Digital Literacy Day Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Tapan
T
Tapan
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,741
Questions: 20 | Attempts: 1,748

SettingsSettingsSettings
Digital Literacy Day Quiz - Quiz


Questions and Answers
  • 1. 

    In which situation should you follow the rules of digital etiquette?

    • A.

      Reading a text message from a friend

    • B.

      Sending an email to your grandmother

    • C.

      Picking the ringtone for your cell phone

    • D.

      Sending a birthday card to your cousin

    Correct Answer
    B. Sending an email to your grandmother
    Explanation
    Following the rules of digital etiquette is important when sending an email to your grandmother. Digital etiquette refers to the guidelines and manners that should be followed while using digital communication platforms. When communicating with older family members, especially grandparents, it is important to be respectful and considerate. Following digital etiquette ensures that the email is polite, clear, and appropriate. It includes using proper language, avoiding abbreviations or slang, and being mindful of the content and tone of the message.

    Rate this question:

  • 2. 

    What is one difference between online and face-to-face communication?

    • A.

      People tend to be more honest online  

    • B.

      Miscommunications happen more frequently face to face  

    • C.

      Online, you can’t tell tone of voice

    • D.

      Body language is more important in online communication

    Correct Answer
    C. Online, you can’t tell tone of voice
    Explanation
    Online communication lacks the ability to convey tone of voice, which can lead to misunderstandings and misinterpretations. Unlike face-to-face communication, where tone of voice is easily perceivable, online communication relies solely on written words, making it difficult to accurately understand the intended meaning behind a message. This can result in miscommunication and potential conflicts.

    Rate this question:

  • 3. 

    What should Saru  do before posting a photo of Pooja online?

    • A.

      Tag Pooja in the photo

    • B.

      Send the photo to Pooja

    • C.

      Share the photo with Pooja's friends

    • D.

      Ask Pooja for permission

    Correct Answer
    D. Ask Pooja for permission
    Explanation
    Saru should ask Pooja for permission before posting a photo of her online. This is important because it shows respect for Pooja's privacy and allows her to have control over the content that is being shared about her. It is always considerate to seek permission from individuals before posting their pictures online, as it gives them the opportunity to consent or express any concerns they may have.

    Rate this question:

  • 4. 

    How is flaming similar to teasing?

    • A.

      Both happen only on the Internet.

    • B.

      Both are spoken aloud.

    • C.

      Both can hurt people's feelings.

    • D.

      Both are examples of good netiquette.

    Correct Answer
    C. Both can hurt people's feelings.
    Explanation
    Flaming and teasing are similar in that both can cause emotional harm to individuals. Flaming refers to hostile or aggressive interactions online, while teasing involves playful or mocking remarks that can also have a negative impact on someone's feelings. Therefore, option C is correct.

    Rate this question:

  • 5. 

    Which is the first digital state in India

    • A.

      West Bengal

    • B.

      Odisha

    • C.

      Kerala

    • D.

      Goa

    Correct Answer
    C. Kerala
    Explanation
    Kerala is considered the first digital state in India due to its successful implementation of various digital initiatives. The state has made significant progress in terms of e-governance, digital literacy, and internet connectivity. Kerala has achieved a high level of digital penetration, with a wide range of digital services available to its citizens. The government has also taken initiatives to promote digital education and training, making it a frontrunner in the digital revolution in India.

    Rate this question:

  • 6. 

    What are the Social Media Websites

    • A.

      Gmail.com,yahoo.com,rediff.com

    • B.

      Linked, facebook,twitter

    • C.

      Naukri.com,indeed.com,monster.com

    • D.

      Flipkart.com,amazon.com,snapdeal.com

    Correct Answer
    B. Linked, facebook,twitter
    Explanation
    The correct answer is "Linked, facebook, twitter". These three websites, LinkedIn, Facebook, and Twitter, are commonly known as social media websites. They are platforms that allow users to create profiles, connect with others, and share content such as photos, videos, and messages. These websites have gained immense popularity and have become an integral part of people's daily lives for social networking and communication purposes.

    Rate this question:

  • 7. 

    Which is latest version of Android Operating system launched by Google

    • A.

      Iris 6

    • B.

      Pie

    • C.

      Cyanogen

    • D.

