1.
In which situation should you follow the rules of digital etiquette?
Correct Answer
B. Sending an email to your grandmother
Explanation
Following the rules of digital etiquette is important when sending an email to your grandmother. Digital etiquette refers to the guidelines and manners that should be followed while using digital communication platforms. When communicating with older family members, especially grandparents, it is important to be respectful and considerate. Following digital etiquette ensures that the email is polite, clear, and appropriate. It includes using proper language, avoiding abbreviations or slang, and being mindful of the content and tone of the message.
2.
What is one difference between online and face-to-face communication?
Correct Answer
C. Online, you can’t tell tone of voice
Explanation
Online communication lacks the ability to convey tone of voice, which can lead to misunderstandings and misinterpretations. Unlike face-to-face communication, where tone of voice is easily perceivable, online communication relies solely on written words, making it difficult to accurately understand the intended meaning behind a message. This can result in miscommunication and potential conflicts.
3.
What should Saru do before posting a photo of Pooja online?
Correct Answer
D. Ask Pooja for permission
Explanation
Saru should ask Pooja for permission before posting a photo of her online. This is important because it shows respect for Pooja's privacy and allows her to have control over the content that is being shared about her. It is always considerate to seek permission from individuals before posting their pictures online, as it gives them the opportunity to consent or express any concerns they may have.
4.
How is flaming similar to teasing?
Correct Answer
C. Both can hurt people's feelings.
Explanation
Flaming and teasing are similar in that both can cause emotional harm to individuals. Flaming refers to hostile or aggressive interactions online, while teasing involves playful or mocking remarks that can also have a negative impact on someone's feelings. Therefore, option C is correct.
5.
Which is the first digital state in India
Correct Answer
C. Kerala
Explanation
Kerala is considered the first digital state in India due to its successful implementation of various digital initiatives. The state has made significant progress in terms of e-governance, digital literacy, and internet connectivity. Kerala has achieved a high level of digital penetration, with a wide range of digital services available to its citizens. The government has also taken initiatives to promote digital education and training, making it a frontrunner in the digital revolution in India.
6.
What are the Social Media Websites
Correct Answer
B. Linked, facebook,twitter
Explanation
The correct answer is "Linked, facebook, twitter". These three websites, LinkedIn, Facebook, and Twitter, are commonly known as social media websites. They are platforms that allow users to create profiles, connect with others, and share content such as photos, videos, and messages. These websites have gained immense popularity and have become an integral part of people's daily lives for social networking and communication purposes.
7.
Which is latest version of Android Operating system launched by Google
Correct Answer
B. Pie
Explanation
The latest version of the Android operating system launched by Google is called "Pie".
8.
The best way to respond to insult is to _____ them.
Correct Answer
C. Ignore
Explanation
The best way to respond to an insult is to ignore it. Ignoring insults shows maturity and self-control, as it avoids escalating the situation or giving the insulter the satisfaction of a reaction. By not engaging with the insult, one can maintain their dignity and focus on more important matters.
9.
Internet trolls aim to:
Correct Answer
D. Start arguments
Explanation
Internet trolls aim to start arguments. Trolling is a behavior where individuals intentionally provoke and disrupt online discussions by posting inflammatory or offensive comments. Their goal is to provoke emotional responses and create conflict among participants. Trolls often enjoy the chaos and attention that comes from stirring up arguments and may use various tactics to escalate conflicts and derail conversations. Their intention is not to contribute constructively but rather to incite discord and disrupt the flow of discussion.
10.
Why might people act meaner online than in person?
Correct Answer
A.
They can stay anonymous.
Explanation
People might act meaner online than in person because they can stay anonymous. This anonymity allows them to hide behind a screen and not face any immediate consequences for their actions. It gives them a sense of freedom to express themselves without fear of judgment or backlash. Additionally, being online gives them time to consider what they say before typing it out, which can lead to more thought-out and potentially mean-spirited comments.
11.
Is it possible for hackers to access my computer’s webcam?
