You are on page 1of 7

Digital Literacy

Answer the questions below with the most appropriate answer.

Benchmark C

1. Which is the most appropriate definition for DEMOCRATIC PARTICIPATION? a. The act of participating in a way so that your opinion, ideas and vote are heard by a whole group. b. The act of participating in a group so that the group follows your direction. c. The act of participating invidually so that the entire group benefits. d. The act of voicing your opinions, ideas and vote to convince others of your wisdom. 2. A network is: a. A group of people who work for you, so that you do not have to complete an entire task b. A group of people who you trust to do work in your place c. A group of people who you are never accountable to d. A group of people who can be helpful to one professionally, academically and/or socially 3. Which of the following best explains an effective proposal? a. A proposal is a suggestion that identifies a problem, presents a solution, predicts results and then makes a request for the recipient to answer back. b. A proposal identifies a solution, defines the results and then highlights the problem so that the recipient can answer back. c. A proposal presents results that will offer a solution. d. A proposal proposes a problem that can answer a solution. 4. What is the Internet? a. An assortment of ideas over the Web b. A network of many different computers connected together c. A server d. A web browser 5. A link allows you to: a. Make notes about the information on a web page b. Access a formal reference to an information source c. Instantly connect to another Web page 6. What is the home page of a Web Site? a. The starting point of a Web site, almost like the front cover of a book or magazine b. Where a Web author must list his/her credentials c. The best page of a website

Digital Literacy
Answer the questions below with the most appropriate answer.

Benchmark C

7. What two things happen when you place your cursor over a link? a. You return to the home page and back to the domain name. b. Your cursor turns into an arrow and the URL of the link appears in the lower left of your screen. c. Your cursor turns into a hand and URL of the link appears in lower left of your screen.

***True or False?*** 8. Search results between Yahoo and Google are consistenly the same. a. True b. False 9. A Website that has .org in its Web address can be owned by anybody. a. True b. False 10. What does the tilde (~) indicate in a URL? a. The posting is related to an educational institution b. The posting is related to government agencies c. The posting is a personal posting d. The posting is not in English 11. Programs like Prezi and Weebly are: a. Memory based presentation software b. Hardware based presentation software c. Cloud based presentation software d. Gig based presentation software 12. What is a character created by someone that can interact with others online? a. Avatar b. CC c. Impersonate d. Pandora 13. Cyberbullying takes place in which of the following: a. In emails b. In text messages c. In online games d. All of the above

Digital Literacy
Answer the questions below with the most appropriate answer.
14. On many social networks, this is a quick summary of who you are: a. Photobooth b. Avatar c. Profile d. Mutual friend

Benchmark C

15. On most social networking sites, once you connect with a friend, you can do all but the following: a. See their friends b. See which events you are both planning to attend c. Make sure that they only see certain portions of your profile d. Share photos and wall posts 16. Sound research includes correct: a. Paraphrasing of your research sources b. Citing of your research sources c. Works cited listings d. All of the above 17. Primary sources include: a. Interviews b. Biographical Books c. Online Journals d. The internet 18. What is the process for validating a source: a. Read the website, Examine the domain name, Ask about the publisher, Look at the Links b. Read the URL, Examine the content, Ask about the Authors, Look at the Links c. Review the website, Examine the links, Ask about the webmaster, Look at the Links d. Review the Links, Examine the domain name, Ask about the author, Look at the backlinks ***True or False?*** 19. Paraphrased material should be shorter than the original passage, taking a large part of the source and shortening it slightly. a. true b. false 20. Summarizing involves putting the main idea(s) into your own words, including all the details you think are somewhat important. a. true b. false

Digital Literacy
Answer the questions below with the most appropriate answer.

Benchmark C

21. In summarizing it is necessary to give credit for the summarized ideas to the original sources. a. true b. false 22. Summaries are much longer than the original. a. true b. false 23. The Cloud is: a. A form of word processing b. A network for accessing applications from any device c. A virtual gaming environment d. A kind of security software 24. People might increase their hard drive space if: a. They want a wireless internet connection b. They want to download lots of music files c. They want to store a tons of photos d. Both B and C
25. Location-Based services: a. Provide location related information which allows you to get directions to places b. Are only available on smart phones c. Are always free d. All of the above 26. True or False: Location based services are always free a. True b. False 27. What can an emergency service application do: a. Connect users to emergency services such as 911 b. Determine a persons location and relay it to an ambulance or the police c. Text safety tips to the owner of the phone d. Both A and B 28. Which of the following is true about roaming? a. Its when people use a cell-phone network different from their own b. Its a feature that can cause extra money to use c. Its the number one cause of interference for Smart phone users d. Both A and B 29. If a website begins with HTTPS that means that website is: a. Not safe b. Safer c. Blocked d. Both A and C

