1.
When you are filling out forms or surveys online, you should:
Correct Answer
B. Before you answer any questions, you should check if the website is safe.
Explanation
When completing forms or surveys online, your top priority should be to ensure the security and integrity of the website. It is essential to verify the website's security features, such as an HTTPS URL, which indicates that the site is encrypted and more secure for data submission. Additionally, looking for privacy policies and reading through them can provide reassurance about how your data will be handled and protected. These steps are crucial to avoid potential risks like identity theft or data breaches, as unsafe websites can misuse or mishandle your personal information. Prioritizing website safety protects you from various online security threats.
2.
Hector unlocks his smartphone and notices he has 12 apps that need to be updated. What action should he take?
Correct Answer
B. Update his pHone
Explanation
Hector should update his phone because he has noticed that he has 12 apps that need to be updated. Updating the phone will ensure that he has the latest versions of the apps, which may include bug fixes, security patches, and new features. Ignoring the updates may lead to potential issues with the apps, such as crashes or vulnerabilities. Therefore, it is advisable for Hector to update his phone.
3.
You receive an email purportedly from your friend John, asking to meet you in the park after school. Do you:
Correct Answer
C. Verify the authenticity of the email with your friend John through another trusted communication channel, such as a pHone call or text message.
Explanation
It's important to verify the legitimacy of the email before agreeing to meet someone, especially if it involves meeting in person. Scammers can impersonate others through email to deceive individuals into potentially dangerous situations. Contacting your friend through a separate, trusted communication channel allows you to confirm if they indeed sent the email and to ensure your safety before proceeding with any plans.
4.
You can conduct an interview virtually.
Correct Answer
A. True
Explanation
Conducting an interview virtually refers to conducting an interview remotely, using technology such as video conferencing software. This allows the interviewer and interviewee to communicate and interact without being physically present in the same location. With advancements in technology and the increasing popularity of remote work, virtual interviews have become a common practice for many companies. Therefore, the statement "You can conduct an interview virtually" is true.
5.
Which email should you avoid opening by reading the subject?
Correct Answer
A. "You won $1,000 dollars"
Explanation
The email with the subject "You won $1,000 dollars" should be avoided because it is likely to be a scam or phishing email. Emails claiming that you have won a large sum of money are often used to trick people into providing personal information or sending money. It is important to be cautious and not open or respond to such emails to protect yourself from potential fraud.
6.
Brian sends an email out to Steven, Mark, and Lilly about his Holiday party and states in the email they can each invite one guest. Steven reads it and wants to share the information from the email with Miranda. What is the most convenient way to share the information with her?
Correct Answer
D. Blind Carbon Copy Miranda in the email
Explanation
Blind Carbon Copying (BCC) Miranda in the email allows Steven to share the information without cluttering her inbox or revealing the other recipients' email addresses. It maintains privacy while ensuring Miranda receives the party details directly. This approach is efficient and respectful of everyone's privacy.
7.
You are playing an online game with your school friend Tara. Suddenly a message pops up on your computer that says Click here to win a free trip to New York! What do you do?
Correct Answer
C. Close/Delete the window
Explanation
In this scenario, the correct answer is to close/delete the window. Clicking on the message could potentially lead to a scam or a virus being installed on your computer. Asking Tara for advice is a good option, but since the message could be time-sensitive, it is better to take immediate action and close/delete the window. Ignoring the message is also not recommended as it could still pose a potential threat.
8.
You have just seen a video online that was very violent and it has upset you. What would you choose to do about it?
Correct Answer
B. Tell a trusted adult
Explanation
Telling a trusted adult is the best choice when encountering a violent video online that has upset you. By confiding in a responsible adult, you can seek guidance and support to process your emotions and potentially find ways to prevent further exposure to such content. Sharing the video on your page may not be appropriate as it could potentially harm others or perpetuate violence. Closing out or ignoring the video without addressing your feelings may also lead to unresolved distress.
9.
_____________can mess up your system, slow computer performance, and steal any personal passwords and information you use and keep on the computer or on the web.
Correct Answer
D. All of the above
Explanation
Viruses, spyware, and adware can all cause various issues with a computer system. Viruses are malicious programs that can replicate and spread, causing damage to files and software. Spyware is designed to collect information without the user's knowledge, including personal passwords and sensitive data. Adware, on the other hand, displays unwanted advertisements and can slow down computer performance. Therefore, all of these can mess up a system, slow down performance, and steal personal information.
10.
In a company meeting, you should have your cell phone on:
Correct Answer
A. Silent
Explanation
In a company meeting, it is important to have your cell phone on silent. This is to ensure that it does not disrupt the meeting or distract others with loud ringing or beeping sounds. Having your phone on silent shows respect for the speaker and allows everyone to focus on the discussion at hand. It also helps to maintain a professional and attentive environment during the meeting.
11.
Which one is okay to post on internet sites/social media?
Correct Answer
B. First & last name
Explanation
Posting just the first name on internet sites or social media is considered okay because it provides some level of identification without revealing too much personal information. This allows individuals to maintain a certain level of privacy and security while still engaging in online activities. Sharing the full name, address, or phone number on the internet can potentially lead to identity theft, harassment, or other security risks. Therefore, it is important to exercise caution and only share necessary information online.
12.
Use a firewall to prevent hackers from attacking your computer remotely.
