Nothing Special   »   [go: up one dir, main page]

I. Multiple Choice. Choose The Letter of The Correct Answer

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 37

VISUAL BASIC PROGRAMING ESSENTIALS

I. Multiple Choice. Choose the letter of the correct answer.


1) Which of the following is NOT a rule listed in Computer Ethics?
A. Thou shalt not use a computer to email.
B. Thou shalt not use a computer to cyber bully.
C. Thou shalt not use a computer to interfere with other people's computer
work.
D. Thou shalt not use a computer to be nosy or snoop into other people's
computer files.
E. Thou shalt not use a computer to steal.
2) Which is an example of plagiarism?
A. Reading a paragraph online and retyping it in your own words.
B. Copying and pasting someone else's work into your paper using quotation
marks and citing the author
C. Typing a paper in your own words
D. Copying and pasting a sentence from the Internet into your paper.
3) Which type of software or materials is not allowed to be copied of?
A. public-domain
B. copyrighted
C. self-created
D. self-published
4) Which is NOT a consequence of plagiarism?
A. You can get kicked out of college.
B. You can make a zero on your assignment.
C. You can get fired from your job.
D. You could get a warning from your college professor.
5) Which of the TWO ways should be prevented to stop cyber bullying?
A. Forward a mean message about a bully to your friends
B. Tell a parent, teacher, or administrator
C. Not forwarding mean texts sent you about a classmate
D. Use instant messenger to talk to your friends about someone's outfit you did
not like that day at school
6) Which is NOT a consequence of copying or distributing copyrighted software?
A. Community Service
B. Inprisonment
C. up to $10,000 in legal fees
D. up to $50,000 in civil fees
7) Which is NOT an example of cyber bullying?
A. creating an embarrassing picture of your classmate and forwarding it to
your friend's email addresses
B. sending someone a mean text
C. bullying someone in the hallway
D. threatening someone in an instant message
8) Which is not a type of cyberbully?
A. "Mean Girls"

1
UNIT 1: TECHNOLOGY GUIDELINES
UNIT 1 VISUAL BASIC PROGRAMING ESSENTIALS

B. Power Hungery or Revenge of the Nerds


C. Big, Bad Bully
D. The Vengeful Angel
E. The Inadvertent Cyberbully "Because I Can"
9) What are computer ethics?
A. an honest, moral code that should be followed when on the computer
B. a computer program about honesty
C. a computer that fits on or under a desk
D. a list of commandments in the Bible
10) Which of the following is NOT a rule listed in Computer Ethics?
A. Thou Shall not use a computer to lie.
B. Thou Shall not copy copyrighted software and materials.
C. Thou Shall not let others borrow your computer.
D. Thou shall not use a computer to plagiarize.
E. Thou Shall respect other at all times when using the computer.
II. Identification. Identify the term/s that is described in the statement.
1. Attempt to get unauthorized access to the target computer or restricted data
and view, compromise or exploit its contents.
2. A program that replicates by appending a piece of its code to an otherwise
harmless executable file.
3. Receiving or sending nasty, offensive or hurtful message online to others.
4. You may have spyware on your computer which can cause your performance of
the computer to be slower do to many.
5. Causes emails to be victims of tons and tons of junk mail.
6. This type of software is on computers and collects small pieces of information
from users.
7. Many malware programs gather information that leads to loss of privacy. How
can you generally be protected from this?
8. The part of the Internet that enables information-sharing via interconnected
pages.
9. The address of a document or "page" on the World Wide Web.

