1 |
What should be avoided when handling emails. |
- A. Opening attachements from unknown sources
- B. Using subject lines
- C. Organizing inbox
- D. using rpectful langauge
|
2 |
------------ means taht the hardware and software should work well together. |
- A. Compatibility
- B. Safety
- C. Efficiency
- D. All of these
|
3 |
What does 1OT stand for? |
- A. Internet to things
- B. Internal operating technology
- C. Input-output transfer
- D. Integreated optical technology
|
4 |
What doe respobsible compuer usage include. |
- A. Being cautious abut what you share online and protecting youself and others
- B. Sharing your passowrds with friends
- C. Choosing the ost expensive hardware
- D. Ignoring software updates
|
5 |
What is significant benefit of blockchain technology. |
- A. Secure transactions
- B. Cantralized control
- C. Slow processing
- D. Mannual verification
|
6 |
What is software privacy. |
- A. Sharing software legally with friends
- B. Updating sofware regularly
- C. the illegal copying , distributionof use of software
- D. Buying sotware froman official source
|
7 |
Which action violates responsbile software usage. |
- A. Instaling updates
- B. Following EULA
- C. Regular backups
- D. Sharing licensed copies
|
8 |
Why is it important to use storng unique passwords. |
- A. to make your acconts easy to hack
- B. To help others guess your password
- C. To avoid installing software updates
- D. To make it harder for someone to guess your passowrd and access your accounts
|
9 |
------------is about doing the right thing when it coms to collecting storing and using information. |
- A. Storing Sharing
- B. Laws
- C. Sharing
- D. Data Ethics
|
10 |
How should personal imforation be managed online. |
- A. Share freely
- B. Post publicily
- C. Use weak passwords
- D. Keep Private
|