FIRST QUARTERLY ASSESSMENT EMPOWERMENT TECHNOLOGIES 12

FIRST QUARTERLY ASSESSMENT EMPOWERMENT TECHNOLOGIES 12

Professional Development

48 Qs

quiz-placeholder

Similar activities

Career Paddies Quiz 14

Career Paddies Quiz 14

Professional Development

50 Qs

Payment Of Tax

Payment Of Tax

Professional Development

46 Qs

Seleksi Lomba Cerdas Cermat

Seleksi Lomba Cerdas Cermat

Professional Development

50 Qs

anime

anime

Professional Development

46 Qs

PRACTICE INTERMEDIATE II TEST

PRACTICE INTERMEDIATE II TEST

Professional Development

46 Qs

Inquiries Investigation Immersion (HUMSS D)

Inquiries Investigation Immersion (HUMSS D)

Professional Development

50 Qs

Ice Hockey, Boxing, Field Hockey, Volleyball

Ice Hockey, Boxing, Field Hockey, Volleyball

Professional Development

50 Qs

Would you rather

Would you rather

2nd Grade - Professional Development

44 Qs

FIRST QUARTERLY ASSESSMENT EMPOWERMENT TECHNOLOGIES 12

FIRST QUARTERLY ASSESSMENT EMPOWERMENT TECHNOLOGIES 12

Assessment

Quiz

Other

Professional Development

Hard

Created by

JOSE SOLOMON

FREE Resource

48 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of implementing online safety standards in the use of ICTs within your day to day use of technology?

To maximize profits

To protect sensitive information

To increase network speed

To promote competitiveness

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of online security, which of the following is a strong password practice?

Using the same password for all accounts

Using a combination of uppercase and lowercase letters, numbers, and special characters

Writing down passwords on a sticky note

Sharing passwords with trusted colleagues

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A colleague in work asks for your login credentials to access a shared document. What is the most ethical response?

Share your credentials to be helpful

Politely decline and suggest another secure method for sharing the document

Report the colleague to your supervisor

Share your credentials, but change them afterward

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key element of online etiquette in communication?

Using informal language

Replying to emails at your convenience

Acknowledging emails promptly and using polite language

Ignoring emails from unknown senders

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following actions is an example of unethical behavior in the use of ICTs within your workplace?

Properly disposing of electronic waste

Sharing sensitive company information on social media

Updating software regularly

Encrypting email attachments with sensitive data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of online safety, what does the acronym 'HTTPS' stand for?

Hypertext Transfer Protocol Secure

High-Efficiency Transfer Protocol Standard

Hyperlink Transmission Security System

Home Technology Protection and Security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive an email from an unknown sender with an attachment labeled 'Important Document.' What is the best course of action to ensure online security?

Immediately open the attachment to find out what it is

Forward the email to all your colleagues for their input

Delete the email without opening the attachment

Reply to the sender and ask for more information

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?