10. The Internet was developed in?

Anti-Virus Program Bullying Hacker Computer

virus Popups Spam Early 90’s

Spyware World wide Web URL

III. ACRONYM Identify the following acronyms. (10 Points)

2
UNIT 1: TECHNOLOGY GUIDELINES
VISUAL BASIC PROGRAMING ESSENTIALS

UNIT 1
1. WWW
2. HTTP
3. B2B
4. SMS
5. MMS
6. ISACA
7. ISC
8. B2B
9. MOD
10. URL

IV. Create a flowchart in a given pseudo code (5 pts.)

Begin
Take a Bath
Comb Hair
Eat Breakfast
Brush Teeth
Wait for School Bus
End

3
UNIT 1: TECHNOLOGY GUIDELINES
UNIT 1 VISUAL BASIC PROGRAMING ESSENTIALS

4
UNIT 1: TECHNOLOGY GUIDELINES
VISUAL BASIC PROGRAMING ESSENTIALS

UNIT 1

5
UNIT 1: TECHNOLOGY GUIDELINES
UNIT 1 VISUAL BASIC PROGRAMING ESSENTIALS

6
UNIT 1: TECHNOLOGY GUIDELINES
VISUAL BASIC PROGRAMING ESSENTIALS

UNIT 1

7
UNIT 1: TECHNOLOGY GUIDELINES
UNIT 1 VISUAL BASIC PROGRAMING ESSENTIALS

8
UNIT 1: TECHNOLOGY GUIDELINES
VISUAL BASIC PROGRAMING ESSENTIALS

UNIT 1

9
UNIT 1: TECHNOLOGY GUIDELINES
UNIT 1 VISUAL BASIC PROGRAMING ESSENTIALS

10
UNIT 1: TECHNOLOGY GUIDELINES
VISUAL BASIC PROGRAMING ESSENTIALS

UNIT 1

11
UNIT 1: TECHNOLOGY GUIDELINES
UNIT 1 VISUAL BASIC PROGRAMING ESSENTIALS

12
UNIT 1: TECHNOLOGY GUIDELINES
VISUAL BASIC PROGRAMING ESSENTIALS

UNIT 1

13
UNIT 1: TECHNOLOGY GUIDELINES
UNIT 1 VISUAL BASIC PROGRAMING ESSENTIALS

14
UNIT 1: TECHNOLOGY GUIDELINES
VISUAL BASIC PROGRAMING ESSENTIALS

UNIT 1

15
UNIT 1: TECHNOLOGY GUIDELINES
UNIT 1 VISUAL BASIC PROGRAMING ESSENTIALS

16
UNIT 1: TECHNOLOGY GUIDELINES
VISUAL BASIC PROGRAMING ESSENTIALS

UNIT 1

17
UNIT 1: TECHNOLOGY GUIDELINES
UNIT 1 VISUAL BASIC PROGRAMING ESSENTIALS

18
UNIT 1: TECHNOLOGY GUIDELINES
VISUAL BASIC PROGRAMING ESSENTIALS

UNIT 1

19
UNIT 1: TECHNOLOGY GUIDELINES
UNIT 1 VISUAL BASIC PROGRAMING ESSENTIALS

20
UNIT 1: TECHNOLOGY GUIDELINES
VISUAL BASIC PROGRAMING ESSENTIALS

UNIT 1

21
UNIT 1: TECHNOLOGY GUIDELINES
UNIT 1 VISUAL BASIC PROGRAMING ESSENTIALS

22
UNIT 1: TECHNOLOGY GUIDELINES
VISUAL BASIC PROGRAMING ESSENTIALS

UNIT 1

23
UNIT 1: TECHNOLOGY GUIDELINES
UNIT 1 VISUAL BASIC PROGRAMING ESSENTIALS

24
UNIT 1: TECHNOLOGY GUIDELINES
VISUAL BASIC PROGRAMING ESSENTIALS

UNIT 1

25
UNIT 1: TECHNOLOGY GUIDELINES
UNIT 1 VISUAL BASIC PROGRAMING ESSENTIALS

26
UNIT 1: TECHNOLOGY GUIDELINES
VISUAL BASIC PROGRAMING ESSENTIALS

UNIT 1

27
UNIT 1: TECHNOLOGY GUIDELINES
UNIT 1 VISUAL BASIC PROGRAMING ESSENTIALS

28
UNIT 1: TECHNOLOGY GUIDELINES
VISUAL BASIC PROGRAMING ESSENTIALS

UNIT 1

29
UNIT 1: TECHNOLOGY GUIDELINES
UNIT 1 VISUAL BASIC PROGRAMING ESSENTIALS

30
UNIT 1: TECHNOLOGY GUIDELINES
VISUAL BASIC PROGRAMING ESSENTIALS

UNIT 1

31
UNIT 1: TECHNOLOGY GUIDELINES
UNIT 1 VISUAL BASIC PROGRAMING ESSENTIALS

32
UNIT 1: TECHNOLOGY GUIDELINES
VISUAL BASIC PROGRAMING ESSENTIALS

UNIT 1

33
UNIT 1: TECHNOLOGY GUIDELINES
UNIT 1 VISUAL BASIC PROGRAMING ESSENTIALS

34
UNIT 1: TECHNOLOGY GUIDELINES
VISUAL BASIC PROGRAMING ESSENTIALS

UNIT 1

35
UNIT 1: TECHNOLOGY GUIDELINES
UNIT 1 VISUAL BASIC PROGRAMING ESSENTIALS

Unit 1 Test
Answer Key

I. Multiple Choice
1. A.
2. D.
3. B.
4. D.
5. B.
6. A.
7. C.
8. C.
9. A.
10. C.

II. Identification
1. Hacker
2. Computer virus
3. Bullying
4. Popups
5. Spam
6. Spyware
7. Anti Virus Program
8. World wide web
9. URL
10. Early 90’s

III. Acronyms
1. WWW –World Wide Web
2. HTTP –HyperText Transfer Protocol
3. B2B –Business to Business
4. SMS –Short Message Service
5. MMS –Multimedia Messaging Service
6. ISACA - (Information Systems Audit and Control Association
7. ISC- International Informations Systems Security Certification Consortium
8. B2C- Business to Customer
9. MOD-Masters of Deception
10. URL –Uniform Resource Locator

36
UNIT 1: TECHNOLOGY GUIDELINES
VISUAL BASIC PROGRAMING ESSENTIALS

UNIT 1

37
UNIT 1: TECHNOLOGY GUIDELINES

You might also like