Correct Answer
A. Yes
Explanation
Yes, it is possible for hackers to access someone's computer's webcam. Hackers can gain unauthorized access to a computer's webcam by exploiting vulnerabilities in the operating system or by using malware such as remote access trojans. Once they gain access, hackers can remotely activate the webcam without the user's knowledge or consent, potentially invading their privacy and capturing sensitive information. It is essential to implement strong security measures, such as keeping the operating system and antivirus software up to date, to minimize the risk of webcam hacking.
12.
I am using an unsecured Wifi from a neighbor. Can they discover my log in name & password? What about my IP, can they track me with Gmap Location using IP?
Correct Answer
B. Yes
Explanation
Yes, when using an unsecured WiFi network, it is possible for someone with the technical knowledge and tools to intercept and access your login name and password. Additionally, your IP address can be tracked by others, but using it to determine your location through Gmap Location is not always accurate.
13.
What do you mean by Dumpsterdiving
Correct Answer
C. Looking for treasure in someone else's trash
Explanation
Dumpster diving refers to the act of searching through someone else's trash or discarded items in hopes of finding valuable or useful items. It is often done in dumpsters or trash bins outside of homes, businesses, or other locations. People who engage in dumpster diving are typically looking for items that can be reused, repurposed, or sold. This practice is often associated with individuals who are trying to reduce waste, save money, or find unique items.
14.
Recognise the image?
Correct Answer
C. pHising
Explanation
Phishing is a type of cyber attack where the attacker pretends to be a trustworthy entity in order to deceive individuals into revealing sensitive information, such as passwords or credit card numbers. This can be done through emails, text messages, or fake websites that appear to be legitimate. The given image is most likely related to phishing, as it is a common method used by hackers to gain unauthorized access to personal information.
15.
What are your tips for protecting yourself against identity theft?
Correct Answer
D. You need to protect yourself against both online and offline threats
Explanation
Protecting oneself against identity theft requires being vigilant both online and offline. Online threats include phishing scams, hacking attempts, and data breaches, while offline threats may involve physical theft of personal information or dumpster diving. It is important to use strong, unique passwords, regularly update antivirus software, and avoid sharing passwords with anyone. Additionally, one should be cautious when sharing personal information online, regularly monitor bank and credit card statements, and shred any documents containing sensitive information before discarding them.
16.
Which of the following would be a creative work protected by copyright?
Correct Answer
C. An Idea for a new gadget
Explanation
An idea for a new gadget would be a creative work protected by copyright. Copyright protects original works of authorship, including literary, artistic, and intellectual creations. Ideas, on their own, are not protected by copyright. However, when an idea is expressed in a tangible form, such as a written description or a drawing, it becomes eligible for copyright protection. Therefore, an idea for a new gadget, when expressed in a tangible form, would be considered a creative work and would be protected by copyright.
17.
What does it mean in Cyber World ?
Correct Answer
B. Trolls
18.
Which word best describes how you should proceed with a new online friend?
Correct Answer
D. Cautiously
Explanation
When proceeding with a new online friend, it is important to be cautious. This means being careful and taking necessary steps to protect oneself from potential harm or deception. Online relationships can be risky, as it is easier for people to hide their true intentions or identities. Therefore, being cautious allows one to approach the friendship with a level of skepticism and awareness, ensuring personal safety and well-being.
19.
Over a few days, you receive a series of insulting IMs from someone at school. Which sequence of actions is the best response?
Correct Answer
B. Ignore /Delete the First IMs :Save /Print any further IMs ,Tell a Parent or any Other Adult you Trust
Explanation
The best response to receiving insulting IMs from someone at school is to ignore or delete the first IMs, but save or print any further IMs as evidence. It is important to tell a parent or any other adult you trust about the situation to seek their guidance and support. Additionally, it is recommended to inform the IMs host by sending an email and to confront the bully in school. Meeting with a school counselor can also be helpful in addressing the issue effectively.
20.
Why is it a good idea to get the author's permission to use a creative work, even if you think it may be fair use?
Correct Answer
D. Fair use law is open to interpretation
Explanation
It is a good idea to get the author's permission to use a creative work, even if you think it may be fair use because fair use law is open to interpretation. This means that different people may have different opinions on what qualifies as fair use, and there is no clear-cut definition. By obtaining the author's permission, you can avoid any potential legal issues or disputes that may arise from differing interpretations of fair use.