1.
In which Scientific reasearch center was the world wide web(www) developed?
Correct Answer
D. CERN
Explanation
The correct answer is CERN. CERN, which stands for the European Organization for Nuclear Research, is the scientific research center where the world wide web (www) was developed. The web was created in the late 1980s by British computer scientist Tim Berners-Lee while he was working at CERN. Berners-Lee's goal was to create a system that would allow scientists to easily share and access information. He developed the necessary technologies, such as HTML and HTTP, to make this possible, and the world wide web was born.
2.
Fill in the blank "....which is a type of software disguised as an application and targets the
personal information that are stored in the user’s computer"
Correct Answer
B. Malware
Explanation
Malware refers to a type of software that is designed to appear as a legitimate application but actually aims to access and steal personal information stored on a user's computer. It is a malicious software that can cause harm to the user's device and compromise their privacy and security. Unlike phishing, which involves tricking users into revealing their personal information, malware directly targets and attempts to extract this information without the user's knowledge. Internet scam, on the other hand, is a broader term that encompasses various fraudulent activities conducted online, but it does not specifically refer to software disguised as an application.
3.
In order to protect your data you should always use public WiFi connections
Correct Answer
B. False
Explanation
Using public WiFi connections can actually put your data at risk. Public WiFi networks are often unsecured, making it easier for hackers to intercept your data. It is recommended to use a virtual private network (VPN) or a secure personal hotspot when connecting to public WiFi to ensure the safety of your data. Therefore, the correct answer is False.
4.
Cyberstalking is where a person is being targeted for fake news
Correct Answer
B. False
Explanation
The statement is false because cyberstalking refers to the act of harassing or targeting someone online, typically through repeated unwanted messages or threats. It does not specifically involve targeting someone for fake news.
5.
In order to monitor minors, parents should use the following software
Correct Answer
D. Parental control
Explanation
Parental control software is designed specifically to help parents monitor and control their children's online activities. It allows parents to set restrictions on websites, apps, and content that their children can access, as well as monitor their online behavior and usage. This software provides a safe and secure online environment for minors, allowing parents to protect them from inappropriate content, online predators, and cyberbullying. By using parental control software, parents can have peace of mind knowing that they are actively involved in their children's online experiences and can guide them towards responsible internet usage.
6.
GDPR is an iternational policy concerning the protection of personal data.
Correct Answer
B. False
Explanation
The given answer, "False," is correct because GDPR (General Data Protection Regulation) is not an international policy. It is a regulation implemented by the European Union (EU) to protect the personal data of individuals within the EU. While its impact may be felt globally due to its extraterritorial scope, GDPR is not considered an international policy as it is specific to the EU and its member states.
7.
The Communication "Tackling online disinformation: a European approach" doesn't have this pillar
Correct Answer
E. Enhancing collaboration with online platforms and industry to tackle disinformation
Explanation
The given correct answer states that the pillar "Enhancing collaboration with online platforms and industry to tackle disinformation" is not included in the communication "Tackling online disinformation: a European approach". This means that the communication does not focus on the aspect of collaborating with online platforms and industry to address the issue of disinformation. Instead, it emphasizes other pillars such as improving transparency, diversity of information, credibility of information, and inclusive solutions with broad stakeholder involvement.
8.
In order to be safe during the usage of iternet, you should
Correct Answer
C. Accept requests or invitations from unknown profiles
Explanation
Accepting requests or invitations from unknown profiles can pose a significant risk to your safety while using the internet. Unknown profiles may be created by malicious individuals who could potentially have harmful intentions. By accepting these requests, you may unknowingly expose yourself to scams, phishing attempts, or other forms of cyber attacks. It is always advisable to be cautious and only connect with people you know and trust on the internet.
9.
The TCP/IP protocols enable you to record activity and share it
Correct Answer
B. False
Explanation
The TCP/IP protocols do not enable you to record activity and share it. TCP/IP is a set of communication protocols used for transmitting data across networks, but it does not have built-in capabilities for recording or sharing activity. These functions would typically be handled by separate applications or protocols, such as logging software or file sharing protocols.
10.
Fake news...
Correct Answer
C. Is the reproduction of untrue news and information with the purpose of creating chaos
Explanation
Fake news refers to the dissemination of false information and news that is intentionally created to mislead or deceive people. Its purpose is to create chaos and confusion among the audience. By spreading untrue news, fake news can manipulate public opinion, create divisions, and undermine trust in the media. This can lead to a hostile environment where individuals may face negative comments and psychological abuse due to the false information being propagated.