Page 16 - MIL Syllabus and Lesson Plans
P. 16
d) To install software updates automatically
29. What does the term "digital footprint" refer to?
a) The physical damage caused by electronic devices
b) The impression left by a person's online activities
c) The ability to repair electronic devices
d) The process of downloading and installing software
30. What are the potential risks of sharing personal information on social media?
a) Increased online privacy
b) Enhanced social connections
c) Identity theft and online scams
d) Improved job opportunities
Here are the answers for the quiz:
1. b) Being a responsible and respectful user of digital technologies
2. c) P@$$w0rd
3. c) Intentionally harassing or intimidating others online
4. c) Building strong online relationships
5. b) Uniform Resource Locator
6. c) To record an individual's online activities
7. b) A peer-reviewed scientific journal
8. b) It promotes fair use and creativity
9. b) Delete the email without opening it
10. Social engineering
11. To protect against unauthorized access
12. Engaging in respectful discussions on forums
13. b) Stealing personal information through email or websites
14. c) Scanning a fingerprint and entering a PIN
15. c) To identify fake news and misinformation
16. b) To limit the use of electronic devices
17. c) Using proper language and tone in online communication
18. b) Proper behavior on the World Wide Web
19. b) To protect personal information online
20. b) The gap between those who have access to digital technologies and those who don't
21. b) The act of ignoring someone by focusing on a phone or other devices
22. d) To disclose how personal information is collected and used
23. b) Using a reputable password management app
24. b) Understanding and effectively using digital technologies
25. b) To access blocked websites
26. To report suspicious online activities to authorities
27. d) Receiving an email asking for bank account details
28. b) To limit and monitor children's online activities
29. b) The impression left by a person's online activities
30. c) Identity theft and online scams
4