Tuesday, July 21, 2020

ALS Reviewer for AERT - Digital Literacy


1. A byte is a collection of eight bits, so called because of the pun with bit and bite. Similarly a collection of four bits – half a byte – is sometimes called a _______.
          A. octet                                                
          B. gigabyte                                          
C. megabyte
D. nybble or nibble
                   
2. It is a software or a device that allows users to create, edit, format and output of documents.
          A. word processor                                
          B. spreadsheet                                     
C. typewriter
D. printer
         
3. This small text file sent to your computer by a web site you have visited can be used to track your activity across different web sites in order to provide, for example, “targeted” advertisements.
          A. spam                                               
          B. cookie                                             
C. virus
D. biskit
         
4. It is a string of letters and numbers that have to be typed in on some web pages before something can be opened or saved.
          A. Passwords                                       
          B. Email address                                  
C. CAPTCHA
D. Username
           
5. Which of the following terms is NOT correct?
          A. A firewall is a piece of computer software or hardware that restricts the data that is allowed to flow through.
          B. A spam is an unsolicited email message sent out in bulk and generally commercial in nature.
          C. Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.
          D. A scam is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.

6. Also known as a web address, a URL is a form of URI and a standardized naming convention for addressing documents accessible over the Internet and Intranet. URL stands for ____________.
          A. Uninterrupted Resource Location      
          B. Uniform Resource Locator                
C. Universal Resource Locator
D. Uniform Resource Location
         
7. They are networks that allow public internet connections to be used as private networks as a means of improving security.
          A. LANs                                               
          B. DSLs                                               
C. VPNs
D. VMs
         
8. The following are ways to stop cyber bullying EXCEPT _____________.
          A. Confront the person personally, respond to his/her accusations, and retaliate as necessary.
          B. Save the evidence if things escalate.
          C. Reach out for help especially if the behavior is really getting to you
          D. Don’t share your passwords with anyone – even your closest friends, who may not be close forever.
         
9. To protect your online identity, one of the following ways is NOT helpful.
          A. Use strong password.                       
          B. Update security software.                 
C. Shred sensitive materials.
D. Read phishing emails.
         
         
10. Which of the following is NOT a mobile device?
          A. calculator                                         
          B. desktop computer                            
C. tablet
D. smartphone
         
11. It pertains to the practice of self-regulation and empathy, and to build positive relationships through the use of digital media.
          A. digital citizen identity                         
          B. digital communication                       
C. digital emotional intelligence
D. digital safety
         
12. Who created the world wide web?
          A. Robert E. Kahn                                
          B. Tim Berners-Lee                              
C. Vint Cerf
D. Mark Zuckerberg
         
13. It is any type of illegal activity that is undertaken (or relies heavily) on a computer, which includes network intrusions, identity theft and the spreading of computer viruses.
          A. Cyber bullying                                  
          B. Cybercrime                                      
C. Cyber security
D. Phishing
         
14. It is a set of symbols inserted into files intended for display on the world wide web. The symbols tell web browsers how to display words and images - e.g. which color, font and type size to use - and they direct it to link to other pages on the world wide web via hyperlinks.
          A. Java Script
          B. Joint Photographic Experts Group (JPEG)
          C. Portable document format (PDF)
          D. Hyper-text markup language (HTML)

15. Which of the following can be considered as a disadvantage of technology?
          A. Technology saves time, energy and money and provides many ways to accomplish a task.
          B. Technology provides rapidly expanding knowledge, better access to it, and global communications.
          C. Technology provides social distancing, less personal communications, and loss of individual privacy.
          D. Technology can help treat more sick people and consequently save many lives and combat very harmful viruses and bacteria.

ANSWERS