[{"id":1065185,"question":"<p>The practive considerexd ethical when using information .</p>","choices":[{"text":"<p>Copying content without permission&nbsp;</p>","value":"A"},{"text":"<p>Respecting copyring and avoiding plagiarism</p>","value":"B"},{"text":"<p>Igoring soruce atttribution&nbsp;</p>","value":"C"},{"text":"<p>Using unverified information</p>","value":"D"},{"value":"E"}]},{"id":1065184,"question":"<p>The posotive societa impact of computing system.</p>","choices":[{"text":"<p>Spread of misinformation</p>","value":"A"},{"text":"<p>Improveedinformation accessibility</p>","value":"B"},{"text":"<p>Heightened privacy concerns</p>","value":"C"},{"text":"<p>Widened tehnoloogy ga.</p>","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":1065183,"question":"<p>The reason for understnding bias durng information evaluation&nbsp;</p>","choices":[{"text":"<p>Ignoring other viewpoints</p>","value":"A"},{"text":"<p>Recognizing the soruce's agenda</p>","value":"B"},{"text":"<p>Validating all sources equally</p>","value":"C"},{"text":"<p>Avoiding evalution aitogether</p>","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":1065182,"question":"<p>The mpact of the digital divide on education&nbsp;</p>","choices":[{"text":"<p>Improves learning for all</p>","value":"A"},{"text":"<p>No educational impact</p>","value":"B"},{"text":"<p>Createsinequality in digital resource access</p>","value":"C"},{"text":"<p>Replaces traditional techign methods</p>","value":"D"},{"value":"E"}],"correctAnswer":3},{"id":1065181,"question":"<p>The threat involving user redirection to gfake websites.</p>","choices":[{"text":"<p>Phishing</p>","value":"A"},{"text":"<p>Spam</p>","value":"B"},{"text":"<p>Pharming</p>","value":"C"},{"text":"<p>Spyware</p>","value":"D"},{"value":"E"}],"correctAnswer":3},{"id":1065180,"question":"<p>The type of harmful sotware that sercretly monitors user ativity</p>","choices":[{"text":"<p>Spam</p>","value":"A"},{"text":"<p>Cookies</p>","value":"B"},{"text":"<p>Spyware</p>","value":"C"},{"text":"<p>Pharming</p>","value":"D"},{"value":"E"}],"correctAnswer":3},{"id":1065179,"question":"<p>The purposeof the Limitations of Liability clause in Terms of Use.</p>","choices":[{"text":"<p>ensures full company respnsibility</p>","value":"A"},{"text":"<p>Limits company's liability</p>","value":"B"},{"text":"<p>Provides usrer rights for damages</p>","value":"C"},{"text":"<p>Gurantees constant service availability</p>","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":1065178,"question":"<p>Option typially included in common terms of Use clauses</p>","choices":[{"text":"<p>User obligations</p>","value":"A"},{"text":"<p>Privacy and data use</p>","value":"B"},{"text":"<p>Product advertising</p>","value":"C"},{"text":"<p>Termination of service</p>","value":"D"},{"value":"E"}],"correctAnswer":1},{"id":1065177,"question":"<p>What is low latency in edge computing.</p>","choices":[{"text":"<p>Long delays</p>","value":"A"},{"text":"<p>Very little delay</p>","value":"B"},{"text":"<p>High cost</p>","value":"C"},{"text":"<p>Poor Connection</p>","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":1065176,"question":"<p>AWS lambda is an exampl e of&nbsp;</p>","choices":[{"text":"<p>IaaS</p>","value":"A"},{"text":"<p>PaaS</p>","value":"B"},{"text":"<p>Serverless architecture</p>","value":"C"},{"text":"<p>Hard drive</p>","value":"D"},{"value":"E"}],"correctAnswer":3},{"id":1065175,"question":"<p>Serverless computing means.</p>","choices":[{"text":"<p>No servers exist</p>","value":"A"},{"text":"<p>Developers don't manage servicers</p>","value":"B"},{"text":"<p>Servers are broken</p>","value":"C"},{"text":"<p>Servers are free</p>","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":1065174,"question":"<p>Self driving cars benefit from edge computing becasue it .</p>","choices":[{"text":"<p>Increases delay</p>","value":"A"},{"text":"<p>Reduces response time</p>","value":"B"},{"text":"<p>Slows down decisions</p>","value":"C"},{"text":"<p>Needs more drivers</p>","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":1065173,"question":"<p>Edge computng processes data closer to the</p>","choices":[{"text":"<p>Cloud center</p>","value":"A"},{"text":"<p>Source of data</p>","value":"B"},{"text":"<p>Office</p>","value":"C"},{"text":"<p>Server farm</p>","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":1065172,"question":"<p>Decentratlizatio in blockchain means.</p>","choices":[{"text":"<p>One person controls everything</p>","value":"A"},{"text":"<p>No one controls anything</p>","value":"B"},{"text":"<p>Many people share control</p>","value":"C"},{"text":"<p>Only companies control</p>","value":"D"},{"value":"E"}],"correctAnswer":3},{"id":1065171,"question":"<p>What protects data si blockchain like a sealed evelope.</p>","choices":[{"text":"<p>Encryption&nbsp;</p>","value":"A"},{"text":"<p>Erasing</p>","value":"B"},{"text":"<p>Copy pasting</p>","value":"C"},{"text":"<p>Sharing pulicly</p>","value":"D"},{"value":"E"}],"correctAnswer":1}]