Search Header Logo
Computer Literacy Unit 1 Review

Computer Literacy Unit 1 Review

Assessment

Presentation

Computers

6th - 8th Grade

Practice Problem

Medium

Created by

Amy Murray

Used 6+ times

FREE Resource

2 Slides • 52 Questions

1

Test Review!

Today, we will practice for our UNIT TEST!
Do Now: Name one topic we have covered this unit in the chat. Then, add your GOOD THINGS in chat!

media
media

2

Multiple Choice

Which of the following is the most effective password?

1

bankaccount1

2

M3r(urY

3

merc_ury

3

Multiple Choice

Which of the following describes the phishing method of information security crime?

1

physically interacting with the victim and using her computer when she is not looking

2

rifling through recycling bins to find account information

3

pretending to be someone else when asking for information

4

all of these

4

Multiple Choice

Which of these image sizes takes the most storage space?

1

one megabyte

2

one gigabyte

3

one kilobyte

5

Multiple Choice

Which of these is a valid use of the Reply All feature?

1

correcting someone's spelling mistake in an e-mail

2

responding with "I agree" or "me too"

3

responding with "please take me off your list"

4

none of these

6

Multiple Choice

Is this statement true or false?

A plain text e-mail and the same text entered into a word processing document would be about the same file sizes.

1

true

2

false

7

Multiple Choice

Is this statement true or false?

Phishing sites do not try to steal your personal information.

1

true

2

false

8

Multiple Choice

Is this statement true or false?

Disabling cookies prevents you from being the victim of a virus.

1

true

2

false

9

Multiple Choice

Is this statement true or false?

Removing a virus from your system is easily done with a reboot.

1

true

2

false

10

Multiple Choice

Is this statement true or false?

A firewall, when properly implemented, can prevent most attacks on your system.

1

true

2

false

11

Multiple Choice

Which of the following is the most effective password?

1

bankaccount1

2

M3r(urY

3

merc_ury

12

Multiple Choice

The Blind carbon copy (Bcc) should be used when you want to __________.

1

share a conversation you are having with someone else with your boss

2

give someone advice without that person realizing other people are seeing it

3

send the same message out to a group of people but want to prevent a global reply

13

Multiple Choice

Which of the following is the most effective password?

1

bankaccount1

2

M3r(urY

3

merc_ury

14

Multiple Choice

Which of the following describes the phishing method of information security crime?

1

physically interacting with the victim and using her computer when she is not looking

2

rifling through recycling bins to find account information

3

pretending to be someone else when asking for information

4

all of these

15

Multiple Choice

Which of these image sizes takes the most storage space?

1

one megabyte

2

one gigabyte

3

one kilobyte

16

Multiple Choice

Which of these is a valid use of the Reply All feature?

1

correcting someone's spelling mistake in an e-mail

2

responding with "I agree" or "me too"

3

responding with "please take me off your list"

4

none of these

17

Multiple Choice

Is this statement true or false?

A plain text e-mail and the same text entered into a word processing document would be about the same file sizes.

1

true

2

false

18

Multiple Choice

Is this statement true or false?

Phishing sites do not try to steal your personal information.

1

true

2

false

19

Multiple Choice

Is this statement true or false?

Disabling cookies prevents you from being the victim of a virus.

1

true

2

false

20

Multiple Choice

Is this statement true or false?

Removing a virus from your system is easily done with a reboot.

1

true

2

false

21

Multiple Choice

Is this statement true or false?

A firewall, when properly implemented, can prevent most attacks on your system.

1

true

2

false

22

Multiple Choice

The Blind carbon copy (Bcc) should be used when you want to __________.

1

share a conversation you are having with someone else with your boss

2

give someone advice without that person realizing other people are seeing it

3

send the same message out to a group of people but want to prevent a global reply

23

Multiple Choice

Which of the following is the most effective password?

1

bankaccount1

2

M3r(urY

3

merc_ury

24

Multiple Choice

Which of the following describes the phishing method of information security crime?

1

physically interacting with the victim and using her computer when she is not looking

2

rifling through recycling bins to find account information

3

pretending to be someone else when asking for information

4

all of these

25

Multiple Choice

Which of these image sizes takes the most storage space?

1

one megabyte

2

one gigabyte

3

one kilobyte

26

Multiple Choice

Which of these is a valid use of the Reply All feature?

1

correcting someone's spelling mistake in an e-mail

2

responding with "I agree" or "me too"

3

responding with "please take me off your list"

4

none of these

27

Multiple Choice

Is this statement true or false?

A plain text e-mail and the same text entered into a word processing document would be about the same file sizes.

