1.
It is OK to email others in your department or school to let them know that parents may hire you after school to tutor students.
Correct Answer
B. False
Explanation
You may not use District systems for personal financial gain.
2.
Employees are encouraged to utilize social networking tools for professional communication and collaboration.
Correct Answer
A. True
Explanation
The statement suggests that employees are encouraged to use social networking tools for professional communication and collaboration. This implies that the organization recognizes the benefits of social networking tools in enhancing communication and collaboration among its employees. By encouraging their use, the organization promotes a more connected and collaborative work environment, allowing employees to leverage the power of social networking platforms for their professional interactions.
3.
Which free social networking service is similar to, but safer than, FaceBook?
Correct Answer
B. Edmodo
Explanation
Edmodo is a free social networking service that is similar to Facebook but safer. It is designed specifically for educational purposes, allowing teachers, students, and parents to connect and collaborate in a secure online environment. Edmodo provides features like classroom discussions, assignment sharing, and grade tracking, ensuring a safe and controlled space for educational interactions. This makes it a suitable alternative to Facebook for educational institutions, providing a platform that prioritizes privacy and security.
4.
If you are made aware of a potential network security violation or accidental data exposure you should immediately report it to __________
Correct Answer
D. My school or department administration and technical support person.
Explanation
If you are made aware of a potential network security violation or accidental data exposure, it is important to report it to your school or department administration and technical support person. They are the individuals responsible for managing the network and ensuring its security. By reporting the issue to them, they can take appropriate actions to investigate and address the violation or exposure, such as implementing security measures, conducting audits, or notifying law enforcement if necessary. It is crucial to involve the relevant authorities within your school or department to handle such incidents effectively.
5.
The best way to remember your password is to ______?
Correct Answer
C. Memorize it.
Explanation
Memorizing your password is the best way to remember it because it eliminates the risk of someone finding it and accessing your accounts. Keeping it hidden under the keyboard or on a sticky note near the computer makes it easily accessible to others, compromising the security of your password. Putting it in a filing cabinet folder may provide some level of security, but it is still susceptible to being found or stolen. Memorizing your password ensures that only you know it, reducing the chances of unauthorized access to your accounts.
6.
What is the best example of how to ensure appropriate student use of computers?
Correct Answer
B. Supervise all online activity.
Explanation
Supervising all online activity is the best example of ensuring appropriate student use of computers because it allows for monitoring and guidance to ensure that students are using the internet responsibly and safely. It helps prevent students from accessing inappropriate content, engaging in cyberbullying, or engaging in other harmful online behaviors. By supervising online activity, educators can also provide immediate feedback and support to students, promoting responsible and productive computer use.
7.
How should you respond if a student or employee tells you that he/she brought a computer program from home to use at schools?
Correct Answer
A. Use of personally owned software is a potential copyright violation and prohibited at school.
Explanation
Using personally owned software at school is prohibited because it can potentially violate copyright laws. This means that individuals cannot bring their own computer programs from home to use at school.
8.
It is OK to use the wireless hotspot feature on your smart phone or tablet to avoid the Internet filters at work.
Correct Answer
B. False
Explanation
Using the wireless hotspot feature on a smart phone or tablet to bypass Internet filters at work is not okay. This is because employers usually have policies in place to restrict access to certain websites or content for various reasons, such as security, productivity, or compliance. Attempting to bypass these filters can be considered a violation of company policies and can lead to disciplinary action.
9.
It is OK to share your password with technical support staff.
Correct Answer
B. False
Explanation
Sharing your password with technical support staff is not recommended. This is because your password grants access to your personal accounts and sensitive information. Sharing it with others, even if they are technical support staff, increases the risk of unauthorized access or misuse of your accounts. It is always best to keep your password confidential and only share it with trusted individuals or use secure methods for password sharing, such as password managers or encrypted communication channels.
10.
What should you do if you receive junk email?
Correct Answer
A. Delete it.
Explanation
If you receive junk email, the best course of action is to delete it. Junk email, also known as spam, often contains unsolicited and potentially harmful content. By deleting it, you prevent any potential harm that may come from opening or interacting with the email. Forwarding it to someone else or replying to the sender may not be effective in stopping the junk emails and can potentially expose others to the same content. Therefore, deleting it is the most appropriate and recommended action.
11.
It is OK to put pictures of any staff member on your web site without permission because their information is public record anyway.
Correct Answer
B. False
Explanation
You should always request permission from other staff to use their likeness on your web site. The law provides specific protections for staff that are related to judges, law enforcement officers, members of the military and more.
12.
Most of what I do on my computer is public record and may be disclosed upon request.
Correct Answer
A. True
Explanation
The given statement implies that the activities performed on the computer are considered public record and can be disclosed if requested. This suggests that there is no expectation of privacy for the actions taken on the computer, indicating that the statement is true.
13.
What steps should you take keep parents and the public from viewing your personal information on social networks? (Check all that apply)
Correct Answer(s)
A. Maintain separate (personal and professional) profiles with different email addresses.
B. Configure privacy settings for my personal profiles so that my posts aren't public.
Explanation
To keep parents and the public from viewing personal information on social networks, it is important to maintain separate profiles for personal and professional use with different email addresses. This ensures that personal information is not easily accessible to the public. Additionally, configuring privacy settings for personal profiles to restrict public visibility of posts further enhances privacy and limits who can view personal information. Installing a firewall on a home computer is not directly related to preventing others from viewing personal information on social networks. Wearing an aluminum foil hat is not a valid or effective method for protecting personal information on social networks.
14.
District administration may record, monitor, and inspect anything I do on a District device or communication network.
Correct Answer
A. True
Explanation
The given statement suggests that the district administration has the authority to record, monitor, and inspect any activity performed by an individual on a district device or communication network. This implies that the administration can keep track of the user's actions and communications for security or compliance purposes. Therefore, the correct answer is "True" as it aligns with the statement's assertion of the administration's monitoring capabilities.
15.
It is OK to use music purchased on iTunes to create a slideshow for work.
Correct Answer
B. False
Explanation
Using music purchased on iTunes for work purposes without obtaining the appropriate licenses or permissions would likely be a violation of copyright laws. Therefore, it is not okay to use music purchased on iTunes to create a slideshow for work without proper authorization.