Search Header Logo
TestOut_MostMissed

TestOut_MostMissed

Assessment

Presentation

Computers

9th Grade

Practice Problem

Medium

Created by

Brandi Nguyen

Used 7+ times

FREE Resource

27 Slides • 14 Questions

1

media

ITF+ TestOut

Frequently missed questions

2

media

Academic Dishonesty

Academic dishonesty refers to any type of cheating, dishonest, or fraudulent behavior that occurs in an

academic setting, such as a school, college, or university. Examples of academic dishonesty include
plagiarism, cheating on exams, fabrication or falsification of data, unauthorized collaboration, and

submitting work completed by others as one's own.

Cheating on exams is another form of academic dishonesty, and it can involve activities such as copying
from another student's paper, using unauthorized materials during the exam, or collaborating with other

students during the exam.

Overall, academic dishonesty undermines the integrity of the academic process and can have serious
consequences for both the individual student and the academic institution. Most academic institutions

have strict policies and penalties in place for academic dishonesty, ranging from failing a course or

assignment to suspension or expulsion from the institution.

3

media

What are some examples of

Academic Dishonesty?

I’m glad you asked!

We have some real life examples of academic dishonesty from

yesterday’s qualification exam.

4

What are some examples of

Academic Dishonesty?

Examples include (but are not limited to)

Directly copying
and pasting test
questions into ChatGPT

media

5

media

What are some examples of

Academic Dishonesty?

Examples include (but are not limited to)

Using Google to

search for answers

6

media

What are consequences of

Academic Dishonesty?

Phone Call/Email/Letter to parent or guardian
Student may be assigned a zero for the assignment at the
teacher’s discretion
No higher than a “S” for the conduct grade
Disqualification of voucher

7

media

3.0 Applications and Software

Which of the following is the BEST example of using an

application that is locally installed without network

access?

Most missed
question

8

Multiple Choice

Which of the following is the BEST example of using an application that is locally installed without network access?

1

Accessing a company folder through a VPN application.

2

Viewing the latest email in your Outlook Inbox.

3

Writing a letter using the Google Docs application.

4

Creating a PowerPoint presentation for a team meeting.

9

media

3.0 Applications and Software

ANSWER:

Creating a PowerPoint presentation for a team meeting.

This question is asking about using a software installed on your PC

that does not require network access.

PowerPoint is an application that is installed on your machine and you

do not need access to the network to use it.

Most missed
question

10

media

3.0 Applications and Software

WHY IS IT NOT….?

Writing a letter using the Google Docs application.

Viewing the latest email in your Outlook Inbox.

Accessing a company folder through a VPN application.

Google Docs is a word processor that you usually need Internet access

to use.

Outlook requires network access to download your latest email

Accessing a company folder through VPN needs internet access

Most missed
question

11

media

2.0 Infrastructure

What precaution should you always take when using a

public access point?

2nd most missed
question

12

Multiple Choice

What precaution should you always take when using a public access point?

1

Use a strong password when accessing websites.

2

You should never use public access points.

3

Ensure sites are using HTTPS.

4

Don't perform secure tasks, such as online banking.

13

media

2.0 Infrastructure

ANSWER:

Ensure sites are using HTTPS.

2nd most missed
question

14

media

2.0 Infrastructure

WHY IS IT NOT….?

Don't perform secure tasks, such as online banking.

You should never use public access points.

Use a strong password when accessing websites.

While many of these answer choices are good practices, the BEST
answer choice is make sure you are using a secure website with https:

2nd most missed
question

15

media

3.0 Applications and Software

Which of the following divides a single physical disk into

multiple logical drives called volumes?

3rd most missed
question

16

Multiple Choice

Which of the following divides a single physical disk into multiple logical drives called volumes?

1

Journaling

2

Fragmentation

3

Defragmentation

4

Partitioning

17

media

3.0 Applications and Software

ANSWER:
Partitioning

Partitioning is the process of dividing a single physical disk into multiple

logical drives called volumes

3rd most missed
question

18

media

3.0 Applications and Software

WHY IS IT NOT….?

Fragmentation
Defragmentation

Journaling

Fragmentation is what occurs when a file is saved to a hard drive but

there is not enough contiguous space available to save the entire file in
one piece. The file gets saved in fragments on other parts of the hard

drive.

Defragmentation is a utility that helps rearrange the files on the hard

drive to optimize performance.

Journaling logs all file system changes before they are written to the

hard drive

3rd most missed
question

19

media

4.0 Programming

Which of the following BEST describes a programming

sequence?

4th most missed
question

20

Multiple Choice

Which of the following BEST describes a programming sequence?

1

A list of subroutines used by a compiler.

2

A sequence of instructions that defines the input, processing, and output.

3

A list of steps written in pseudocode.

4

A graphical representation of the program processes.

21

media

4.0 Programming

ANSWER:

A sequence of instructions that defines the input,

processing, and output.

This describes the basic structure of a program.

In programming, a sequence of instructions is used to define the steps that a
program takes to process the input data and produce the desired output. This
sequence typically includes statements or commands that manipulate data,
perform calculations, make decisions, and control the flow of the program.

