
TestOut_MostMissed
Presentation
•
Computers
•
9th Grade
•
Practice Problem
•
Medium
Brandi Nguyen
Used 7+ times
FREE Resource
27 Slides • 14 Questions
1
ITF+ TestOut
Frequently missed questions
2
Academic Dishonesty
Academic dishonesty refers to any type of cheating, dishonest, or fraudulent behavior that occurs in an
academic setting, such as a school, college, or university. Examples of academic dishonesty include
plagiarism, cheating on exams, fabrication or falsification of data, unauthorized collaboration, and
submitting work completed by others as one's own.
Cheating on exams is another form of academic dishonesty, and it can involve activities such as copying
from another student's paper, using unauthorized materials during the exam, or collaborating with other
students during the exam.
Overall, academic dishonesty undermines the integrity of the academic process and can have serious
consequences for both the individual student and the academic institution. Most academic institutions
have strict policies and penalties in place for academic dishonesty, ranging from failing a course or
assignment to suspension or expulsion from the institution.
3
What are some examples of
Academic Dishonesty?
I’m glad you asked!
We have some real life examples of academic dishonesty from
yesterday’s qualification exam.
4
What are some examples of
Academic Dishonesty?
Examples include (but are not limited to)
Directly copying
and pasting test
questions into ChatGPT
5
What are some examples of
Academic Dishonesty?
Examples include (but are not limited to)
Using Google to
search for answers
6
What are consequences of
Academic Dishonesty?
▪ Phone Call/Email/Letter to parent or guardian
▪ Student may be assigned a zero for the assignment at the
teacher’s discretion
▪ No higher than a “S” for the conduct grade
▪ Disqualification of voucher
7
3.0 Applications and Software
Which of the following is the BEST example of using an
application that is locally installed without network
access?
Most missed
question
8
Multiple Choice
Which of the following is the BEST example of using an application that is locally installed without network access?
Accessing a company folder through a VPN application.
Viewing the latest email in your Outlook Inbox.
Writing a letter using the Google Docs application.
Creating a PowerPoint presentation for a team meeting.
9
3.0 Applications and Software
ANSWER:
Creating a PowerPoint presentation for a team meeting.
This question is asking about using a software installed on your PC
that does not require network access.
PowerPoint is an application that is installed on your machine and you
do not need access to the network to use it.
Most missed
question
10
3.0 Applications and Software
WHY IS IT NOT….?
Writing a letter using the Google Docs application.
Viewing the latest email in your Outlook Inbox.
Accessing a company folder through a VPN application.
Google Docs is a word processor that you usually need Internet access
to use.
Outlook requires network access to download your latest email
Accessing a company folder through VPN needs internet access
Most missed
question
11
2.0 Infrastructure
What precaution should you always take when using a
public access point?
2nd most missed
question
12
Multiple Choice
What precaution should you always take when using a public access point?
Use a strong password when accessing websites.
You should never use public access points.
Ensure sites are using HTTPS.
Don't perform secure tasks, such as online banking.
13
2.0 Infrastructure
ANSWER:
Ensure sites are using HTTPS.
2nd most missed
question
14
2.0 Infrastructure
WHY IS IT NOT….?
Don't perform secure tasks, such as online banking.
You should never use public access points.
Use a strong password when accessing websites.
While many of these answer choices are good practices, the BEST
answer choice is make sure you are using a secure website with https:
2nd most missed
question
15
3.0 Applications and Software
Which of the following divides a single physical disk into
multiple logical drives called volumes?
3rd most missed
question
16
Multiple Choice
Which of the following divides a single physical disk into multiple logical drives called volumes?
Journaling
Fragmentation
Defragmentation
Partitioning
17
3.0 Applications and Software
ANSWER:
Partitioning
Partitioning is the process of dividing a single physical disk into multiple
logical drives called volumes
3rd most missed
question
18
3.0 Applications and Software
WHY IS IT NOT….?
Fragmentation
Defragmentation
Journaling
Fragmentation is what occurs when a file is saved to a hard drive but
there is not enough contiguous space available to save the entire file in
one piece. The file gets saved in fragments on other parts of the hard
drive.
Defragmentation is a utility that helps rearrange the files on the hard
drive to optimize performance.
Journaling logs all file system changes before they are written to the
hard drive
3rd most missed
question
19
4.0 Programming
Which of the following BEST describes a programming
sequence?
4th most missed
question
20
Multiple Choice
Which of the following BEST describes a programming sequence?
A list of subroutines used by a compiler.
A sequence of instructions that defines the input, processing, and output.
A list of steps written in pseudocode.
A graphical representation of the program processes.
21
4.0 Programming
ANSWER:
A sequence of instructions that defines the input,
processing, and output.
This describes the basic structure of a program.
In programming, a sequence of instructions is used to define the steps that a
program takes to process the input data and produce the desired output. This
sequence typically includes statements or commands that manipulate data,
perform calculations, make decisions, and control the flow of the program.
4th most missed
question
22
4.0 Programming
WHY IS IT NOT….?
A list of subroutines used by a compiler.
A list of steps written in pseudocode.
A graphical representation of the program processes.
A list of subroutines used by a compiler is known as a library. These are
pre-written code modules that are used to perform common functions.
A list of steps written in pseudocode can be an algorithm. An algorithm
is a set of rules to be followed in order to solve a problem. Algorithms
can be written in natural language, flowcharts, or pseudocode.
A graphical representation of the program process is known as a
flowchart.
23
6.0 Security
Which of the following can be configured at the border
of your network to control the flow of network traffic
and protect systems from unauthorized network
connections? (Select two.)
