1.
_____________can mess up your system, slow computer performance, and steal any personal passwords and information you use and keep on the computer or on the web.
Correct Answer
D. All of the above
Explanation
Viruses, spyware, and adware can all cause various issues with a computer system. Viruses are malicious programs that can replicate and spread, causing damage to files and software. Spyware is designed to collect information without the user's knowledge, including personal passwords and sensitive data. Adware, on the other hand, displays unwanted advertisements and can slow down computer performance. Therefore, all of these can mess up a system, slow down performance, and steal personal information.
2.
Use a firewall to prevent hackers from attacking your computer remotely.
Correct Answer
A. True
Explanation
Using a firewall is an effective measure to protect your computer from remote attacks by hackers. A firewall acts as a barrier between your computer and the internet, monitoring incoming and outgoing network traffic. It analyzes the data packets and blocks any unauthorized or suspicious connections, preventing hackers from gaining access to your computer. By enabling a firewall, you can enhance the security of your system and reduce the risk of remote attacks.
3.
It is okay to open emails from a contact that you don’t know.
Correct Answer
B. False
Explanation
Opening emails from a contact that you don't know is not okay. It can be risky as these emails could potentially contain harmful attachments or links that could lead to malware or phishing attacks. It is always recommended to exercise caution and avoid opening emails from unknown contacts to protect your personal information and computer security.
4.
It is okay to forward another individual’s email without permission.
Correct Answer
B. False
Explanation
Forwarding another individual's email without permission is not okay because it violates the sender's privacy and trust. It is important to respect others' privacy and seek their consent before sharing their personal or confidential information.
5.
You should set all social media to "private"
Correct Answer
A. True
Explanation
Setting all social media to "private" is a recommended practice for maintaining online privacy and security. By setting social media accounts to "private," users have control over who can view their posts, photos, and personal information. This helps to prevent unauthorized access, protect personal data, and reduce the risk of privacy breaches or identity theft. Additionally, setting social media to "private" allows users to carefully manage their online presence and only share content with a select group of trusted individuals.
6.
How often should you change passwords?
Correct Answer
B. Every 2-3 months
Explanation
Changing passwords every 2-3 months is recommended for maintaining good security practices. Regularly updating passwords helps to minimize the risk of unauthorized access to accounts and sensitive information. This frequency strikes a balance between ensuring passwords are changed frequently enough to deter potential threats, while also allowing users enough time to remember and manage their passwords effectively.
7.
It is okay to meet up with a person you met online alone.
Correct Answer
B. False
Explanation
Meeting up with a person you met online alone is not okay because it can be dangerous. Online interactions can be deceiving, and there is a risk of meeting someone with ill intentions. It is always recommended to meet people in public places and inform someone you trust about the meeting. This ensures safety and reduces the chances of any potential harm.
8.
Why should you avoid putting personal information online?
Correct Answer
D. All of the above
Explanation
Putting personal information online should be avoided because it can lead to identity theft, where someone can steal your personal details and use them for malicious purposes. It can also make you vulnerable to fraud, as scammers can use your information to deceive you or others. Additionally, sharing personal information online compromises your privacy, as it can be accessed by anyone and used without your consent. Therefore, it is important to avoid putting personal information online to protect yourself from these risks.
9.
Which email should you avoid opening by reading the subject?
Correct Answer
A. "You won $1,000 dollars"
Explanation
The email with the subject "You won $1,000 dollars" should be avoided because it is likely to be a scam or phishing email. Emails claiming that you have won a large sum of money are often used to trick people into providing personal information or sending money. It is important to be cautious and not open or respond to such emails to protect yourself from potential fraud.
10.
You are playing an online game with your school friend Tara. Suddenly a message pops up on your computer that says Click here to win a free trip to New York! What do you do?
Correct Answer
C. Close/Delete the window
Explanation
In this scenario, the correct answer is to close/delete the window. Clicking on the message could potentially lead to a scam or a virus being installed on your computer. Asking Tara for advice is a good option, but since the message could be time-sensitive, it is better to take immediate action and close/delete the window. Ignoring the message is also not recommended as it could still pose a potential threat.
11.
You have just seen a video online that was very violent and it has upset you. What would you choose to do about it?
Correct Answer
B. Tell a trusted adult
Explanation
Telling a trusted adult is the best choice when encountering a violent video online that has upset you. By confiding in a responsible adult, you can seek guidance and support to process your emotions and potentially find ways to prevent further exposure to such content. Sharing the video on your page may not be appropriate as it could potentially harm others or perpetuate violence. Closing out or ignoring the video without addressing your feelings may also lead to unresolved distress.
12.
Which one is okay to post on internet sites/ social media?
Correct Answer
A. First name
Explanation
Posting just the first name on internet sites or social media is considered okay because it provides some level of identification without revealing too much personal information. This allows individuals to maintain a certain level of privacy and security while still engaging in online activities. Sharing the full name, address, or phone number on the internet can potentially lead to identity theft, harassment, or other security risks. Therefore, it is important to exercise caution and only share necessary information online.
13.
In a company meeting, you should have your cell phone on:
Correct Answer
A. Silent
Explanation
In a company meeting, it is important to have your cell phone on silent. This is to ensure that it does not disrupt the meeting or distract others with loud ringing or beeping sounds. Having your phone on silent shows respect for the speaker and allows everyone to focus on the discussion at hand. It also helps to maintain a professional and attentive environment during the meeting.
14.
When following the rules of email etiquette, typing the email in ALL CAPITALS is not recommended because it indicates what?
