Learning in a digital age/LiDA102/Digital environments/Quiz

From WikiEducator
Jump to: navigation, search


Test sign.jpg
The questions which follow provide a basic knowledge test of selected concepts covered in this learning pathway: Digital environments.

The questions published at the end of each learning pathway are re-used for the knowledge test for learners interested in earning a digital badge or certificate of participation for the Digital citizenship (LiDA102) micro-course. Please consult the Certify participation page for more information.

Icon qmark line.svg
True - false questions

Indicate whether the following statements are true or false:

  • Health and safety professionals often recommend taking a 5 - 10 minute break once an hour when working at a computer workstation, to avoid fatigue.
    • True
      • Correct.
    • False
      • Incorrect. Look back at the 'Health and safety' page of this learning pathway to refresh your memory on health and safety recommendations.
  • Geoblocking cannot prevent someone playing a DVD in another country as long as they purchased it legally in their own country.
    • True
      • Incorrect. Refer again to the 'Digital rights management' page of this learning pathway to learn about geoblocking.
    • False
      • Correct.
  • A ‘phishing’ attack occurs when someone sends you an email that appears legitimate and asks you to provide your password or other security information.
    • True
      • Correct.
    • False
      • Incorrect. You can check the definition of phishing and learn about other threats to your password security on the 'Online hygiene' page of this learning pathway.
  • All websites are secure (i.e. encrypt your data).
    • True
      • Incorrect. Only secure websites encrypt your data - sites that have http:// rather than https:// in their url are not secure.
    • False
      • Correct.



Icon qmark line.svg
Multiple choice questions
  • To protect the identity of others, you should (Select all that apply - there are two correct answers):
    • Use the cc field for all email addresses when mailing to a group
      • No - other recipients can see all the email addresses in the cc field, meaning that someone’s address might be shared without their permission.
    • Ask permission before passing on a friend’s or colleague’s email address to a third party
      • Yes, that is good practice. You should also find out and explain why the third party wants the email address.
    • Use the bcc field for all email addresses when mailing to a group
      • Yes - this means the recipients can’t see each other's email addresses.
    • Let your friend know if you have posted a photograph of them on a social media site
      • No - this is not enough. You need to ask their permission BEFORE you post any photos.
  • In the context of this LiDA102 micro-course, the abbreviation DRM stands for:
    • Document and record management
      • No. The abbreviation can be used for document and record management, but it is not how it is used in the LiDA102 micro-course.
    • Digital rights management
      • Yes, DRM refers to “Digital Rights Management” in the context of the LiDA102 course.
    • Digital road map
      • No. This can be the meaning of DRM, but not in the context of the LiDA102 micro-course.
    • Data recovery module
      • No. This is not the meaning of DRM in the LiDA102 micro-course.
  • Which of the following is NOT an example of DRM? (Select one.)
    • Installing hidden files on a DVD to limit the number of times a piece of software can be installed
      • Incorrect. This is an example of DRM.
    • Using a digital lock on software to prevent someone repairing their own machinery
      • Incorrect. This is an example of DRM.
    • Using technology to restrict access to digital media based on geographical location
      • Incorrect. This is an example of DRM.
    • Getting users to agree to restrictive terms and conditions for use of software
      • Correct. This is not classed as ‘digital rights management’ because it does not use a TECHNICAL solution to restrict use of a product - instead it is a legal solution.
  • Which of the following is typical of the ‘creation’ stage of an online community as summarised by the research of Iriberri and Leroy? (Select one.)
    • Addressing privacy issues
      • That’s right.
    • Loyalty recognition
      • No, that is part of the ‘maturity’ stage.
    • Determining the purpose of the group
      • No, that is part of the ‘inception’ stage.
    • Integrating new members
      • No, that is part of the ‘growth’ stage.