Intellectual Output 2: Chapter 1 Safe Use Of Internet And Social Media, Self Assesment Test

10 Questions | Total Attempts: 18

SettingsSettingsSettings
Please wait...
Intellectual Output 2: Chapter 1 Safe Use Of Internet And Social Media, Self Assesment Test

.


Questions and Answers
  • 1. 
    In which Scientific reasearch center  was the world wide web(www) developed?
    • A. 

      ARPA NET

    • B. 

      CALTEC

    • C. 

      MIT

    • D. 

      CERN

  • 2. 
    Fill in the blank "....which is a type of software disguised as an application and targets the personal information that are stored in the user’s computer" 
    • A. 

      Phishing

    • B. 

      Malware

    • C. 

      Internet Scam

  • 3. 
    In order to protect your data you should always use public WiFi connections
    • A. 

      True

    • B. 

      False

  • 4. 
    Cyberstalking is where a person is being targeted for fake news
    • A. 

      True

    • B. 

      False

  • 5. 
    In order to monitor minors, parents should use the following software
    • A. 

      Cookie detector

    • B. 

      Mirrors

    • C. 

      Antivirus

    • D. 

      Parental control

  • 6. 
    GDPR is an iternational policy concerning the protection of personal data. 
    • A. 

      True

    • B. 

      False 

  • 7. 
    The Communication "Tackling online disinformation: a European approach" doesn't have this pillar
    • A. 

      Improve transparency regarding the way information is produced or sponsored

    • B. 

      Diversity of information

    • C. 

      Credibility of information

    • D. 

      Inclusive solutions with broad stakeholder involvement.

    • E. 

      Enhancing collaboration with online platforms and industry to tackle disinformation

  • 8. 
    In order to be safe during the usage of iternet, you should 
    • A. 

      Avoid same passwords in various accounts

    • B. 

      Link accounts with personal email for monitoring reasons

    • C. 

      Accept requests or invitations from unknown profiles

    • D. 

      Use an (updated) antivirus and a firewall on computers

  • 9. 
    The TCP/IP protocols enable you to record activity and share it 
    • A. 

      True

    • B. 

      False

  • 10. 
    Fake news... 
    • A. 

      Can position the participant within a hostile environment.

    • B. 

      Receive negative comments about his individuality resulting in phycological abuse

    • C. 

      Is the reproduction of untrue news and information with the purpose of creating chaos

    • D. 

      None of the above

Back to Top Back to top