      Windows 8

    Correct Answer
    B. Pie
    Explanation
    The latest version of the Android operating system launched by Google is called "Pie".

    Rate this question:

  • 8. 

    The best way to respond to insult is to _____ them.

    • A.

      Threaten

    • B.

      Insult

    • C.

      Ignore

    • D.

      Copy

    Correct Answer
    C. Ignore
    Explanation
    The best way to respond to an insult is to ignore it. Ignoring insults shows maturity and self-control, as it avoids escalating the situation or giving the insulter the satisfaction of a reaction. By not engaging with the insult, one can maintain their dignity and focus on more important matters.

    Rate this question:

  • 9. 

    Internet trolls aim to:

    • A.

      Lead discussions 

    • B.

      Quietly observe

    • C.

      Make friends

    • D.

      Start arguments

    Correct Answer
    D. Start arguments
    Explanation
    Internet trolls aim to start arguments. Trolling is a behavior where individuals intentionally provoke and disrupt online discussions by posting inflammatory or offensive comments. Their goal is to provoke emotional responses and create conflict among participants. Trolls often enjoy the chaos and attention that comes from stirring up arguments and may use various tactics to escalate conflicts and derail conversations. Their intention is not to contribute constructively but rather to incite discord and disrupt the flow of discussion.

    Rate this question:

  • 10. 

    Why might people act meaner online than in person?

    • A.

      They can stay anonymous.

    • B.

      Typing gives them time to consider what they say.

    • C.

      Most people have fewer friends online.

    • D.

      Social media sites encourage users to argue.

    Correct Answer
    A. They can stay anonymous.
    Explanation
    People might act meaner online than in person because they can stay anonymous. This anonymity allows them to hide behind a screen and not face any immediate consequences for their actions. It gives them a sense of freedom to express themselves without fear of judgment or backlash. Additionally, being online gives them time to consider what they say before typing it out, which can lead to more thought-out and potentially mean-spirited comments.

    Rate this question:

  • 11. 

    Is it possible for hackers to access my computer’s webcam?

    • A.

      Yes

    • B.

      No

    • C.

      Both Yes And No

    • D.

      None of these

    Correct Answer
    A. Yes
    Explanation
    Yes, it is possible for hackers to access someone's computer's webcam. Hackers can gain unauthorized access to a computer's webcam by exploiting vulnerabilities in the operating system or by using malware such as remote access trojans. Once they gain access, hackers can remotely activate the webcam without the user's knowledge or consent, potentially invading their privacy and capturing sensitive information. It is essential to implement strong security measures, such as keeping the operating system and antivirus software up to date, to minimize the risk of webcam hacking.

    Rate this question:

  • 12. 

    I am using an unsecured Wifi from a neighbor. Can they discover my log in name & password? What about my IP, can they track me with Gmap Location using IP?

    • A.

      No

    • B.

      Yes

    • C.

      Both Yes And No

    • D.

      None of these

    Correct Answer
    B. Yes
    Explanation
    Yes, when using an unsecured WiFi network, it is possible for someone with the technical knowledge and tools to intercept and access your login name and password. Additionally, your IP address can be tracked by others, but using it to determine your location through Gmap Location is not always accurate.

    Rate this question:

  • 13. 

    What do you mean by Dumpsterdiving

    • A.

      Finding Bills in his/her house

    • B.

      Submitting Bills 

    • C.

      Looking for treasure in someone else's trash

    • D.

      Stealing Email Password

    Correct Answer
    C. Looking for treasure in someone else's trash
    Explanation
    Dumpster diving refers to the act of searching through someone else's trash or discarded items in hopes of finding valuable or useful items. It is often done in dumpsters or trash bins outside of homes, businesses, or other locations. People who engage in dumpster diving are typically looking for items that can be reused, repurposed, or sold. This practice is often associated with individuals who are trying to reduce waste, save money, or find unique items.

    Rate this question:

  • 14. 

    Recognise the image?

    • A.

      Pretexting

    • B.

      Hacking

    • C.

      Phising

    • D.

      Dumpsterdiving

    Correct Answer
    C. Phising
    Explanation
    Phishing is a type of cyber attack where the attacker pretends to be a trustworthy entity in order to deceive individuals into revealing sensitive information, such as passwords or credit card numbers. This can be done through emails, text messages, or fake websites that appear to be legitimate. The given image is most likely related to phishing, as it is a common method used by hackers to gain unauthorized access to personal information.

