

![]()


Digital Literacy explores the essential skills and knowledge required to navigate, evaluate, and create information using digital technologies. This course covers topics such as online research, critical assessment of digital content, effective communication through digital platforms, understanding digital citizenship, privacy, and cybersecurity. Students will also develop practical competencies in using common software applications, collaborating in virtual environments, and staying informed about emerging technologies. Upon completion, learners will be equipped to participate effectively and responsibly in a digitally connected world.
Recommended Textbook
Technology In Action Complete 12th Edition by Alan Evans
Available Study Resources on Quizplus
17 Chapters
1126 Verified Questions
1126 Flashcards
Source URL: https://quizplus.com/study-set/450 Page 2

Available Study Resources on Quizplus for this Chatper
73 Verified Questions
73 Flashcards
Source URL: https://quizplus.com/quiz/7981
Sample Questions
Q1) Computer forensics analyzes computer systems in gathering potential legal evidence.
A)True
B)False
Answer: True
Q2) ________ is the use of apps to obtain opinions from other people on the quality of products.
Answer: Crowdsourcing Crowd-sourcing
Q3) Crowdfunding is asking for large donations from a few people.
A)True
B)False
Answer: False
Q4) Zipcar is an example of ownership.
A)True
B)False
Answer: False
Q5) Electronic junk mail is known as ________. Answer: spam
To view all questions and flashcards with answers, click on the resource link above. Page 3

Available Study Resources on Quizplus for this Chatper
69 Verified Questions
69 Flashcards
Source URL: https://quizplus.com/quiz/7982
Sample Questions
Q1) Inkjet printers and laser printers are examples of ________ printers.
A) nonimpact
B) impact
C) dot-matrix
D) thermal Answer: A
Q2) A(n)________ is a computer that performs complex calculations very rapidly.
Answer: supercomputer
Q3) Most game controllers are wireless.
A)True
B)False
Answer: True
Q4) Microphones and scanners are examples of ________ devices.
Answer: input peripheral
Q5) On a keyboard, Num Lock and Caps Lock are both toggle keys.
A)True
B)False
Answer: True
To view all questions and flashcards with answers, click on the resource link above. Page 4
Available Study Resources on Quizplus for this Chatper
71 Verified Questions
71 Flashcards
Source URL: https://quizplus.com/quiz/7983
Sample Questions
Q1) E-mail is ________ communication, which means users do not have to communicate at the same time.
Answer: asynchronous
Q2) In the URL http://www.microsoft.com/surface, the portion labeled ".com" is the
A) domain name
B) host
C) top-level domain
D) protocol
Answer: C
Q3) All popular social networking sites have privacy policies but you still need to follow certain precautions when using their sites.
A)True
B)False
Answer: True
Q4) To hear and view some multimedia files in a browser, you may need a special program called a(n)________.
Answer: plug-in player

Page 5
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/7984
Sample Questions
Q1) All of the following are tips for a great presentation EXCEPT ________.
A) limit bullet points per slide to 4-6
B) use images to convey a thought or illustrate a point
C) use a variety of animations on most slides to keep your audience's attention
D) keep the font size large enough to be read from the back of the room
Q2) ________ programs allow you to experience a real situation through a virtual environment.
Q3) QuarkXPress is an example of ________ software.
A) image-editing
B) presentation
C) desktop publishing
D) video-editing
Q4) Desktop publishing software enables you to create newsletters and annual reports.
A)True
B)False
Q5) Software that helps manage a checkbook or prepare taxes is called ________ software.
To view all questions and flashcards with answers, click on the resource link above. Page 6
Q6) A Microsoft Office________ guides you through the steps necessary to finish a complicated task.

Available Study Resources on Quizplus for this Chatper
71 Verified Questions
71 Flashcards
Source URL: https://quizplus.com/quiz/7986
Sample Questions
Q1) Hard drives have been growing in storage capacity by about 50% each year.
A)True
B)False
Q2) RAM is an example of ________ storage.
A) volatile
B) nonvolatile
C) permanent
D) mobile
Q3) A CPU's processing power is determined by the combination of the clock speed, the number of cores, and the amount of ________.
Q4) ________ automatically duplicates your data and saves it on two identical drives.
Q5) The process the CPU performs for each program instruction is called the ________.
Q6) Running the CPU faster than the manufacturer recommends is called ________.
Q7) Mac OS X uses ________ software to automatically backup and restore data.
Q8) ________ Law predicts that the number of transistors in a CPU will double every 2 years.
Q9) GPU stands for ________. Page 7
Q10) ________ is the type of RAM memory used most often in today's computers.
To view all questions and flashcards with answers, click on the resource link above. Page 8

Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/7987
Sample Questions
Q1) In terms of networking, NOS stands for ________.
Q2) Which of the following is NOT a type of UTP cable you would use in a wired Ethernet network?
A) Cat 5E
B) Cat 6
C) Cat 6A
D) Cat 7B
Q3) A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.
A) network
B) switch
C) broadband
D) node
Q4) Someone who breaks into computer systems to create mischief or steal information is a(n)________.
Q5) ________ is often referred to as "high-speed Internet."
Q6) ________ cable consists of a single copper wire surrounded by layers of plastic and is used to connect cable TV.
Q7) WPA stands for ________.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/7988
Sample Questions
Q1) A main difference between the tablet and the smartphone is the ________.
A) operating system
B) touch-screen interface
C) screen size
D) Internet connectivity
Q2) With Skype software installed on your phone, you can call any phone number for free.
A)True
B)False
Q3) Digital camera resolution is measured in ________.
Q4) ________ is a texting service that supports both text and multimedia content.
Q5) Which of the following is NOT true about e-books?
A) You can borrow them from the library.
B) They are always PDF file format.
C) You can annotate them with your own notes.
D) They weigh less than physical books.
Q6) A specialized chip included in the cell phone that handles digital compression data is called the ________.
Q8) Google ________ is an online store delivering software for mobile devices. Page 10
Q7) Making sure the data on two devices are the same is referred to as ________.
To view all questions and flashcards with answers, click on the resource link above. Page 11

Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/7989
Sample Questions
Q1) A stealth virus is designed to infect multiple file types to fool the antivirus software.
A)True
B)False
Q2) ________ is malware that tries to convince you that your computer is infected with a virus.
Q3) A(n)________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer.
Q4) Which type of virus was the famous Michelangelo virus?
A) A worm
B) A time bomb
C) A script virus
D) An e-mail virus
Q5) The most financially damaging cybercrime affecting individuals is ________.
Q6) Another name for bots is ________.
Q7) With regard to computer protection, quarantining is defined as ________.
A) updating your antivirus software
B) placing a found virus in a secure area on the hard drive
C) repairing an infected file
D) deleting an infected file
Page 12
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/7990
Sample Questions
Q1) A(n)________ error is caused by not following the strict, precise set of rules for a specific programming language.
Q2) ________ is a combination of natural language and programming language that is used to document an algorithm.
A) Flowcharting
B) Pseudocode
C) Diagramming
D) Debugging
Q3) Which language is the most popular language for writing Apple OS X applications?
A) C++
B) HTML
C) Objective C
D) Java
Q4) The program specification is a clear statement of the goals and objectives of the project.
A)True
B)False
Q5) SDLC stands for ________.
Q6) In a(n)________ system, each step is dependent on the previous step.
Q7) IDE stands for ________.
To view all questions and flashcards with answers, click on the resource link above. Page 13

Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/7991
Sample Questions
Q1) A ________ relationship indicates that for each record in a table, there is only a single corresponding record in a related table.
A) many-to-one
B) one-to-many
C) one-to-one
D) many-to-many
Q2) In a database, another term for a table is a(n)________.
Q3) A group of related records is called a table.
A)True
B)False
Q4) ________ involves putting data into an electronic file in a format that another application can recognize.
A) Exporting
B) Importing
C) Enhancing
D) Extracting
Q5) A(n)________ provides a view of data fields to be filled in with appropriate labels to assist a user in entering data into the database.
Q6) Data that describe other data are called________.
To view all questions and flashcards with answers, click on the resource link above. Page 14

Available Study Resources on Quizplus for this Chatper
71 Verified Questions
71 Flashcards
Source URL: https://quizplus.com/quiz/7992
Sample Questions
Q1) A ________ topology uses more than one topology when building a network.
A) hybrid
B) multiple-use
C) fusion
D) crossover
Q2) A ________ sends data from one collision domain to another.
A) switch
B) bridge
C) link
D) router
Q3) In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
A) Star
B) Bus
C) Hierarchical
D) Cluster
Q4) An international company like Microsoft would use a MAN to connect all of its computers.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 15

Available Study Resources on Quizplus for this Chatper
69 Verified Questions
69 Flashcards
Source URL: https://quizplus.com/quiz/7993
Sample Questions
Q1) XML technologies allow web pages to change after they have been loaded.
A)True
B)False
Q2) The main path of the Internet along which data travel the fastest is known as the Internet ________.
A) protocol
B) highway
C) backbone
D) cache
Q3) SMTP stands for ________.
Q4) 197.169.73.63 is an example of a(n)________.
Q5) An IP address that does not change and is usually assigned manually by a network administrator is called a ________ address.
A) dynamic
B) static
C) fixed
D) stationary
Q6) .com and .edu are examples of a(n)________.
Q7) DHTML stands for ________.
Q8) In the acronym HTTPS, the S stands for ________.
To view all questions and flashcards with answers, click on the resource link above. Page 16

