POP QUIZ TOPIC 1_2 DPA10023

POP QUIZ TOPIC 1_2 DPA10023

University

15 Qs

quiz-placeholder

Similar activities

QUIZ - ISOM

QUIZ - ISOM

University

10 Qs

Revision B

Revision B

University

10 Qs

Quiz 1 : MIS

Quiz 1 : MIS

University

10 Qs

Management Information System (MIS)

Management Information System (MIS)

University

15 Qs

INTRODUCTION TO NETWORK MANAGEMENT

INTRODUCTION TO NETWORK MANAGEMENT

University

15 Qs

Week 12 - Module 5 Unit 3 Using Access Control

Week 12 - Module 5 Unit 3 Using Access Control

University

20 Qs

Information System

Information System

University

15 Qs

AC 203 Topic 2 and 3

AC 203 Topic 2 and 3

University

12 Qs

POP QUIZ TOPIC 1_2 DPA10023

POP QUIZ TOPIC 1_2 DPA10023

Assessment

Quiz

Computers

University

Medium

Created by

Syakirah Ibrahim

Used 4+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following actions should you take to apply the new privacy settings on a social media platform for enhanced internet safety?

A. Make all your posts public to increase visibility.

B. Limit your posts' visibility to only friends or a custom list of trusted contacts.

C. Share your account details with your followers.

D. Disable all privacy settings for a better experience.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you receive an email from an unknown sender requesting personal information, what should you do to ensure your online safety?

A. Reply to the email with the requested information.

B. Forward the email to your friends.

C. Mark the email as spam or phishing, delete it, and report it.

D. Save the email to your drafts for future reference.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When using a public Wi-Fi network, which of the following actions can you apply to protect your data?

A. Access online banking and personal emails without any precautions.

B. Use a VPN, ensure websites are HTTPS secured, and turn off file sharing.

C. Share your device’s network connection with others around you.

D. Download and install software from unverified sources.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A coworker asks for your login credentials to access a system they cannot reach. What should you do according to ethical computer practices?

A. Share your login credentials to help them out.

B. Suggest they contact the IT department to resolve their access issue.

C. Use your login to perform their tasks for them.

D. Allow them to use your computer under your supervision.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You need to create a password that is both secure and easy to remember. Which of the following techniques would be the best choice?

A. Use your birthdate and name in the password.

B. Use a simple word followed by “123”.

C. Repeat the same character multiple times.

D. Combine a phrase with special characters, numbers, and mixed-case letters.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following practices should you apply to prevent malware infections on your computer?

A. Regularly update your operating system and software to the latest versions.

B. Install a single antivirus program and never update it.

C. Disable the firewall to increase internet speed.

D. Click on pop-up ads to download free security software.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A small business wants to enhance its financial decision-making process. How should it apply computer systems in accounting to support this objective?

A. Base all decisions on past experiences without reviewing current financial data.

B. Maintain financial records and reports in handwritten notebooks.

C. Utilize accounting software to generate real-time financial reports and analytics.

D. Rely solely on the accountant’s verbal advice for decision-making.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?