Site MapHelpFeedbackMultiple Choice
Multiple Choice
(See related pages)



1

The first attempt at distance education took place via:
A)E-mail.
B)Telephone.
C)Telegram.
D)Written correspondence.
2

In 1971, ______ became the first Open University in the United States.
A)Empire State College in New York.
B)University of Florida in Gainesville.
C)University of Alaska in Fairbanks.
D)Boston University in Massachusetts.
3

In a distance-learning course, the advantage of using a one-way video system with a one-way audio system is:
A)Flexibility of programming.
B)The improved interaction between teacher and learner.
C)The ability to reach a mass audience.
D)Student talk-back to the instructor.
4

Which of the following is not a reason that distance learning courses are rapidly expanding the use of videoconferencing?
A)Better compression of data.
B)Lowered cost of high quality printers
C)Wider availability of digital telephone lines.
D)Faster processors
5

Which of the following is an example of desktop video conferencing software?
A)CU-SeeMe
B)iChat
C)NetMeeting
D)All of the above
6

A whiteboard is:
A)Part of a video camera setup.
B)A graphics tablet used by individuals during a distance education session.
C)An electronic blackboard used for distance education.
D)The term used to refer to the blank screen before a video conferencing session takes place.
7

Which of the following companies does NOT make software that facilitates distance learning?
A)WebCT
B)CyberLearner
C)Blackboard
D)Metacollege
8

Which of the following is one of the drawbacks of distance education?
A)Reaching students in remote areas.
B)Virtual degrees are not accepted by many employers.
C)Instruction must be redesigned to fit the distance education format.
D)All of the above
9

A network is protected from intruders by a:
A)Spam net.
B)Virus protection program.
C)Windows security component.
D)Firewall.
10

Spam is:
A)A type of firewall.
B)Unsolicited e-mail.
C)Unsolicited pop-up ads.
D)Offensive content.
11

A computer virus can:
A)Be nearly harmless.
B)Be a very destructive force.
C)Be spread by an e-mail attachment.
D)All of the above
12

The term, "worm," refers to a:
A)Piece of software code that adds itself to other programs and cannot run independently.
B)Destructive program that replicates itself and uses all of the computer's resources.
C)Time Bomb
D)Spam
13

What Internet service helps teachers combat plagiarism?
A)stopcheatingnow.org
B)google.com
C)helpourteachers.net
D)turnitin.com
14

Which of the following statements best explains the rights guaranteed by the Copyright Act of 1976?
A)Certain formats must be used for citations.
B)Copyrighted materials may be copied for nonprofit educational purposes.
C)Copyrights expire in 10 years and materials can be used freely after that.
D)You must have an author's permission to use copyrighted materials in an educational setting.
15

To determine if a student's work violates copyright law, a teacher must look at:
A)The purpose and character of the use of material.
B)The portion of copyrighted material used of in the work.
C)The effect of the use of the material on the marketplace.
D)All of the above







Computer Education for TeacherOnline Learning Center

Home > Chapter 10 > Multiple Choice Quiz