Available Study Resources on Quizplus for this Chatper
38 Verified Questions
38 Flashcards
Source URL: https://quizplus.com/quiz/7980
Sample Questions
Q1) Steve Jobs and Steve Wozniak were the founders of ________.
Q2) DOS stands for ________.
Q3) The world's first integrated circuit was developed at Texas Instruments.
A)True
B)False
Q4) Computers that used integrated circuits are referred to as third-generation computers.
A)True
B)False
Q5) Introduced in 1983, the ________ was the first successful personal computer that used a graphical user interface (GUI).
Q6) Completed in 1951, the first commercially successful electronic digital computer was the ________.
A) Turing Machine
B) UNIVAC
C) Z1
D) ENIAC
Q7) Computers that use ________ are referred to as third-generation computers.
Q9) ________ was founded by Bill Gates and Paul Allen. Page 17
Q8) The Tabulating Machine Company later changed its name to ________.
To view all questions and flashcards with answers, click on the resource link above.
Page 18

Available Study Resources on Quizplus for this Chatper
68 Verified Questions
68 Flashcards
Source URL: https://quizplus.com/quiz/7985
Sample Questions
Q1) When using Windows 8, the pinch and stretch gestures are used to ________ an object.
Q2) File Explorer is Windows 8's main program to manage files.
A)True
B)False
Q3) Preemptive multitasking is the term used when the operating system processes higher-priority tasks before lower-priority tasks.
A)True
B)False
Q4) When using a Windows PC, ________ is the main tool for finding, viewing, and managing files.
Q5) Deleted files on a Mac computer are moved to the ________.
A) Garbage Can
B) Recycle Bin
C) Trash
D) Wastepaper Basket
Q6) When your computer runs out of RAM, the operating system borrows space from the CPU.
A)True
B)False Page 19
To view all questions and flashcards with answers, click on the resource link above.
Page 20

Available Study Resources on Quizplus for this Chatper
34 Verified Questions
34 Flashcards
Source URL: https://quizplus.com/quiz/7979
Sample Questions
Q1) Enacted in 2002, the ________ Act requires companies to provide an anonymous method for employees and third parties to report complaints, including ethics violations.
Q2) Utilitarianism focuses on adherence to moral duties and rights.
A)True
B)False
Q3) Relativism holds that moral principles are dictated by cultural tastes and customs.
A)True
B)False
Q4) Social media sites such as Facebook share information with others. The use of this information can raise questions regarding ________.
A) computer abuse
B) personal privacy
C) fair use
D) fair trade
Q5) Anti-cyberbullying detection is done mostly by police.
A)True
B)False
Q6) ________ is the right to be left alone to do as one pleases.
To view all questions and flashcards with answers, click on the resource link above. Page 21

Available Study Resources on Quizplus for this Chatper
35 Verified Questions
35 Flashcards
Source URL: https://quizplus.com/quiz/7978
Sample Questions
Q1) ________boosts a CPU's performance by working on more than one instruction at the same time.
Q2) The CPU machine cycle starts with the Fetch step.
A)True
B)False
Q3) ________ language consists of a series of 0s and 1s.
Q4) The ________ processor is used in tablet computers and smartphones because it is very small and uses very little power.
Q5) The collection of commands that a CPU executes is called the instruction set.
A)True
B)False
Q6) A single byte is composed of ten bits.
A)True
B)False
Q7) A binary digit is called a(n)________.
Q8) Mathematical operations and comparisons are performed in the ________.
Q9) The base-sixteen number system is also known as the ________ number system.
Q10) The decimal number 11 equals B in the ________ number system.
Q11) The base-2 number system is also known as the ________ number system. Page 22
Q12) The ________ encoding scheme for character data uses 16 bits.
To view all questions and flashcards with answers, click on the resource link above. Page 23

Available Study Resources on Quizplus for this Chatper
36 Verified Questions
36 Flashcards
Source URL: https://quizplus.com/quiz/7977
Sample Questions
Q1) If you travel from place to place as needed and perform short-term jobs at each site, your job is ________-based.
Q2) A(n)________ oversees the communications infrastructure of a company.
Q3) The oldest and best-known organization for women in IT is the ________.
Q4) Which information technology job has the highest growth rate?
A) Computer systems analysts
B) Computer support specialists
C) Computer programmers
D) Database administrators
Q5) When a U.S. company hires a company outside of the United States, it uses a technique called ________.
A) offshoring
B) offtracking
C) telecommuting
D) exporting
Q6) ________ install and configure servers, design and plan networks, and test new networking equipment.
Q7) ________ supervise the overall systems development process and ensure that deadlines are met.
To view all questions and flashcards with answers, click on the resource link above. Page 24