Email etiquette 1
Passwords
Phishing
Email etiquette 2
Excel
100

To carefully check the contents of the message before sending it. Read it, re-read it and use the spelling and grammar checker tool.

proof reading

100

When criminals hack your computer or network, lock you out, and demand a ransom to let you back in

 Ransomeware

100

A phishing scam by text

smishing

100

The appropriate amount of time an email needs to be replied to


24 to 48 hours

100

Shortcut key to Copy data


Ctrl + C

200

Email to use for online shopping, social media and keeping in touch with friends and family

Personal email address

200

The time it takes to crack your password with 7 characters

1 minute

200

A fake account with the same name and photo as one of your real friends that will later try to scam you


social media scam

200

The main difference between sending a personal email and a business email

level of formality

200

What is the default extension for a workbook file (newer version)?

.xlsx

300

What does BCC stand for and when should you use it in an email?

Blind Carbon Copy. When you want to protect the privacy of recipients or when sending a mass email without revealing everyone’s email address

300

Security feature that should be installed to prevent data breach

Multi-factor authentication

300

What is a QR Code scam?

A sticker placed over a legitimate QR code, so that when you scan it, you will be directed to a fake site

300

What does CC stand for and when should you use it in an email?

Carbon Copy. You should use it to inform additional recipients who should be aware of the email’s content, but are not the primary addressees.

300

Shortcut key to move to the first cell of the workbook

Ctrl + Home

400

When should you avoid using ‘Reply All’ in an email thread, and why is it important to exercise caution with this feature?

You should avoid using ‘reply all’ when your response isn’t relevant to all recipients as it can lead to unnecessary email clutter. Caution is essential to prevent unintentional sharing of sensitive or confidential information.

400

The time it takes to crack your password with 12 characters

2000 years

400

The formal term of voice phishing

vishing

400

The term for the practice of sending the same email to a large group of recipients, often without their consent  

email spam or email blasting

400

What is the excel function that returns the current date and time?

NOW

M
e
n
u