Search Header Logo

FIRST QUARTERLY ASSESSMENT EMPOWERMENT TECHNOLOGIES 12

Authored by JOSE SOLOMON

Other

Professional Development

FIRST QUARTERLY ASSESSMENT EMPOWERMENT TECHNOLOGIES 12
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

48 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of implementing online safety standards in the use of ICTs within your day to day use of technology?

To maximize profits

To protect sensitive information

To increase network speed

To promote competitiveness

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of online security, which of the following is a strong password practice?

Using the same password for all accounts

Using a combination of uppercase and lowercase letters, numbers, and special characters

Writing down passwords on a sticky note

Sharing passwords with trusted colleagues

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A colleague in work asks for your login credentials to access a shared document. What is the most ethical response?

Share your credentials to be helpful

Politely decline and suggest another secure method for sharing the document

Report the colleague to your supervisor

Share your credentials, but change them afterward

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key element of online etiquette in communication?

Using informal language

Replying to emails at your convenience

Acknowledging emails promptly and using polite language

Ignoring emails from unknown senders

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following actions is an example of unethical behavior in the use of ICTs within your workplace?

Properly disposing of electronic waste

Sharing sensitive company information on social media

Updating software regularly

Encrypting email attachments with sensitive data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of online safety, what does the acronym 'HTTPS' stand for?

Hypertext Transfer Protocol Secure

High-Efficiency Transfer Protocol Standard

Hyperlink Transmission Security System

Home Technology Protection and Security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive an email from an unknown sender with an attachment labeled 'Important Document.' What is the best course of action to ensure online security?

Immediately open the attachment to find out what it is

Forward the email to all your colleagues for their input

Delete the email without opening the attachment

Reply to the sender and ask for more information

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?