What is the primary goal of cryptography in computing? A. To decrease the security of transmitted data B. To make all communications public and easily accessible C. To eliminate the need for secure communication channels D. To secure communication through encryption and decryption
D. To secure communication through encryption and decryption
A mobile app collects users' Personally Identifiable Information (PII) to personalize the user experience. The collection of this type of information primarily raises concerns related to: A. Digital divide B. Cybersecurity C. Privacy D. Open-source software
C. Privacy
As a digital marketer analyzing search trends, what tool would you use to identify what products customers are searching for? A. Guessing based on personal preferences B. Analytics and data mining C. Ignoring trends and making random choices D. Asking each customer individually
B. Analytics and data mining
What is a significant impact of the digital divide? A. Increased collaboration and efficiency in cloud computing. B. Uniform access to digital resources across different regions. C. Unequal access to information and technology among different groups. D. Decreased importance of the internet in global communication.
C. Unequal access to information and technology among different groups.
Why is it important to cite material created by someone else used in computational artifacts? A. To reduce the size of the computational artifact. B. To increase the processing speed of the artifact. C. To make the artifact more appealing to the audience. D. To acknowledge the original creator and avoid plagiarism.
D. To acknowledge the original creator and avoid plagiarism.
A government agency encrypts sensitive communications to protect them from interception and unauthorized access. This practice is an application of: A. Digital rights management B. Cloud computing C. Data mining D. Cryptography
D. Cryptography
How does the concept of a digital footprint or fingerprint impact privacy? A. It leaves a trail of data that can be used without the individual's consent. B. It ensures complete privacy and anonymity online. C. It decreases the amount of data collected by websites. D. It increases the security of personal information online.
A. It leaves a trail of data that can be used without the individual's consent.
What is the primary goal of data mining? A. To limit the types of data that can be analyzed. B. To decrease the amount of data available for analysis. C. To find patterns and insights in large datasets. D. To increase the complexity of data analysis processes.
C. To find patterns and insights in large datasets.
You are an IT specialist addressing the digital divide in a rural community. What initiative would most effectively improve access to technology? A. Ignoring the need for digital literacy training B. Providing affordable internet access and devices C. Focusing solely on urban areas D. Only offering high-end devices
B. Providing affordable internet access and devices
ou are a software developer creating an application that uses encryption for secure communication. What is a fundamental concept in cryptography you must understand? A. That encryption is unnecessary for text messages B. Using simple codes that are easy to remember C. Encrypting data only when requested by users D. The difference between encryption and decryption
D. The difference between encryption and decryption
What is the purpose of using strong passwords and multifactor authentication?
A. To enhance the security of data and prevent unauthorized access B. To decrease the overall security of online accounts C. To make it easier for attackers to access personal data D. To simplify the process of logging into accounts
A. To enhance the security of data and prevent unauthorized access
What is a primary concern related to the collection of Personally Identifiable Information (PII) by websites?A. The reduction in the number of websites collecting data. B. The increase in the security of personal data online. C. The potential misuse of personal data without the user's consent. D. The decrease in personalized content and advertisements.
C. The potential misuse of personal data without the user's consent.
A social media platform uses data analytics to show users ads based on their browsing history and preferences. This use of data primarily benefits businesses by: A. Enhancing privacy B. Preventing cyber attacks C. Reducing digital divide D. Targeted advertising
D. Targeted advertising
As a developer for an online learning platform, you are tasked with improving accessibility for users worldwide. What is a crucial aspect to consider for making education more accessible? A. Optimizing content for low-bandwidth connections B. Limiting access to certain countries C. Adding more advanced courses D. Increasing subscription fees for premium content
A. Optimizing content for low-bandwidth connections
ou are an AI developer working on algorithms for screening job applications. How can you minimize bias in your AI system? A. Limiting the diversity of the training data B. Regularly auditing and updating the algorithms C. Focusing on applicants' names and addresses D. Using data from a single source
B. Regularly auditing and updating the algorithms
As a developer working on a personal finance app, you need to ensure users' PII is secure. What is a critical step to take? A. Collecting unnecessary personal information B. Storing data in easily accessible formats C. Encrypting all user data D. Sharing user data with third-party advertisers
C. Encrypting all user data
A software development company releases a new app that allows users to share their location and find nearby friends. However, it inadvertently leads to privacy concerns when users realize their locations can be tracked without their explicit consent. This scenario best illustrates which of the following unintended consequences of computing innovations?A. Cybersecurity breach B. Bias in algorithms C. Privacy invasion D. Data mining misuse
C. Privacy invasion
How does open access to data benefit society? A. By decreasing the quality of available data B. By increasing the cost of data analysis C. By enabling public problem-solving and innovation D. By restricting data access to authorized individuals
C. By enabling public problem-solving and innovation
A company decides to release its previously proprietary software to the public, allowing anyone to modify and distribute the code. This practice is an example of: A. Public domain B. Cloud computing C. Open-source software D. Crowdsourcing
C. Open-source software
What is the role of public key encryption in online security? A. It makes encryption keys publicly available to decrease security. B. It reduces the effectiveness of encryption in protecting data. C. It increases the complexity of encryption without improving security. D. It secures information until it is decrypted by the intended recipient.
D. It secures information until it is decrypted by the intended recipient.
As a network administrator, you are tasked with preventing unauthorized access to the company's network. What is an essential security measure? A. Using a single password for all network devices B. Allowing all inbound and outbound traffic C. Disabling antivirus software to improve speed D. Implementing firewalls and intrusion detection systems
D. Implementing firewalls and intrusion detection systems
What is a potential negative impact of social media? A. It can spread misinformation quickly across the globe B. It reduces the ability for events to be streamed C. It always ensures accurate information is shared D. It guarantees privacy for all users
A. It can spread misinformation quickly across the globe
A government agency makes its datasets available online, enabling researchers and the public to access and analyze public data freely. This initiative is an example of: A. Creative Commons B. Open Access C. Digital Divide D. Data Privacy
B. Open Access
hich of the following is NOT a goal of digital inclusion?A. Improving internet access B. Ensuring device affordability C. Encouraging data monopolies D. Promoting digital literacy
C. Encouraging data monopolies
You are a security consultant advising on best practices for protecting against keylogging malware. What recommendation would you give? A. Ignoring software updates to maintain system stability B. Disabling firewalls to enhance computer performance C. Regularly updating software and using antivirus programs D. Using the same password for all accounts for consistency
C. Regularly updating software and using antivirus programs