You should plan to spend __ hours per week in order to get the most out of the course.
(ANS)- 6
How do you access the C@CM course materials? (ANS)- Canvas
Which grading standard does C@CM use? (ANS)- Pass/Fail
Asking a Sophomore for copies of the ERQs from last semester to help you study for
the Final Exam constitutes an academic integrity violation. T/F? (ANS)- True
The Final Exam is only available the week of August 9th. T/F (ANS)- False
Assignments submitted after the due dates listed on the syllabus will not be accepted.
T/F (ANS)- False
_________, or thinking about thinking, is your awareness of yourself as a learner and
your ability to regulate your own learning. (ANS)- Metacognition
Collaboration is permitted on the learning activities (Learn by Doing and Did I Get This
problem sets contained within the readings in OLI). T/F (ANS)- True
You must score 100% on the Pre-Assessment before you can proceed with the unit. T/F
(ANS)- False
You must score at least ____ to pass this course. (ANS)- 75%
Order the steps of the metacognitive cycle. (ANS)- 1.Assessing the task
2.Evaluationg your strength
3.Planning an approach
4.Applying Strategies
5.Reflecting and adjusting
C@CM is _______ for all degree-seeking undergraduate students. If you do not pass
on this attempt, you will ___________________. (ANS)- required, retake the course
until you earn a passing grade
Match these important course events with their corresponding deadline.
Deadline to start your coursework ----
Deadline to finish your coursework ----
Deadline to take the Final Exam ---- (ANS)- July 18th, August 8th, August 12th
Which of the following is an example of inappropriate behavior as defined by the
Computing Policy? (ANS)- Sharing my Andrew password with my roommate.
, Which of the following responsibilities governs your use of limited scanners in the
computer labs? (ANS)- Responsible Sharing of Resources
Your access to the university's computing resources is contingent upon your appropriate
use of such resources. T/F? (ANS)- True
Which of the following best summarizes CMU's Computing Policy? (ANS)- The
Computing Policy is a community standard that establishes your responsibility to
behave as a mature, reasonable and ethical person.
Which of the following best describes the university's system for determining fair use of
bandwidth? (ANS)- Impact-based
Which of the following best describes the university's system for determining fair use of
computer lab peripherals (such as scanners) when no allotment is predetermined?
(ANS)- Impact-based
The more bandwidth one person consumes, the less that is available for other users.
T/F? (ANS)- True
If your Andrew ID and password are compromised, the information and resources of the
broader campus community are at risk as well. T/F? (ANS)- True
_____ is about ensuring that only authorized users have access to information and
resources. (ANS)- Confidentiality
Maintaining the _____ of a resource means that authorized users are able to reliably get
to the specific machine or information when needed. (ANS)- Availability
With your Andrew ID and password, a user can block you from accessing university
services like your course schedule in SIO. T/F? (ANS)- True
Maintaining the _____ of information means ensuring that the data has not been
changed inappropriately. (ANS)- Integrity
If you do not resolve a Digital Millennium Copyright Act (DMCA) infraction within 72
hours, your computer will be suspended from the network. T/F? (ANS)- True
Peer-to-peer (P2P) applications _____. (ANS)- facilitate the distribution of files over
networks
Legitimate, non-infringing uses exist for peer-to-peer file-sharing software such as
BitTorrent. T/F? (ANS)- True
Which of the options below is the best way of describing the concept of copyright?
(ANS)- A series of rights granted to the author of an original work.