Professional Documents
Culture Documents
questions)
Yes or No
True or False
Left or Right
Inform you that you have won the lottery or a large prize.
Steal your personal information such as passwords, bank account numbers and usernames.
Sell you the latest and newest technology at steep discounted prices.
unencrypted
open
private
encrypted
https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 1/15
11/29/22, 11:52 AM Applied Educational Systems
4. Controlling and coordinating cognitive skills and behaviors needed for professional success is known as:
Adaptability
Perseverance
Executive function
Goal setting
Software
Malware
Hardware
Spyware
6. A statement is
a control structure.
a sentence.
No
Yes
8. Which of the following is a term used for the permanent record of activities performed on the Internet?
Trending topics
Online identity
Privacy settings
Digital footprint
https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 2/15
11/29/22, 11:52 AM Applied Educational Systems
9. An event handler is
10.. Decomposition is
10
11.. A file that is sent along with an email message is called a(n):
11
Selected file
Document
Attachment
Add-on
An office computer
A home computer
A library
A cellular phone
https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 3/15
11/29/22, 11:52 AM Applied Educational Systems
13.. A public Wi-Fi risk that can be minimized by only visiting encrypted sites with an HTTPS indicator is:
13
Junk Mail
Man-in-the-Middle Attacks
A router
A network
A server
A personal computer
https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 4/15
11/29/22, 11:52 AM Applied Educational Systems
18.. You have received an email from a friend with a file attached to it, but the email subject looks
18
suspicious. What should you do?
Ask your friend if they sent you a file before you open it.
Open the email and download the file. You can trust your friend.
Galaxy
General
Generation
Go
https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 5/15
11/29/22, 11:52 AM Applied Educational Systems
21.. Antivirus software is a computer program that _____________, prevents, and takes action to disarm or
21
remove malicious software programs.
deters
avoids
detects
approves
22.. Which of the following are reasons control structures are used?
22
To save time
23.. A function
23
24.. A digital footprint is all of the information on-line about a person posted by that person or others,
24
_______________.
intentionally or unintentionally
unintentionally or accidentally
intentionally
recklessly
https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 6/15
11/29/22, 11:52 AM Applied Educational Systems
25.. Which of the following might make you suspicious of an email that you receive?
25
Subject line heading of "40% Off Sale" with a return address of sales@macy.com
Subject line heading of "You have WON $1,000,000!" with a return address of
drcashnow@shaw.ca
26.. What is a type of local network that people can use to access the Internet?
26
Router
Mobile
Computer
27.. How does the computer use a selection control structure to decide which path to follow?
27
Randomly
28.. Protecting what is added to your digital footprint is important because potentially embarrassing
28
information can remain on-line ___________.
until it is forgotten
forever
up to 6 months
until removed
https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 7/15
11/29/22, 11:52 AM Applied Educational Systems
Scam
Junk Mail
Fake
Spam
Technology is any invention, including tools, machines, techniques, and sources of power
31.. Which of the following is the best definition of what an IP Address does?
31
32.. An Email message that you did not finish writing can be found in which folder?
32
Trash
Draft
Saved
Sent
https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 8/15
11/29/22, 11:52 AM Applied Educational Systems
35.. What is a safe practice when it comes to passwords for social media?
35
Combining lower case, upper case and special characters for your password.
36.. Julia receives an email from an unknown source. The subject of the email looks strange and it has an
36
attachment. What should Julia do?
https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 9/15
11/29/22, 11:52 AM Applied Educational Systems
37.. Xavier's strengths include an ability to adapt and creatively solve problems. Which of the following
37
mental processes does this involve?
Self-regulation
Working memory
Flexible thinking
Teamwork
38.. Which of the following are skills you need to be successful in coding?
38
Problem-solving
Efficiency
Independence
40.. A ________________ control structure is used to reduce the number of lines of code for an action that will
40
need to be repeated many times.
Sequential
Selection
Repetition
Differential
https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 10/15
11/29/22, 11:52 AM Applied Educational Systems
42.. Which of the following does NOT describe communication between two or more parties messaging at
42
the same time?
Chat
Instant messages
Direct messages
Forum
Software system
Motherboard
RAM
Operating system
44.. Adrian uses the problem-solving method to solve a problem. The solution was unsuccessful. What
44
should Adrian do next?
https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 11/15
11/29/22, 11:52 AM Applied Educational Systems
45.. How can people avoid pitfalls related to being distracted by electronic devices?
45
46.. Credit checks are typically NOT necessary for pre-paid phone carriers.
46
True
False
47.. What type of identity theft occurs when a thief spends another person's money or opens a line of credit
47
in their name?
Governmental
Medical
Financial
Criminal
malicious intent
poor behavior
positive intent
faster speed
https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 12/15
11/29/22, 11:52 AM Applied Educational Systems
49.. Coding is
49
50.. Wi-Fi is mainly used by both home and public networks to access the Internet.
50
True
False
52.. A social media site can help show a person's character based on the information they choose to share.
52
True
False
Hacking
Lifting
Identity theft
Safe-cracking
https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 13/15
11/29/22, 11:52 AM Applied Educational Systems
54.. A ____________ attaches itself to a file or program, enabling it to spread from one computer to another.
54
worm
computer virus
True
False
56.. Variables are used to store information that will be referenced and manipulated in a computer program.
56
True
False
True
False
58.. Which mental process involves holding a limited amount of information and the ability to integrate new
58
information to plan and organize?
Teamwork
Working memory
Self-regulation
Flexible thinking
https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 14/15
11/29/22, 11:52 AM Applied Educational Systems
50
15
Inform you that you have won the lottery or a large prize.
Steal your personal information such as passwords, bank account numbers and usernames.
Sell you the latest and newest technology at steep discounted prices.
This answer key for IST Fall Final Study Guide was printed from the Applied Educational Systems, Inc. platform.
https://teacher.aeseducation.com/courses/192361/assignments/view/2792011/answer-key/ 15/15