CORRECT ANSWERS
School computer labs are often used to teach technology skills or subject
specific skills___ from the rest of the curriculum - CORRECT ANSWERS-
isolated
A(n)___ is a teacher-created document or web page that contains hyperlinks -
CORRECT ANSWERS-curriculum page
an illegal act involving a computer generally is referred to as a computer
crime - CORRECT ANSWERS-true
Viewing a browser's history will give you the information about what sites
have been visited - CORRECT ANSWERS-true
A wireless mobile lab is a cart with wireless notebook computers that can be
used in the classroom - CORRECT ANSWERS-false
documents the describe curriculum standards and benchmarks for learning
are called___. - CORRECT ANSWERS-curriculum guides
Motivating students to learn is one area that all educators are constantly
trying to achieve - CORRECT ANSWERS-true
Another important consideration in the planning stage is planning the -
CORRECT ANSWERS-classroom environment
popular uses for networked school computer labs are for the students to
work through tutorial software and integrated learning systems software -
CORRECT ANSWERS-true
The most important advantage of using a computer lab is that all students
are provided with ___ using computer technology - CORRECT ANSWERS-
hands-on experience
Teachers can divide centers by subject area and then create activities that
continuously change to match the curriculum or lessons being taught -
CORRECT ANSWERS-true
, when evaluating student projects, teachers should consider students'
originality, imaginative and innovative approach, and artistic abilities which
are all aspects of ___. - CORRECT ANSWERS-creativity
___ learning techniques are methods that present ideas and information
through graphical webs - CORRECT ANSWERS-visual
The grantee is the teacher, school, or organization to which the grant funds
or equipment are transferred - CORRECT ANSWERS-true
Language arts curriculum usually includes instruction in history, geography,
civics, and economics - CORRECT ANSWERS-false
a worm is a malicious software program that hides within a legitimate
program - CORRECT ANSWERS-false
a proxy server screens all incoming and outgoing messages - CORRECT
ANSWERS-true
a(n)___ is a prolonged under voltage - CORRECT ANSWERS-brownout
___ prevents your browser from displaying materials from targeted sites or
sites that contain keywords or phrases - CORRECT ANSWERS-filtering
software
By acquiring data from public and other sources, national marketing
organizations can create an electronic profile of an individual - CORRECT
ANSWERS-true
A(n)___ is a powerful computer that is small in size but not small in flexibility,
usability, and functionality - CORRECT ANSWERS-netbook
Copyright laws___ - CORRECT ANSWERS--protect original materials created
by students posted on the web
-apply to all creative works
-are contained in the Copyright Act of 1976 and its amendments
___ is the use of computer data for unapproved or possibly illegal activity -
CORRECT ANSWERS-unauthorized use
today's___ technology represents an evolution in products and services that
are transforming the way we live, work, learn, and teach - CORRECT
ANSWERS-wireless
a___ allows network users to share a single copy of software - CORRECT
ANSWERS-network site license