
Computer Literacy Unit 1 Review
Presentation
•
Computers
•
6th - 8th Grade
•
Practice Problem
•
Medium
Amy Murray
Used 6+ times
FREE Resource
2 Slides • 52 Questions
1
Test Review!
Today, we will practice for our UNIT TEST!
Do Now: Name one topic we have covered this unit in the chat. Then, add your GOOD THINGS in chat!
2
Multiple Choice
Which of the following is the most effective password?
bankaccount1
M3r(urY
merc_ury
3
Multiple Choice
Which of the following describes the phishing method of information security crime?
physically interacting with the victim and using her computer when she is not looking
rifling through recycling bins to find account information
pretending to be someone else when asking for information
all of these
4
Multiple Choice
Which of these image sizes takes the most storage space?
one megabyte
one gigabyte
one kilobyte
5
Multiple Choice
Which of these is a valid use of the Reply All feature?
correcting someone's spelling mistake in an e-mail
responding with "I agree" or "me too"
responding with "please take me off your list"
none of these
6
Multiple Choice
Is this statement true or false?
A plain text e-mail and the same text entered into a word processing document would be about the same file sizes.
true
false
7
Multiple Choice
Is this statement true or false?
Phishing sites do not try to steal your personal information.
true
false
8
Multiple Choice
Is this statement true or false?
Disabling cookies prevents you from being the victim of a virus.
true
false
9
Multiple Choice
Is this statement true or false?
Removing a virus from your system is easily done with a reboot.
true
false
10
Multiple Choice
Is this statement true or false?
A firewall, when properly implemented, can prevent most attacks on your system.
true
false
11
Multiple Choice
Which of the following is the most effective password?
bankaccount1
M3r(urY
merc_ury
12
Multiple Choice
The Blind carbon copy (Bcc) should be used when you want to __________.
share a conversation you are having with someone else with your boss
give someone advice without that person realizing other people are seeing it
send the same message out to a group of people but want to prevent a global reply
13
Multiple Choice
Which of the following is the most effective password?
bankaccount1
M3r(urY
merc_ury
14
Multiple Choice
Which of the following describes the phishing method of information security crime?
physically interacting with the victim and using her computer when she is not looking
rifling through recycling bins to find account information
pretending to be someone else when asking for information
all of these
15
Multiple Choice
Which of these image sizes takes the most storage space?
one megabyte
one gigabyte
one kilobyte
16
Multiple Choice
Which of these is a valid use of the Reply All feature?
correcting someone's spelling mistake in an e-mail
responding with "I agree" or "me too"
responding with "please take me off your list"
none of these
17
Multiple Choice
Is this statement true or false?
A plain text e-mail and the same text entered into a word processing document would be about the same file sizes.
true
false
18
Multiple Choice
Is this statement true or false?
Phishing sites do not try to steal your personal information.
true
false
19
Multiple Choice
Is this statement true or false?
Disabling cookies prevents you from being the victim of a virus.
true
false
20
Multiple Choice
Is this statement true or false?
Removing a virus from your system is easily done with a reboot.
true
false
21
Multiple Choice
Is this statement true or false?
A firewall, when properly implemented, can prevent most attacks on your system.
true
false
22
Multiple Choice
The Blind carbon copy (Bcc) should be used when you want to __________.
share a conversation you are having with someone else with your boss
give someone advice without that person realizing other people are seeing it
send the same message out to a group of people but want to prevent a global reply
23
Multiple Choice
Which of the following is the most effective password?
bankaccount1
M3r(urY
merc_ury
24
Multiple Choice
Which of the following describes the phishing method of information security crime?
physically interacting with the victim and using her computer when she is not looking
rifling through recycling bins to find account information
pretending to be someone else when asking for information
all of these
25
Multiple Choice
Which of these image sizes takes the most storage space?
one megabyte
one gigabyte
one kilobyte
26
Multiple Choice
Which of these is a valid use of the Reply All feature?
correcting someone's spelling mistake in an e-mail
responding with "I agree" or "me too"
responding with "please take me off your list"
none of these
27
Multiple Choice
Is this statement true or false?
A plain text e-mail and the same text entered into a word processing document would be about the same file sizes.
true
false
28
Multiple Choice
Is this statement true or false?
Phishing sites do not try to steal your personal information.
true
false
29
Multiple Choice
Is this statement true or false?
Disabling cookies prevents you from being the victim of a virus.
true
false
30
Multiple Choice
Is this statement true or false?
Removing a virus from your system is easily done with a reboot.
true
false
31
Multiple Choice
Is this statement true or false?