4th most missed
question

22

media

4.0 Programming

WHY IS IT NOT….?

A list of subroutines used by a compiler.

A list of steps written in pseudocode.

A graphical representation of the program processes.

A list of subroutines used by a compiler is known as a library. These are
pre-written code modules that are used to perform common functions.

A list of steps written in pseudocode can be an algorithm. An algorithm

is a set of rules to be followed in order to solve a problem. Algorithms

can be written in natural language, flowcharts, or pseudocode.

A graphical representation of the program process is known as a

flowchart.

23

media

6.0 Security

Which of the following can be configured at the border
of your network to control the flow of network traffic

and protect systems from unauthorized network

connections? (Select two.)

24

Multiple Select

Which of the following can be configured at the border of your network to control the flow of network traffic and protect systems from unauthorized network connections? (Select two.)

1

Host firewalls

2

Network firewalls

3

Anti-malware software

4

Windows Defender

5

Proxy servers

25

media

6.0 Security

ANSWER:

Network Firewalls, Proxy Server

This question specifically asks what can configured for the border of your

network.

Network Firewalls are more effective than host firewalls and they are at the
border of your network. With network firewalls, you get centralized control,
protection for all hosts on your network, and advanced filtering capabilities.

A proxy server can serve as an intermediary between devices on the

network and the internet. When a device requests access to a website, the

request is sent to a proxy server instead of the internet.

26

media

6.0 Security
WHY IS IT NOT….?

Host firewall

Anti-malware software

Windows Defender

A host firewall is usually configured on an

individual host. It is not considered the

border of your network.

Anti-malware software is designed to

scan incoming traffic for malware, block

known threats, and alert admins to

security risks.

Windows Defender is another antivirus
and anti-malware software that comes

with Windows.

Anti-malware software and applications
do not control the flow of network traffic
and unauthorized network connections

27

media

6.0 Security

Which kind of online attack involves pretending to be a

legitimate company to get sensitive information?

28

Multiple Choice

Which kind of online attack involves pretending to be a legitimate company to get sensitive information?

1

Phishing

2

Spyware

3

Spoofing

4

Virus

29

media

6.0 Security

ANSWER:
Phishing

Phishing is the type of attack that involves pretending to be a
legitimate company to get sensitive information. This attack

usually involves sending emails that appear to be from a trusted

source, like a bank. However, the emails contain links to fake
websites that mimic the appearance of the legitimate site and

ask the user for credentials.

30

media

6.0 Security

WHY IS IT NOT….?

Spoofing
Spyware

Virus

Spoofing is the practice of creating a forged identify to deceive a user. Spoofing attacks
include IP Spoofing, Email Spoofing or Caller Spoofing. Remember, to view the original

message header to view additional details to prevent falling a victim.

Spyware is a type of software designed to monitor a user’s activity without the user’s

knowledge or consent.

A virus is a type of malicious software that is designed to replicate itself and spread from

one device to another. It can steal personal information or delete files.

31

media

TestOut Review Questions

REVIEW

32

Multiple Choice

Which of the following is the BEST example of using an application that is locally installed without network access?

1

Accessing a company folder through a VPN application.

2

Creating a PowerPoint presentation for a team meeting.

3

Writing a letter using the Google Docs application.

4

Viewing the latest email in your Outlook Inbox.

33

media

TestOut Review Questions

Which of the following runs exclusively from the cloud,

relying on cloud technologies? (Select two.)

34

Multiple Select

Which of the following runs exclusively from the cloud, relying on cloud technologies? (Select two.)

1

Microsoft Word

2

Google Drive

3

Adobe Photoshop

4

Dropbox

5

Adobe Acrobat Reader

35

media

TestOut Review Questions

Which kind of online attack involves pretending to be a

legitimate company to get sensitive information?

36

Multiple Choice

Which kind of online attack involves pretending to be a legitimate company to get sensitive information?

1

Spyware

2

Virus

3

Phishing

4

Spoofing

37

Multiple Choice

Which of the following BEST describes a programming sequence?

1

A list of subroutines used by a compiler.

2

A sequence of instructions that defines the input, processing, and output.

3

A list of steps written in pseudocode.

4

A graphical representation of the program processes.

38

Multiple Choice

Which of the following divides a single physical disk into multiple logical drives called volumes?

1

Partitioning

2

Journaling

3

Fragmentation

4

Defragmentation

39

Multiple Choice

Anna wrote a computer program for her software company. Which of the following protects her work?

1

Patent

2

Trade Secret

3

Copyright

4

Trademark

40

Multiple Choice

A user has opened a web browser and accessed a website where they are creating an account. The registration page is asking the user for their username (email address) and a password. The user looks at the URL and the protocol being used is HTTP. Which of the following describes how the data will be transmitted from the webpage to the webserver?

1

Cipher Text

2

Plain Text

3

AES encrypted message

4

WPA2 encryption

41

Multiple Choice

What is academic dishonesty?

1

Cheating on a test by looking at your peers responses

2

Using unauthorized materials during the exam

3

Submitting someone else's work as your own

4

All of these answer choices are examples

media

ITF+ TestOut

Frequently missed questions

Show answer

Auto Play

Slide 1 / 41

SLIDE