1 |
-------------- is the digital marketing technique that involves creating more traffic to a website by making sur ethat the websige appears higher up in the results in search. |
- A. Email marketing
- B. Search engine optimization
- C. Content market
- D. Social media marketing
|
2 |
Which step involves breaking down complex prblems into smaller parts. |
- A. Decompostion
- B. Pattern recongnition
- C. Generalization and Abstraction
- D. Algorithm Design
|
3 |
What is the least significant bit in a binary number. |
- A. The bit to the extreme left
- B. The bit to the extreme right
- C. The middle bit
- D. It depends on the number
|
4 |
------------------- enables the populace to understand and contribute to the public discourse, and eventually make a sound decision when electing their leaders. |
- A. Media Literacy
- B. Project management
- C. Quality assurance
- D. Social media marketing
|
5 |
What should you do before opening an attachement. |
- A. Use your browsers incognito mode
- B. Scan it with anti malware software
- C. Use a VPN
- D. Avoid clicking on links and attachemens in emails
|
6 |
What is an ethical issue related to the digital environment. |
- A. Individiual responsibility
- B. Misuse of personal information
- C. Issues related to race and ethinicity
- D. Implementation of laws
|
7 |
How many Brosto bytes make up a geop Byte. |
- A. 1024
- B. 1048576
- C. 1099511627776
- D. 1073741824
|
8 |
----------- are represented in the computer using 8-bit numbers. |
- A. Numbers
- B. Letters
- C. Images
- D. Colors
|
9 |
Which shout you do if you receive nasty or bullyig comments. |
- A. Report it to the authorities
- B. Respond with nasty comments
- C. Block of unfriend the person
- D. Share it with your friends.
|
10 |
Which of the following is a way to protect your privacy online. |
- A. Share all personal information
- B. Keep priacy settng off
- C. Keep passwords public
- D. Share only necessary perosonal information
|