Cybersecurity & Encryption
Privacy & PII
Data & Analytics
Access & Equity in Technology
Ethics & Computing Innovations
100

What is the primary goal of cryptography in computing? A. To decrease the security of transmitted data   B. To make all communications public and easily accessible  C. To eliminate the need for secure communication channels D. To secure communication through encryption and decryption

 D. To secure communication through encryption and decryption

100

A mobile app collects users' Personally Identifiable Information (PII) to personalize the user experience. The collection of this type of information primarily raises concerns related to:               A. Digital divide          B. Cybersecurity         C. Privacy           D. Open-source software

  C. Privacy

100

As a digital marketer analyzing search trends, what tool would you use to identify what products customers are searching for?                  A. Guessing based on personal preferences            B. Analytics and data mining          C. Ignoring trends and making random choices                   D. Asking each customer individually

B. Analytics and data mining

100

What is a significant impact of the digital divide?            A. Increased collaboration and efficiency in cloud computing.          B. Uniform access to digital resources across different regions.         C. Unequal access to information and technology among different groups.             D. Decreased importance of the internet in global communication.

C. Unequal access to information and technology among different groups.

100

Why is it important to cite material created by someone else used in computational artifacts?      A. To reduce the size of the computational artifact.        B. To increase the processing speed of the artifact.      C. To make the artifact more appealing to the audience.       D. To acknowledge the original creator and avoid plagiarism.

D. To acknowledge the original creator and avoid plagiarism.

200

A government agency encrypts sensitive communications to protect them from interception and unauthorized access. This practice is an application of:        A. Digital rights management      B. Cloud computing         C. Data mining       D. Cryptography

D. Cryptography

200

How does the concept of a digital footprint or fingerprint impact privacy?           A. It leaves a trail of data that can be used without the individual's consent.           B. It ensures complete privacy and anonymity online.            C. It decreases the amount of data collected by websites.          D. It increases the security of personal information online.

 A. It leaves a trail of data that can be used without the individual's consent.  

200

What is the primary goal of data mining?     A. To limit the types of data that can be analyzed.    B. To decrease the amount of data available for analysis.           C. To find patterns and insights in large datasets.        D. To increase the complexity of data analysis processes.

C. To find patterns and insights in large datasets.  

200

You are an IT specialist addressing the digital divide in a rural community. What initiative would most effectively improve access to technology?      A. Ignoring the need for digital literacy training      B. Providing affordable internet access and devices            C. Focusing solely on urban areas            D. Only offering high-end devices

B. Providing affordable internet access and devices

200

ou are a software developer creating an application that uses encryption for secure communication. What is a fundamental concept in cryptography you must understand?     A. That encryption is unnecessary for text messages       B. Using simple codes that are easy to remember      C. Encrypting data only when requested by users       D. The difference between encryption and decryption

D. The difference between encryption and decryption

300

What is the purpose of using strong passwords and multifactor authentication?

A. To enhance the security of data and prevent unauthorized access   B. To decrease the overall security of online accounts    C. To make it easier for attackers to access personal data  D. To simplify the process of logging into accounts

A. To enhance the security of data and prevent unauthorized access

300

What is a primary concern related to the collection of Personally Identifiable Information (PII) by websites?A. The reduction in the number of websites collecting data.          B. The increase in the security of personal data online.             C. The potential misuse of personal data without the user's consent.         D. The decrease in personalized content and advertisements.

 C. The potential misuse of personal data without the user's consent.  

300

A social media platform uses data analytics to show users ads based on their browsing history and preferences. This use of data primarily benefits businesses by:            A. Enhancing privacy             B. Preventing cyber attacks         C. Reducing digital divide                D. Targeted advertising

D. Targeted advertising

300

As a developer for an online learning platform, you are tasked with improving accessibility for users worldwide. What is a crucial aspect to consider for making education more accessible?      A. Optimizing content for low-bandwidth connections     B. Limiting access to certain countries      C. Adding more advanced courses     D. Increasing subscription fees for premium content

A. Optimizing content for low-bandwidth connections

300

ou are an AI developer working on algorithms for screening job applications. How can you minimize bias in your AI system?       A. Limiting the diversity of the training data        B. Regularly auditing and updating the algorithms      C. Focusing on applicants' names and addresses       D. Using data from a single source

 B. Regularly auditing and updating the algorithms

400

As a developer working on a personal finance app, you need to ensure users' PII is secure. What is a critical step to take?         A. Collecting unnecessary personal information            B. Storing data in easily accessible formats        C. Encrypting all user data        D. Sharing user data with third-party advertisers

  C. Encrypting all user data

400

A software development company releases a new app that allows users to share their location and find nearby friends. However, it inadvertently leads to privacy concerns when users realize their locations can be tracked without their explicit consent. This scenario best illustrates which of the following unintended consequences of computing innovations?A. Cybersecurity breach             B. Bias in algorithms          C. Privacy invasion            D. Data mining misuse

 C. Privacy invasion

400

How does open access to data benefit society?        A. By decreasing the quality of available data        B. By increasing the cost of data analysis          C. By enabling public problem-solving and innovation       D. By restricting data access to authorized individuals

C. By enabling public problem-solving and innovation

400

A company decides to release its previously proprietary software to the public, allowing anyone to modify and distribute the code. This practice is an example of:      A. Public domain        B. Cloud computing       C. Open-source software         D. Crowdsourcing

C. Open-source software

400

What is the role of public key encryption in online security?          A. It makes encryption keys publicly available to decrease security.         B. It reduces the effectiveness of encryption in protecting data.         C. It increases the complexity of encryption without improving security.           D. It secures information until it is decrypted by the intended recipient.

 D. It secures information until it is decrypted by the intended recipient.

500

As a network administrator, you are tasked with preventing unauthorized access to the company's network. What is an essential security measure?      A. Using a single password for all network devices               B. Allowing all inbound and outbound traffic           C. Disabling antivirus software to improve speed            D. Implementing firewalls and intrusion detection systems

D. Implementing firewalls and intrusion detection systems

500

What is a potential negative impact of social media?        A. It can spread misinformation quickly across the globe         B. It reduces the ability for events to be streamed        C. It always ensures accurate information is shared         D. It guarantees privacy for all users

  A. It can spread misinformation quickly across the globe    

500

A government agency makes its datasets available online, enabling researchers and the public to access and analyze public data freely. This initiative is an example of:        A. Creative Commons       B. Open Access         C. Digital Divide        D. Data Privacy

B. Open Access

500

hich of the following is NOT a goal of digital inclusion?A. Improving internet access            B. Ensuring device affordability        C. Encouraging data monopolies        D. Promoting digital literacy

 C. Encouraging data monopolies  

500

You are a security consultant advising on best practices for protecting against keylogging malware. What recommendation would you give?      A. Ignoring software updates to maintain system stability       B. Disabling firewalls to enhance computer performance     C. Regularly updating software and using antivirus programs      D. Using the same password for all accounts for consistency

C. Regularly updating software and using antivirus programs