Learning in a digital age/LiDA102/Digital environments/Quiz
From WikiEducator
Jump to: navigation, search
The questions published at the end of each learning pathway are re-used for the knowledge test for learners interested in earning a digital badge or certificate of participation for the Digital citizenship (LiDA102) micro-course. Please consult the Certify participation page for more information.
True - false questions
Indicate whether the following statements are true or false:
- Health and safety professionals often recommend taking a 5 - 10 minute break once an hour when working at a computer workstation, to avoid fatigue.
- True
- Correct.
- False
- Incorrect. Look back at the 'Health and safety' page of this learning pathway to refresh your memory on health and safety recommendations.
- True
- Geoblocking cannot prevent someone playing a DVD in another country as long as they purchased it legally in their own country.
- True
- Incorrect. Refer again to the 'Digital rights management' page of this learning pathway to learn about geoblocking.
- False
- Correct.
- True
- A ‘phishing’ attack occurs when someone sends you an email that appears legitimate and asks you to provide your password or other security information.
- True
- Correct.
- False
- Incorrect. You can check the definition of phishing and learn about other threats to your password security on the 'Online hygiene' page of this learning pathway.
- True
- All websites are secure (i.e. encrypt your data).
- True
- Incorrect. Only secure websites encrypt your data - sites that have http:// rather than https:// in their url are not secure.
- False
- Correct.
- True
Multiple choice questions
- To protect the identity of others, you should (Select all that apply - there are two correct answers):
- Use the cc field for all email addresses when mailing to a group
- No - other recipients can see all the email addresses in the cc field, meaning that someone’s address might be shared without their permission.
- Ask permission before passing on a friend’s or colleague’s email address to a third party
- Yes, that is good practice. You should also find out and explain why the third party wants the email address.
- Use the bcc field for all email addresses when mailing to a group
- Yes - this means the recipients can’t see each other's email addresses.
- Let your friend know if you have posted a photograph of them on a social media site
- No - this is not enough. You need to ask their permission BEFORE you post any photos.
- Use the cc field for all email addresses when mailing to a group
- In the context of this LiDA102 micro-course, the abbreviation DRM stands for:
- Document and record management
- No. The abbreviation can be used for document and record management, but it is not how it is used in the LiDA102 micro-course.
- Digital rights management
- Yes, DRM refers to “Digital Rights Management” in the context of the LiDA102 course.
- Digital road map
- No. This can be the meaning of DRM, but not in the context of the LiDA102 micro-course.
- Data recovery module
- No. This is not the meaning of DRM in the LiDA102 micro-course.
- Document and record management
- Which of the following is NOT an example of DRM? (Select one.)
- Installing hidden files on a DVD to limit the number of times a piece of software can be installed
- Incorrect. This is an example of DRM.
- Using a digital lock on software to prevent someone repairing their own machinery
- Incorrect. This is an example of DRM.
- Using technology to restrict access to digital media based on geographical location
- Incorrect. This is an example of DRM.
- Getting users to agree to restrictive terms and conditions for use of software
- Correct. This is not classed as ‘digital rights management’ because it does not use a TECHNICAL solution to restrict use of a product - instead it is a legal solution.
- Installing hidden files on a DVD to limit the number of times a piece of software can be installed
- Which of the following is typical of the ‘creation’ stage of an online community as summarised by the research of Iriberri and Leroy? (Select one.)
- Addressing privacy issues
- That’s right.
- Loyalty recognition
- No, that is part of the ‘maturity’ stage.
- Determining the purpose of the group
- No, that is part of the ‘inception’ stage.
- Integrating new members
- No, that is part of the ‘growth’ stage.
- Addressing privacy issues