A firewall, when properly implemented, can prevent most attacks on your system.
true
false
32
Multiple Choice
The Blind carbon copy (Bcc) should be used when you want to __________.
share a conversation you are having with someone else with your boss
give someone advice without that person realizing other people are seeing it
send the same message out to a group of people but want to prevent a global reply
33
Multiple Choice
Which of the following is the most effective password?
bankaccount1
M3r(urY
merc_ury
34
Multiple Choice
Which of the following describes the phishing method of information security crime?
physically interacting with the victim and using her computer when she is not looking
rifling through recycling bins to find account information
pretending to be someone else when asking for information
all of these
35
Multiple Choice
Which of these image sizes takes the most storage space?
one megabyte
one gigabyte
one kilobyte
36
Multiple Choice
Which of these is a valid use of the Reply All feature?
correcting someone's spelling mistake in an e-mail
responding with "I agree" or "me too"
responding with "please take me off your list"
none of these
37
Multiple Choice
Is this statement true or false?
A plain text e-mail and the same text entered into a word processing document would be about the same file sizes.
true
false
38
Multiple Choice
Is this statement true or false?
Phishing sites do not try to steal your personal information.
true
false
39
Multiple Choice
Is this statement true or false?
Disabling cookies prevents you from being the victim of a virus.
true
false
40
Multiple Choice
Is this statement true or false?
Removing a virus from your system is easily done with a reboot.
true
false
41
Multiple Choice
Is this statement true or false?
A firewall, when properly implemented, can prevent most attacks on your system.
true
false
42
Multiple Choice
The Blind carbon copy (Bcc) should be used when you want to __________.
share a conversation you are having with someone else with your boss
give someone advice without that person realizing other people are seeing it
send the same message out to a group of people but want to prevent a global reply
43
Multiple Choice
Which of the following is the most effective password?
bankaccount1
M3r(urY
merc_ury
44
Multiple Choice
Which of the following describes the phishing method of information security crime?
physically interacting with the victim and using her computer when she is not looking
rifling through recycling bins to find account information
pretending to be someone else when asking for information
all of these
45
Multiple Choice
Which of these image sizes takes the most storage space?
one megabyte
one gigabyte
one kilobyte
46
Multiple Choice
Which of these is a valid use of the Reply All feature?
correcting someone's spelling mistake in an e-mail
responding with "I agree" or "me too"
responding with "please take me off your list"
none of these
47
Multiple Choice
Is this statement true or false?
A plain text e-mail and the same text entered into a word processing document would be about the same file sizes.
true
false
48
Multiple Choice
Is this statement true or false?
Phishing sites do not try to steal your personal information.
true
false
49
Multiple Choice
Is this statement true or false?
Disabling cookies prevents you from being the victim of a virus.
true
false
50
Multiple Choice
Is this statement true or false?
Removing a virus from your system is easily done with a reboot.
true
false
51
Multiple Choice
Is this statement true or false?
A firewall, when properly implemented, can prevent most attacks on your system.
true
false
52
Multiple Choice
The Blind carbon copy (Bcc) should be used when you want to __________.
share a conversation you are having with someone else with your boss
give someone advice without that person realizing other people are seeing it
send the same message out to a group of people but want to prevent a global reply
53
Thanks for playing!
You may now use your remaining class time to take or retake your test. I will not close the classroom until 3:15 in case you have questions for me.
54
Multiple Choice
Which of the following describes the phishing method of information security crime?
physically interacting with the victim and using her computer when she is not looking
rifling through recycling bins to find account information
pretending to be someone else when asking for information
all of these
Test Review!
Today, we will practice for our UNIT TEST!
Do Now: Name one topic we have covered this unit in the chat. Then, add your GOOD THINGS in chat!
Show answer
Auto Play
Slide 1 / 54
SLIDE
Similar Resources on Wayground
50 questions
Recipe Math
Presentation
•
7th - 8th Grade
53 questions
The immune system and more
Presentation
•
6th - 8th Grade
51 questions
KS3 E-Safety 2: Respectful Communication
Presentation
•
7th Grade
45 questions
quizizz教學
Presentation
•
6th - 8th Grade
46 questions
Forces
Presentation
•
6th - 8th Grade
49 questions
Electricity and Magnetism
Presentation
•
6th - 8th Grade
48 questions
Figurative Language Review
Presentation
•
6th - 8th Grade
46 questions
Cells
Presentation
•
6th - 8th Grade
Popular Resources on Wayground
20 questions
"What is the question asking??" Grades 3-5
Quiz
•
1st - 5th Grade
20 questions
“What is the question asking??” Grades 6-8
Quiz
•
6th - 8th Grade
10 questions
Fire Safety Quiz
Quiz
•
12th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
34 questions
STAAR Review 6th - 8th grade Reading Part 1
Quiz
•
6th - 8th Grade
20 questions
“What is the question asking??” English I-II
Quiz
•
9th - 12th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
47 questions
8th Grade Reading STAAR Ultimate Review!
Quiz
•
8th Grade