1

true

2

false

28

Multiple Choice

Is this statement true or false?

Phishing sites do not try to steal your personal information.

1

true

2

false

29

Multiple Choice

Is this statement true or false?

Disabling cookies prevents you from being the victim of a virus.

1

true

2

false

30

Multiple Choice

Is this statement true or false?

Removing a virus from your system is easily done with a reboot.

1

true

2

false

31

Multiple Choice

Is this statement true or false?

A firewall, when properly implemented, can prevent most attacks on your system.

1

true

2

false

32

Multiple Choice

The Blind carbon copy (Bcc) should be used when you want to __________.

1

share a conversation you are having with someone else with your boss

2

give someone advice without that person realizing other people are seeing it

3

send the same message out to a group of people but want to prevent a global reply

33

Multiple Choice

Which of the following is the most effective password?

1

bankaccount1

2

M3r(urY

3

merc_ury

34

Multiple Choice

Which of the following describes the phishing method of information security crime?

1

physically interacting with the victim and using her computer when she is not looking

2

rifling through recycling bins to find account information

3

pretending to be someone else when asking for information

4

all of these

35

Multiple Choice

Which of these image sizes takes the most storage space?

1

one megabyte

2

one gigabyte

3

one kilobyte

36

Multiple Choice

Which of these is a valid use of the Reply All feature?

1

correcting someone's spelling mistake in an e-mail

2

responding with "I agree" or "me too"

3

responding with "please take me off your list"

4

none of these

37

Multiple Choice

Is this statement true or false?

A plain text e-mail and the same text entered into a word processing document would be about the same file sizes.

1

true

2

false

38

Multiple Choice

Is this statement true or false?

Phishing sites do not try to steal your personal information.

1

true

2

false

39

Multiple Choice

Is this statement true or false?

Disabling cookies prevents you from being the victim of a virus.

1

true

2

false

40

Multiple Choice

Is this statement true or false?

Removing a virus from your system is easily done with a reboot.

1

true

2

false

41

Multiple Choice

Is this statement true or false?

A firewall, when properly implemented, can prevent most attacks on your system.

1

true

2

false

42

Multiple Choice

The Blind carbon copy (Bcc) should be used when you want to __________.

1

share a conversation you are having with someone else with your boss

2

give someone advice without that person realizing other people are seeing it

3

send the same message out to a group of people but want to prevent a global reply

43

Multiple Choice

Which of the following is the most effective password?

1

bankaccount1

2

M3r(urY

3

merc_ury

44

Multiple Choice

Which of the following describes the phishing method of information security crime?

1

physically interacting with the victim and using her computer when she is not looking

2

rifling through recycling bins to find account information

3

pretending to be someone else when asking for information

4

all of these

45

Multiple Choice

Which of these image sizes takes the most storage space?

1

one megabyte

2

one gigabyte

3

one kilobyte

46

Multiple Choice

Which of these is a valid use of the Reply All feature?

1

correcting someone's spelling mistake in an e-mail

2

responding with "I agree" or "me too"

3

responding with "please take me off your list"

4

none of these

47

Multiple Choice

Is this statement true or false?

A plain text e-mail and the same text entered into a word processing document would be about the same file sizes.

1

true

2

false

48

Multiple Choice

Is this statement true or false?

Phishing sites do not try to steal your personal information.

1

true

2

false

49

Multiple Choice

Is this statement true or false?

Disabling cookies prevents you from being the victim of a virus.

1

true

2

false

50

Multiple Choice

Is this statement true or false?

Removing a virus from your system is easily done with a reboot.

1

true

2

false

51

Multiple Choice

Is this statement true or false?

A firewall, when properly implemented, can prevent most attacks on your system.

1

true

2

false

52

Multiple Choice

The Blind carbon copy (Bcc) should be used when you want to __________.

1

share a conversation you are having with someone else with your boss

2

give someone advice without that person realizing other people are seeing it

3

send the same message out to a group of people but want to prevent a global reply

53

Thanks for playing!

media

​You may now use your remaining class time to take or retake your test. I will not close the classroom until 3:15 in case you have questions for me.

54

Multiple Choice

Which of the following describes the phishing method of information security crime?

1

physically interacting with the victim and using her computer when she is not looking

2

rifling through recycling bins to find account information

3

pretending to be someone else when asking for information

4

all of these

Test Review!

Today, we will practice for our UNIT TEST!
Do Now: Name one topic we have covered this unit in the chat. Then, add your GOOD THINGS in chat!

media
media

Show answer

Auto Play

Slide 1 / 54

SLIDE