. Site map
34.The term ________________ defines a technique for transferring data so that it
can be processed as a steady and continuous flow.
a. rendering
b. upload
c. bandwidth
d. streaming
JPEG (Joint Photographic Experts Group) Best for photographs and print;
small file size and lossy compression; does not support transparency or
animation.
GIF (Graphics Interchange Format Best for electronic display of line art,
logos, shapes and illustrations; larger file size and lossless compression;
supports transparency and compression.

PNG (Portable Network Graphics) Best for electronic display of line art,
logos and photographs; larger file size than JPEG but smaller than GIF;
lossless compression; does not support animation but does support
transparency
35.Which preserves all of the files original data?
a. Lossy
b. Lossless

36.Which of th following is a program used to display web pages?


a. Web Browser
b. Web Page
c. Search Engine
37.With a Boolean search, the search engine will search the terms in the
____________ first.
a. Parenthesis
b. Apostrophe
c. Circle
d. Quotation Marks

EOC STUDY GUIDE


38.What are three Boolean operators used for advanced searching?
a. And, Or, Not
b. And, Is, Not
c. Not, Keyword, Or
d. Keyword, Phrases, Questions
39.What is the term for the amount of data that can be transmitted over a
network in a given amount of time?
a. rendering
b. upload
c. bandwidth
d. streaming
40.Which of the following is not a secure protocol?
a. HTTPS
b. FTP
c. SFTP
d. FTPS
41.FTP is a _________ that allow files to be exchanged between local computers
and Internet servers.
a. protocol
b. domain
c. host
d. server

Multimedia
42.Which effect is added to text and objects so they will be revealed or appear
and disappear on the slide when you click the mouse button?
a. Animation
b. Transition
c. Link
d. Theme
43.What is the name of the effect that controls how each slide replaces the
previous one?
a. Animation
b. Transition
c. Link
d. Theme

Microsoft Word
44.Visual representations of objects such as a circle or triangle are known as:
a. word processors.
b. pictures or images.
c. documents or files.
d. shapes or graphics.
45.Which layout option will make the text flow around the image?
a. Inline
b. Wrap Text
c. Break Text
d. Position Text

EOC STUDY GUIDE


46.When you create a shape, additional _________ options will become available
when you select that shape in your document.
a. layout
b. saving
c. editing
d. formatting
47.In most word-processing programs, what should you select in order to add a
table to a document?
a. File | Print
b. Insert | Table
c. Format | Lists
d. View | Print Layout
48.Which table element runs vertically (up and down)?
a. Property
b. Column
c. Row
d. Cell

Microsoft Excel
49.Which of the following is an example of a cell reference?
a. Column C
b. =SUM
c. Row 1
d. A5
50.Which format would be recommended for a cell that contained the data
1/24/2015?
a. Time
b. Date
c. Number
d. Currency

51.Addition, subtraction, multiplication, division and exponentiation are


examples of what?
a. Formulas
b. Conditional formatting
c. Functions
d. Spreadsheet data

SUM: The SUM function adds all of the values of the selected
cells in the argument. This function is useful for quickly adding
values in a range of cells.

AVERAGE: The AVERAGE function will find the average of the


values included in the argument. It calculates the sum of the

EOC STUDY GUIDE


cells and then divides the sum by the number of cells in the
argument.

COUNT: Using the COUNT function will display the number of


cells that have been included in the argument. This function is
useful for quickly counting items on the sheet.

MAX: The MAX function displays the highest cell value included
in the argument.

MIN: The MIN function displays the lowest cell value included in
the argument.

Correct out of 51:

Vous aimerez peut-être aussi