1 |
How can you verify the credibility of informaton found online. |
By checking the number of ads on the website
By looking at the websites design
By the website's popularity
By using multiple reputable sources and checing the author's credential
|
2 |
What is software privacy. |
Sharing software legally with friends
Updating sofware regularly
the illegal copying , distributionof use of software
Buying sotware froman official source
|
3 |
What is a key aspect of data ethics. |
Using data any way you like
Ignoring data security
Transparency respect for privacy and accountablility in data usage
Collecting as much data as possible
|
4 |
What shold you do to ensur data security. |
Use the same passowrd for all acounts
Use strong uniqu password and cnable two factor authentication
Avoid using any security measures
Share your passowrd with friends
|
5 |
What is the purpose of privacy settings on digital platforms. |
To make your posts public
To control who can see your inforation and interact with you online
Ro inxeww rhw numbwe od dolloqwea
To authomatically share your information.
|
6 |
Why is it importnat to regularly review your account activity. |
To download new application
To chek the number of friends you have
To look for unusual activity and ensure your accounts are secure
To update your contact information
|
7 |
What should you do if you receive and email form an unknown sender asking for personal information. |
Provide the informatio requested
Forward the email to your friends
Ignore or delete the email
Open the emial and click on any links
|
8 |
What is the important aspect of responsbile use of social media. |
Sharing personal information like your home address
Posting photos withou considering priacy settings
Ignoring privacy settings
Being respectul nd avoiding sharing sensitive information publicly
|
9 |
Why should you be cautious when using public WI-Fi for sensitive transactions? |
Public Wi-Fi is usually faster
Public Wi-Fi alwyas provides
Public Wi-Fi is free
Public Wi-Fi networks are often less secure
|
10 |
What does two-factor authentication (2FA) do? |
It makes your passowrd easier to guess
It reduces the need for sotware updates
I tadds an extra layer of security by requiring a second form of verification
It adds an extra llayer of security by requirng a second form of verification
|
11 |
What is one reason to avoid clicking on unknown links or downloadig files from untrusted sources. |
They might contain helpful software
They are usually cheaper
They help your device run faster
They migh contain malware that can harm your device or steal your information
|
12 |
Why is it important to use storng unique passwords. |
to make your acconts easy to hack
To help others guess your password
To avoid installing software updates
To make it harder for someone to guess your passowrd and access your accounts
|