Digital Literacy
Answer the questions below with the most appropriate answer.
30. What are the most ideal privacy settings to have on your social networking site? a. Default b. Custom c. Recommended d. None of the above

Benchmark C

31. Like HTTPS Secure Socket Layer or SSL helps to: a. Keep a computer from getting viruses b. Prevent a computer from crashing c. Protect users who share personal information online d. All of the above 32. Which web domain(s) should be researched further? a. .gov b. .com c. .org d. B and C 33. Which of the following would best indicate that a website is credible? a. There are lots of social media links attached to the website b. The author of the website is considered an expert on the content c. The website was the first link to appear in a search engines list of related websites d. None of the above 34. True or false: paraphrasing an authors words in a paper without citing that author is probably ok because you are not using the authors exact words. a. True b. False 35. A well-maintained website should have: a. No spelling mistakes b. No grammar mistakes c. No working links d. A and B 36. While researching online it is important to recognize when an author has a viewpoint that doesnt take different or opposing viewpoints into consideration. This is known as: a. Racism b. Sexism c. Bias d. None of the above 37. Correctly paraphrasing is: a. Using the authors exact words but including a citation b. Rewriting the authors words in your own words and including a citation c. Rewriting the authors words in your own words but not including a citation d. None of the above 38. Which of the following domains might indicate that a website should be investigated further to make sure it is credible? a. .edu b. .net c. .gov d. None of the above 39. What application would be best for analyzing data? a. Spreadsheet b. Presentation software

Digital Literacy
Answer the questions below with the most appropriate answer.
c. Word processing d. None of the above 40. What is presentation software? a. A program used to display information usually in the form of a slideshow b. A program used to collect data c. A computer program that generates a worksheet d. Both b and c 41. Whats a good reason to start a blog? a. To share your opinions on a specific area of interest b. To post your class papers so other people can use them in the future c. To share someone elses pictures and comments as if they were your own d. All of the above 42. People may use a word processing program to: a. Create and edit text documents b. Communicate with people c. Edit video d. Sort and organize information to reference later 43. Which statement is true? a. Songs are protected by copyright b. Sharing music is always ok c. You can copyright ideas d. All of the above

Benchmark C

44. Which example is most likely protected by fair-use? a. Using a websites photo in a presentation for school b. Using your favorite cookie brands logo to sell your own cookies online c. Sharing copyrighted music online d. Both a and b 45. A good way to use presentation software would be to: a. Formally share your information with a group in a way that is visually engaging b. Record songs c. Edit images online d. Both a and b 46. Which of the following can be copyrighted? a. Images b. Facts c. Ideas d. All of the above 47. When might an activity be considered cyber-bullying a. If the activity could potentially hurt someones feelings b. If the activity targets a specific person c. If adults would approve of the activity d. Both a and b 48. What is the best thing for a person to do if they receive a threatening email from a cyber-bully? a. Save it as evidence b. Delete it c. Ignore it d. Respond with a counter threat 49. Which of the following statements is true? a. Most teens want stricter penalties for cyber bullying

Digital Literacy
Answer the questions below with the most appropriate answer.
b. c. d. Most teens dont think cyber bullying is a serious problem Most teens dont approve of cyber bullying Both a and c

Benchmark C

50. How can bystanders best help cyberbully victims? a. Tell them that what happened wasnt their fault b. Encourage them to talk to a trusted adult c. Help them confront the cyber bully d. Both a and b 51. Which of the following careers would be considered a STEM career? a. Civil engineer b. Fire fighter c. Senator d. Ballet instructor 52. What does STEM stand for? a. Studying, teaching, enriching and more b. Science, teaching, emerging, and miscellaneous c. Science, technology, engineering and mathematics d. Studying, technology, enriching and miscellaneous 53. What can be said about STEM careers impact on society? a. People in STEM careers dont benefit our society b. People in STEM careers often work to improve the society we live in with advanced technologies c. People in STEM careers are most likely doctors who keep us healthy d. People in STEM careers want to reduce societies reliance on technology 54. How had technology change life for businessmen and businesswomen? a. Technology has made communication with people all over the world easier and faster b. With technology products that could only be sold locally can now be sold in more places c. A and B d. None of the above 55. What can be said about technology and the global market? a. Technology has expanded the global market b. Technology has made the global market smaller c. Technology has eliminated the global market d. Technology has not affected the global market

You might also like