Page 16 - MIL Syllabus and Lesson Plans
P. 16

d) To install software updates automatically
                  29. What does the term "digital footprint" refer to?
                      a) The physical damage caused by electronic devices
                      b) The impression left by a person's online activities
                      c) The ability to repair electronic devices
                      d) The process of downloading and installing software
                  30. What are the potential risks of sharing personal information on social media?
                      a) Increased online privacy
                      b) Enhanced social connections
                      c) Identity theft and online scams
                      d) Improved job opportunities

                         Here are the answers for the quiz:

                      1.  b) Being a responsible and respectful user of digital technologies
                      2.  c) P@$$w0rd
                      3.  c) Intentionally harassing or intimidating others online
                      4.  c) Building strong online relationships
                      5.  b) Uniform Resource Locator
                      6.  c) To record an individual's online activities
                      7.  b) A peer-reviewed scientific journal
                      8.  b) It promotes fair use and creativity
                      9.  b) Delete the email without opening it
                      10. Social engineering
                      11. To protect against unauthorized access
                      12. Engaging in respectful discussions on forums
                      13. b) Stealing personal information through email or websites
                      14. c) Scanning a fingerprint and entering a PIN
                      15. c) To identify fake news and misinformation
                      16. b) To limit the use of electronic devices
                      17. c) Using proper language and tone in online communication
                      18. b) Proper behavior on the World Wide Web
                      19. b) To protect personal information online
                      20. b) The gap between those who have access to digital technologies and those who don't
                      21. b) The act of ignoring someone by focusing on a phone or other devices
                      22. d) To disclose how personal information is collected and used
                      23. b) Using a reputable password management app
                      24. b) Understanding and effectively using digital technologies
                      25. b) To access blocked websites
                      26. To report suspicious online activities to authorities
                      27. d) Receiving an email asking for bank account details
                      28. b) To limit and monitor children's online activities
                      29. b) The impression left by a person's online activities
                      30. c) Identity theft and online scams







                                                                                                         4
   11   12   13   14   15   16   17   18   19   20   21