24
Multiple Select
Which of the following can be configured at the border of your network to control the flow of network traffic and protect systems from unauthorized network connections? (Select two.)
Host firewalls
Network firewalls
Anti-malware software
Windows Defender
Proxy servers
25
6.0 Security
ANSWER:
Network Firewalls, Proxy Server
This question specifically asks what can configured for the border of your
network.
Network Firewalls are more effective than host firewalls and they are at the
border of your network. With network firewalls, you get centralized control,
protection for all hosts on your network, and advanced filtering capabilities.
A proxy server can serve as an intermediary between devices on the
network and the internet. When a device requests access to a website, the
request is sent to a proxy server instead of the internet.
26
6.0 Security
WHY IS IT NOT….?
Host firewall
Anti-malware software
Windows Defender
A host firewall is usually configured on an
individual host. It is not considered the
border of your network.
Anti-malware software is designed to
scan incoming traffic for malware, block
known threats, and alert admins to
security risks.
Windows Defender is another antivirus
and anti-malware software that comes
with Windows.
Anti-malware software and applications
do not control the flow of network traffic
and unauthorized network connections
27
6.0 Security
Which kind of online attack involves pretending to be a
legitimate company to get sensitive information?
28
Multiple Choice
Which kind of online attack involves pretending to be a legitimate company to get sensitive information?
Phishing
Spyware
Spoofing
Virus
29
6.0 Security
ANSWER:
Phishing
Phishing is the type of attack that involves pretending to be a
legitimate company to get sensitive information. This attack
usually involves sending emails that appear to be from a trusted
source, like a bank. However, the emails contain links to fake
websites that mimic the appearance of the legitimate site and
ask the user for credentials.
30
6.0 Security
WHY IS IT NOT….?
Spoofing
Spyware
Virus
Spoofing is the practice of creating a forged identify to deceive a user. Spoofing attacks
include IP Spoofing, Email Spoofing or Caller Spoofing. Remember, to view the original
message header to view additional details to prevent falling a victim.
Spyware is a type of software designed to monitor a user’s activity without the user’s
knowledge or consent.
A virus is a type of malicious software that is designed to replicate itself and spread from
one device to another. It can steal personal information or delete files.
31
TestOut Review Questions
REVIEW
32
Multiple Choice
Which of the following is the BEST example of using an application that is locally installed without network access?
Accessing a company folder through a VPN application.
Creating a PowerPoint presentation for a team meeting.
Writing a letter using the Google Docs application.
Viewing the latest email in your Outlook Inbox.
33
TestOut Review Questions
Which of the following runs exclusively from the cloud,
relying on cloud technologies? (Select two.)
34
Multiple Select
Which of the following runs exclusively from the cloud, relying on cloud technologies? (Select two.)
Microsoft Word
Google Drive
Adobe Photoshop
Dropbox
Adobe Acrobat Reader
35
TestOut Review Questions
Which kind of online attack involves pretending to be a
legitimate company to get sensitive information?
36
Multiple Choice
Which kind of online attack involves pretending to be a legitimate company to get sensitive information?
Spyware
Virus
Phishing
Spoofing
37
Multiple Choice
Which of the following BEST describes a programming sequence?
A list of subroutines used by a compiler.
A sequence of instructions that defines the input, processing, and output.
A list of steps written in pseudocode.
A graphical representation of the program processes.
38
Multiple Choice
Which of the following divides a single physical disk into multiple logical drives called volumes?
Partitioning
Journaling
Fragmentation
Defragmentation
39
Multiple Choice
Anna wrote a computer program for her software company. Which of the following protects her work?
Patent
Trade Secret
Copyright
Trademark
40
Multiple Choice
A user has opened a web browser and accessed a website where they are creating an account. The registration page is asking the user for their username (email address) and a password. The user looks at the URL and the protocol being used is HTTP. Which of the following describes how the data will be transmitted from the webpage to the webserver?
Cipher Text
Plain Text
AES encrypted message
WPA2 encryption
41
Multiple Choice
What is academic dishonesty?
Cheating on a test by looking at your peers responses
Using unauthorized materials during the exam
Submitting someone else's work as your own
All of these answer choices are examples
ITF+ TestOut
Frequently missed questions
Show answer
Auto Play
Slide 1 / 41
SLIDE
Similar Resources on Wayground
38 questions
Mitosis
Presentation
•
9th Grade
34 questions
For цикл
Presentation
•
KG
35 questions
Byzantine Empire
Presentation
•
9th Grade
34 questions
Linear, Quadratic, or Exponential?
Presentation
•
9th Grade
36 questions
Subject Verb Agreement
Presentation
•
KG - 9th Grade
36 questions
Rules with Exponents
Presentation
•
9th Grade
37 questions
Macromolecules
Presentation
•
9th - 10th Grade
Popular Resources on Wayground
15 questions
Grade 3 Simulation Assessment 1
Quiz
•
3rd Grade
22 questions
HCS Grade 4 Simulation Assessment_1 2526sy
Quiz
•
4th Grade
16 questions
Grade 3 Simulation Assessment 2
Quiz
•
3rd Grade
19 questions
HCS Grade 5 Simulation Assessment_1 2526sy
Quiz
•
5th Grade
17 questions
HCS Grade 4 Simulation Assessment_2 2526sy
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
24 questions
HCS Grade 5 Simulation Assessment_2 2526sy
Quiz
•
5th Grade
20 questions
Math Review
Quiz
•
3rd Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
20 questions
Inventor Terms Exercise #1a
Quiz
•
9th Grade
31 questions
Inventor Vocabulary Review Sheet
Quiz
•
9th Grade
10 questions
Exploring Cybersecurity Techniques and Threats
Interactive video
•
6th - 10th Grade