[{"id":1065193,"question":"<p>What do user obligations usually say.</p>","choices":[{"text":"<p>Igore privacy</p>","value":"A"},{"text":"<p>Misuse service</p>","value":"B"},{"text":"<p>Follow rules and use responsibly</p>","value":"C"},{"text":"<p>Share passwords</p>","value":"D"},{"value":"E"}],"correctAnswer":3},{"id":1065192,"question":"<p>What may happen if someone breaks terms ofUse.</p>","choices":[{"text":"<p>Get reward</p>","value":"A"},{"text":"<p>Get blocked or facelegal actio</p>","value":"B"},{"text":"<p>Get free access</p>","value":"C"},{"text":"<p>Get discount</p>","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":1065191,"question":"<p>Whcih clause protectscompany contrent like logosor articles.</p>","choices":[{"text":"<p>Data use</p>","value":"A"},{"text":"<p>Property rights</p>","value":"B"},{"text":"<p>User rules</p>","value":"C"},{"text":"<p>Service end</p>","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":1065190,"question":"<p>Why do companies use Limitation of Liability</p>","choices":[{"text":"<p>Charge more</p>","value":"A"},{"text":"<p>Avoidfull blame for service issues</p>","value":"B"},{"text":"<p>Give more rights</p>","value":"C"},{"text":"<p>Allow illegal use</p>","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":1065189,"question":"<p>Which is NOT a user right in Term of Use.</p>","choices":[{"text":"<p>Right to rprivacy</p>","value":"A"},{"text":"<p>Right to misuse service</p>","value":"B"},{"text":"<p>Right to get intfo</p>","value":"C"},{"text":"<p>Right to complain&nbsp;</p>","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":1065188,"question":"<p>How do terms of Use help users.</p>","choices":[{"text":"<p>Hideimportant rules</p>","value":"A"},{"text":"<p>Shows clear rulesand expectations</p>","value":"B"},{"text":"<p>Make &nbsp;service cost more</p>","value":"C"},{"text":"<p>Limit all users</p>","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":1065187,"question":"<p>What is the main purpose of Terms of Use.</p>","choices":[{"text":"<p>Make service look official</p>","value":"A"},{"text":"<p>Build a fair user provider relatioship</p>","value":"B"},{"text":"<p>Protect only the provider</p>","value":"C"},{"text":"<p>Attract more ads</p>","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":1065186,"question":"<p>The behavior considered responsibile digital conduct</p>","choices":[{"text":"<p>Using secrue websites</p>","value":"A"},{"text":"<p>spreading false info online</p>","value":"B"},{"text":"<p>Respecting online privacy</p>","value":"C"},{"text":"<p>Reporting suspicious activity</p>","value":"D"},{"value":"E"}],"correctAnswer":1},{"id":1065185,"question":"<p>The practive considerexd ethical when using information .</p>","choices":[{"text":"<p>Copying content without permission&nbsp;</p>","value":"A"},{"text":"<p>Respecting copyring and avoiding plagiarism</p>","value":"B"},{"text":"<p>Igoring soruce atttribution&nbsp;</p>","value":"C"},{"text":"<p>Using unverified information</p>","value":"D"},{"value":"E"}]},{"id":1065184,"question":"<p>The posotive societa impact of computing system.</p>","choices":[{"text":"<p>Spread of misinformation</p>","value":"A"},{"text":"<p>Improveedinformation accessibility</p>","value":"B"},{"text":"<p>Heightened privacy concerns</p>","value":"C"},{"text":"<p>Widened tehnoloogy ga.</p>","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":1065183,"question":"<p>The reason for understnding bias durng information evaluation&nbsp;</p>","choices":[{"text":"<p>Ignoring other viewpoints</p>","value":"A"},{"text":"<p>Recognizing the soruce's agenda</p>","value":"B"},{"text":"<p>Validating all sources equally</p>","value":"C"},{"text":"<p>Avoiding evalution aitogether</p>","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":1065182,"question":"<p>The mpact of the digital divide on education&nbsp;</p>","choices":[{"text":"<p>Improves learning for all</p>","value":"A"},{"text":"<p>No educational impact</p>","value":"B"},{"text":"<p>Createsinequality in digital resource access</p>","value":"C"},{"text":"<p>Replaces traditional techign methods</p>","value":"D"},{"value":"E"}],"correctAnswer":3},{"id":1065181,"question":"<p>The threat involving user redirection to gfake websites.</p>","choices":[{"text":"<p>Phishing</p>","value":"A"},{"text":"<p>Spam</p>","value":"B"},{"text":"<p>Pharming</p>","value":"C"},{"text":"<p>Spyware</p>","value":"D"},{"value":"E"}],"correctAnswer":3}]