ITE 152 - Module 11 Newest Actual Exam
Complete Questions Ans Detailed
Answers Graded A+ 2025/2026.
Keeping your Social Security number hidden in a locked box in your home
In terms of privacy, which of the following is a best practice?
- Posting your location on social media
- Saving your personal information as an email draft
- Throwing away old bank statements that are more than three months old
- Keeping your Social Security number hidden in a locked box in your home
I will need to review each browser security setting and use my best
judgement.
How will you decide which browser security settings to allow and which
ones to block?
- I will need to review each browser security setting and use my best
judgement.
- If the browser security setting has been mentioned on several friends'
timelines on Facebook then it must be a good one, so I should do change it
on my computer too.
- If the browser security setting is on a website sent from a friend, I
always accept the setting.
- If the browser security setting is from my favorite online retailers, I will
accept it because the retailer knows what I like.
pretexting
Which of the following forms of identity theft involves posing as a
legitimate researcher to ask for personal information?
cyberstalking
research spoofing
phishing
pretexting
Use a surge protector.
How can you protect a computer from electrical spikes and surges?
, Use a cable lock.
Unplug the computer when it is not in use.
Use an uninterruptible power supply.
Use a surge protector.
data backup
Creating a(n) _____ means copying files from a computer's hard drive and
storing them in a remote location.
uninterruptible data supply
data backup
alarm
private copy
Ergonomics
Which term refers to the science that specifies the design and
arrangement of items you use so you interact with the items efficiently
and safely?
Technology addiction
Ergonomics
Repetitive strain
Cyberbullying
Lead and mercury in computer parts are seeping into the ground and
water supply.
How does discarding computers in a landfill affect the environment?
- Lead and mercury in computer parts are seeping into the ground and
water supply.
- Copper on circuit boards is creating fire hazards.
- The computer parts quickly decay and become organic material
- Data miners are digging up landfills looking for gold and platinum.
Because these networks are rarely protected
Why is it not safe to connect to public Wi-Fi networks?
Because these networks are rarely protected
Because it can weaken your own Wi-Fi wireless router
Because the connection is often too slow
Because they do not allow Internet access
higher satisfaction with life
Complete Questions Ans Detailed
Answers Graded A+ 2025/2026.
Keeping your Social Security number hidden in a locked box in your home
In terms of privacy, which of the following is a best practice?
- Posting your location on social media
- Saving your personal information as an email draft
- Throwing away old bank statements that are more than three months old
- Keeping your Social Security number hidden in a locked box in your home
I will need to review each browser security setting and use my best
judgement.
How will you decide which browser security settings to allow and which
ones to block?
- I will need to review each browser security setting and use my best
judgement.
- If the browser security setting has been mentioned on several friends'
timelines on Facebook then it must be a good one, so I should do change it
on my computer too.
- If the browser security setting is on a website sent from a friend, I
always accept the setting.
- If the browser security setting is from my favorite online retailers, I will
accept it because the retailer knows what I like.
pretexting
Which of the following forms of identity theft involves posing as a
legitimate researcher to ask for personal information?
cyberstalking
research spoofing
phishing
pretexting
Use a surge protector.
How can you protect a computer from electrical spikes and surges?
, Use a cable lock.
Unplug the computer when it is not in use.
Use an uninterruptible power supply.
Use a surge protector.
data backup
Creating a(n) _____ means copying files from a computer's hard drive and
storing them in a remote location.
uninterruptible data supply
data backup
alarm
private copy
Ergonomics
Which term refers to the science that specifies the design and
arrangement of items you use so you interact with the items efficiently
and safely?
Technology addiction
Ergonomics
Repetitive strain
Cyberbullying
Lead and mercury in computer parts are seeping into the ground and
water supply.
How does discarding computers in a landfill affect the environment?
- Lead and mercury in computer parts are seeping into the ground and
water supply.
- Copper on circuit boards is creating fire hazards.
- The computer parts quickly decay and become organic material
- Data miners are digging up landfills looking for gold and platinum.
Because these networks are rarely protected
Why is it not safe to connect to public Wi-Fi networks?
Because these networks are rarely protected
Because it can weaken your own Wi-Fi wireless router
Because the connection is often too slow
Because they do not allow Internet access
higher satisfaction with life