    Rate this question:

  • 15. 

    What are your tips for protecting yourself against identity theft?

    • A.

      Share Password with best friends

    • B.

      Use AntiVirus

    • C.

      Use Simple password so that you can remember

    • D.

      You need to protect yourself against both online and offline threats

    Correct Answer
    D. You need to protect yourself against both online and offline threats
    Explanation
    Protecting oneself against identity theft requires being vigilant both online and offline. Online threats include phishing scams, hacking attempts, and data breaches, while offline threats may involve physical theft of personal information or dumpster diving. It is important to use strong, unique passwords, regularly update antivirus software, and avoid sharing passwords with anyone. Additionally, one should be cautious when sharing personal information online, regularly monitor bank and credit card statements, and shred any documents containing sensitive information before discarding them.

    Rate this question:

  • 16. 

    Which of the following would be a creative work protected by copyright?

    • A.

      The Name of your Pet Dog

    • B.

      A List of all India zip code 

    • C.

      An Idea for a new gadget

    • D.

      A Potrait of your famnily

    Correct Answer
    C. An Idea for a new gadget
    Explanation
    An idea for a new gadget would be a creative work protected by copyright. Copyright protects original works of authorship, including literary, artistic, and intellectual creations. Ideas, on their own, are not protected by copyright. However, when an idea is expressed in a tangible form, such as a written description or a drawing, it becomes eligible for copyright protection. Therefore, an idea for a new gadget, when expressed in a tangible form, would be considered a creative work and would be protected by copyright.

    Rate this question:

  • 17. 

    What does it mean in Cyber World ?

    • A.

      Happy

    • B.

      Trolls

    • C.

      Work not done

    • D.

      Sad

    Correct Answer
    B. Trolls
  • 18. 

    Which word best describes how you should proceed with a new online friend?

    • A.

      Erratically

    • B.

      Deceitfully

    • C.

      Candidly

    • D.

      Cautiously

    Correct Answer
    D. Cautiously
    Explanation
    When proceeding with a new online friend, it is important to be cautious. This means being careful and taking necessary steps to protect oneself from potential harm or deception. Online relationships can be risky, as it is easier for people to hide their true intentions or identities. Therefore, being cautious allows one to approach the friendship with a level of skepticism and awareness, ensuring personal safety and well-being.

    Rate this question:

  • 19. 

    Over a few days, you receive a series of insulting IMs from someone at school.  Which sequence of actions is the best response?

    • A.

      Ignore All the IMs

    • B.

      Ignore /Delete the First IMs :Save /Print any further IMs ,Tell a Parent or any Other Adult you Trust

    • C.

      Save IMs  Send the Email to IMs Host ; Confront the bully in the School; Meet with School Counsellor

    • D.

      Tell A Parent Or Any Friend

    Correct Answer
    B. Ignore /Delete the First IMs :Save /Print any further IMs ,Tell a Parent or any Other Adult you Trust
    Explanation
    The best response to receiving insulting IMs from someone at school is to ignore or delete the first IMs, but save or print any further IMs as evidence. It is important to tell a parent or any other adult you trust about the situation to seek their guidance and support. Additionally, it is recommended to inform the IMs host by sending an email and to confront the bully in school. Meeting with a school counselor can also be helpful in addressing the issue effectively.

    Rate this question:

  • 20. 

    Why is it a good idea to get the author's permission to use a creative work, even if you think it may be fair use?  

    • A.

      Fair Use Law affects Kids more than adults

    • B.

      Fair use law isn't written down

    • C.

      Fair use law it changes every year

    • D.

      Fair use law is open to interpretation

    Correct Answer
    D. Fair use law is open to interpretation
    Explanation
    It is a good idea to get the author's permission to use a creative work, even if you think it may be fair use because fair use law is open to interpretation. This means that different people may have different opinions on what qualifies as fair use, and there is no clear-cut definition. By obtaining the author's permission, you can avoid any potential legal issues or disputes that may arise from differing interpretations of fair use.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 19, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 02, 2018
    Quiz Created by
    Tapan
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.