Correct Answer
A. True
Explanation
Using a firewall is an effective measure to protect your computer from remote attacks by hackers. A firewall acts as a barrier between your computer and the internet, monitoring incoming and outgoing network traffic. It analyzes the data packets and blocks any unauthorized or suspicious connections, preventing hackers from gaining access to your computer. By enabling a firewall, you can enhance the security of your system and reduce the risk of remote attacks.
13.
Is it okay to open emails from a contact that you don’t know?
Correct Answer
B. No
Explanation
It is generally not advisable to open emails from contacts you don't know. These emails may contain phishing attempts, malware, or other malicious content designed to compromise your security and privacy. Exercise caution and use spam filters to avoid potential threats posed by unknown contacts.
14.
Is it okay to forward another individual’s email without permission?
Correct Answer
B. No
Explanation
It is not okay to forward another individual's email without their permission. Forwarding someone else's email without consent violates their privacy and can breach confidentiality. Always respect others' privacy rights and seek permission before sharing their email communications with third parties.
15.
You should set all social media to "private".
Correct Answer
A. True
Explanation
Setting all social media to "private" is a recommended practice for maintaining online privacy and security. By setting social media accounts to "private," users have control over who can view their posts, photos, and personal information. This helps to prevent unauthorized access, protect personal data, and reduce the risk of privacy breaches or identity theft. Additionally, setting social media to "private" allows users to carefully manage their online presence and only share content with a select group of trusted individuals.
16.
It is okay to open emails from contacts that are not familiar.
Correct Answer
B. No
Explanation
Opening emails from unfamiliar contacts can be risky as they may contain malicious links or attachments that can harm your device or compromise your personal information. It is always recommended to exercise caution and avoid opening emails from unknown sources to protect yourself from potential cyber threats.
17.
How often should you change passwords?
Correct Answer
B. Every 2-3 months
Explanation
Changing passwords every 2-3 months is recommended for maintaining good security practices. Regularly updating passwords helps to minimize the risk of unauthorized access to accounts and sensitive information. This frequency strikes a balance between ensuring passwords are changed frequently enough to deter potential threats, while also allowing users enough time to remember and manage their passwords effectively.
18.
The telephone remains an important element of a customer service strategy.
Correct Answer
A. True
Explanation
The telephone remains an important element of a customer service strategy because it allows for direct and immediate communication between customers and service representatives. It provides a personal touch and enables customers to ask questions, seek assistance, and receive real-time support. Additionally, the telephone allows for better understanding of customer needs and concerns through verbal communication, which can lead to more effective problem-solving and customer satisfaction.
19.
It is okay to meet up with a person you met online alone.
Correct Answer
B. False
Explanation
Meeting up with a person you met online alone is not okay because it can be dangerous. Online interactions can be deceiving, and there is a risk of meeting someone with ill intentions. It is always recommended to meet people in public places and inform someone you trust about the meeting. This ensures safety and reduces the chances of any potential harm.
20.
The increasing sophistication of smartphones makes mobile telecommunication an integral part of a wider communication capability.
Correct Answer
A. True
Explanation
The statement suggests that smartphones are becoming more advanced, which in turn makes mobile telecommunication an essential component of a broader communication capability. This implies that smartphones are not just limited to basic phone calls but also encompass various communication features such as messaging, internet access, video calls, and social media platforms. Therefore, the statement is true as it highlights the growing importance of smartphones in facilitating communication.
21.
Why should you avoid putting personal information online?
Correct Answer
D. All of the above
Explanation
Putting personal information online should be avoided because it can lead to identity theft, where someone can steal your personal details and use them for malicious purposes. It can also make you vulnerable to fraud, as scammers can use your information to deceive you or others. Additionally, sharing personal information online compromises your privacy, as it can be accessed by anyone and used without your consent. Therefore, it is important to avoid putting personal information online to protect yourself from these risks.
22.
______________________________is the telephonic transmission of scanned printed material (both text and images), normally to a telephone number connected to a printer or other output device.
Correct Answer
C. Fax machine
Explanation
Fax machine is the correct answer because it is a device used for telephonic transmission of scanned printed material, both text and images, to a telephone number connected to a printer or other output device. This technology has been widely used for many years to send and receive documents over long distances.
23.
Log off from all websites and shut down your computer when not in use.
Correct Answer
A. True
Explanation
It is important to log off from all websites and shut down your computer when not in use to ensure the security of your personal information and prevent unauthorized access. Leaving your computer logged in and connected to websites increases the risk of someone accessing your accounts and potentially stealing sensitive data. Shutting down the computer also helps conserve energy and prolong the lifespan of your device.
24.
Why is it beneficial to have multiple phone lines/numbers for your company?
Correct Answer
D. All of the above
Explanation
Having multiple phone lines/numbers for a company is beneficial because it allows multiple people to answer phone calls, ensuring that all customer inquiries are addressed promptly. Additionally, in case one line is busy, customers can call another line, preventing them from being unable to reach the company. This helps to decrease customer wait time and improves overall customer satisfaction. Therefore, all of the above reasons make it advantageous to have multiple phone lines/numbers for a company.
25.
What is slander?
Correct Answer
A. The action or crime of making a false spoken statement damaging to a person's reputation.
Explanation
The correct answer is the action or crime of making a false spoken statement damaging to a person's reputation. Slander refers to the act of spreading false information about someone through spoken words, which can harm their reputation. It is a form of defamation and can have legal consequences. Accusing someone of using social media in a negative manner is not the definition of slander.