
FIRST QUARTERLY ASSESSMENT EMPOWERMENT TECHNOLOGIES 12
Authored by JOSE SOLOMON
Other
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
48 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of implementing online safety standards in the use of ICTs within your day to day use of technology?
To maximize profits
To protect sensitive information
To increase network speed
To promote competitiveness
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the context of online security, which of the following is a strong password practice?
Using the same password for all accounts
Using a combination of uppercase and lowercase letters, numbers, and special characters
Writing down passwords on a sticky note
Sharing passwords with trusted colleagues
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A colleague in work asks for your login credentials to access a shared document. What is the most ethical response?
Share your credentials to be helpful
Politely decline and suggest another secure method for sharing the document
Report the colleague to your supervisor
Share your credentials, but change them afterward
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key element of online etiquette in communication?
Using informal language
Replying to emails at your convenience
Acknowledging emails promptly and using polite language
Ignoring emails from unknown senders
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following actions is an example of unethical behavior in the use of ICTs within your workplace?
Properly disposing of electronic waste
Sharing sensitive company information on social media
Updating software regularly
Encrypting email attachments with sensitive data
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the context of online safety, what does the acronym 'HTTPS' stand for?
Hypertext Transfer Protocol Secure
High-Efficiency Transfer Protocol Standard
Hyperlink Transmission Security System
Home Technology Protection and Security
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You receive an email from an unknown sender with an attachment labeled 'Important Document.' What is the best course of action to ensure online security?
Immediately open the attachment to find out what it is
Forward the email to all your colleagues for their input
Delete the email without opening the attachment
Reply to the sender and ask for more information
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?