Correct Answer
A. Anger
Explanation
Typing an email in ALL CAPITALS is not recommended because it indicates anger. Using all capital letters in written communication is often perceived as shouting or yelling, which can come across as aggressive or confrontational. It is important to follow email etiquette guidelines and use proper formatting, such as using sentence case or bolding certain words for emphasis, to convey the intended tone and avoid misinterpretation.
15.
The telephone remains an important element of a customer service strategy.
Correct Answer
A. True
Explanation
The telephone remains an important element of a customer service strategy because it allows for direct and immediate communication between customers and service representatives. It provides a personal touch and enables customers to ask questions, seek assistance, and receive real-time support. Additionally, the telephone allows for better understanding of customer needs and concerns through verbal communication, which can lead to more effective problem-solving and customer satisfaction.
16.
The increasing sophistication of smartphones makes mobile telecommunication an integral part of a wider communication capability.
Correct Answer
A. True
Explanation
The statement suggests that smartphones are becoming more advanced, which in turn makes mobile telecommunication an essential component of a broader communication capability. This implies that smartphones are not just limited to basic phone calls but also encompass various communication features such as messaging, internet access, video calls, and social media platforms. Therefore, the statement is true as it highlights the growing importance of smartphones in facilitating communication.
17.
______________________________is the telephonic transmission of scanned printed material (both text and images), normally to a telephone number connected to a printer or other output device.
Correct Answer
C. Fax machine
Explanation
Fax machine is the correct answer because it is a device used for telephonic transmission of scanned printed material, both text and images, to a telephone number connected to a printer or other output device. This technology has been widely used for many years to send and receive documents over long distances.
18.
Why is it beneficial to have multiple phone lines/numbers for your company?
Correct Answer
D. All of the above
Explanation
Having multiple phone lines/numbers for a company is beneficial because it allows multiple people to answer phone calls, ensuring that all customer inquiries are addressed promptly. Additionally, in case one line is busy, customers can call another line, preventing them from being unable to reach the company. This helps to decrease customer wait time and improves overall customer satisfaction. Therefore, all of the above reasons make it advantageous to have multiple phone lines/numbers for a company.
19.
You can conduct an interview virtually.
Correct Answer
A. True
Explanation
Conducting an interview virtually refers to conducting an interview remotely, using technology such as video conferencing software. This allows the interviewer and interviewee to communicate and interact without being physically present in the same location. With advancements in technology and the increasing popularity of remote work, virtual interviews have become a common practice for many companies. Therefore, the statement "You can conduct an interview virtually" is true.
20.
Brian sends an email out to Steven, Mark, and Lilly about his Holiday party and states in the email they can each invite one guest. Steven reads it and wants to share the information from the email with Miranda. What is the most convenient way to share the information with her?
Correct Answer
A. Forward Miranda the email
Explanation
The most convenient way to share the information with Miranda would be to forward her the email. This allows Miranda to receive the same email directly from Brian, ensuring that she has all the necessary information about the Holiday party and the invitation to bring a guest.
21.
It is okay to open emails from contacts that are not familiar.
Correct Answer
B. False
Explanation
Opening emails from unfamiliar contacts can be risky as they may contain malicious links or attachments that can harm your device or compromise your personal information. It is always recommended to exercise caution and avoid opening emails from unknown sources to protect yourself from potential cyber threats.
22.
Log off from all websites and shut down your computer when not in use.
Correct Answer
A. True
Explanation
It is important to log off from all websites and shut down your computer when not in use to ensure the security of your personal information and prevent unauthorized access. Leaving your computer logged in and connected to websites increases the risk of someone accessing your accounts and potentially stealing sensitive data. Shutting down the computer also helps conserve energy and prolong the lifespan of your device.
23.
What is slander?
Correct Answer
A. The action or crime of making a false spoken statement damaging to a person's reputation.
Explanation
The correct answer is the action or crime of making a false spoken statement damaging to a person's reputation. Slander refers to the act of spreading false information about someone through spoken words, which can harm their reputation. It is a form of defamation and can have legal consequences. Accusing someone of using social media in a negative manner is not the definition of slander.
24.
When you are filling out forms or surveys online, you should:
Correct Answer
B. Before you answer any questions, you should get your parents' approval.
Explanation
When filling out forms or surveys online, it is important to get your parents' approval before answering any questions. This is because some questions may ask for personal information or sensitive details that should not be shared without parental consent. Getting approval ensures that you are following safety guidelines and protecting your privacy online.
25.
Hector unlocks his smartphone and notices he has 12 apps that need to be updated. What should he do?
Correct Answer
B. Update his phone
Explanation
Hector should update his phone because he has noticed that he has 12 apps that need to be updated. Updating the phone will ensure that he has the latest versions of the apps, which may include bug fixes, security patches, and new features. Ignoring the updates may lead to potential issues with the apps, such as crashes or vulnerabilities. Therefore, it is advisable for Hector to update his phone.
26.
You receive an email from a person that identifies themselves as your friend John. They want to meet you in the park after school. Do you:
Correct Answer
A. Tell your parents about the email and ignore the request.
Explanation
It is important to prioritize safety and take precautions when receiving emails or messages from unknown sources, even if they claim to be a friend. By telling your parents about the email and ignoring the request, you are involving trusted adults who can help assess the situation and ensure your safety. It is better to be cautious and verify the authenticity of the email before taking any action.
27.
You posted a picture online, but soon decided to take it down. You are worried your friend may see it, but then soon remember that person DOES NOT have a computer. Your friend will never see the photo.
Correct Answer
B. False
Explanation
The explanation for the answer being False is that even though the friend does not have a computer, it does not necessarily mean that they will never see the photo. They could still have access to a computer through other means, such as using a friend's computer or going to an internet café. Therefore, there is still a possibility that the friend may see the photo despite not having a computer.