answers
1. What would you consider an advantage of using a smartphone over a
basic cellular phone?
A. Being able to access your email.
B. Being able to access your voice mail.
C. Being able to make video calls.
D. Being able to place a call. Ans✓✓✓ A. Being able to access your
email. (Correct) C. Being able to make video calls. (Correct)
10. Which ways can you follow to wirelessly transfer files from a
smartphone to a desktop computer and vice versa?
A. Use a cloud service (for example: Dropbox, OneDrive, Google Drive)
and synchronize the files between the cloud and all your devices.
B. Use a smartphone app to transfer files over Wi-Fi network to your
desktop computer or your smartphone.
C. Connect both devices to the same wireless network. Then use the
computer's file system to copy or move files between the devices.
D. Remove the sim card from your phone and plug it into the computer.
Ans✓✓✓ A. Use a cloud service (for example: Dropbox, OneDrive,
Google Drive) and synchronize the files between the cloud and all your
devices. (Correct)
B. Use a smartphone app to transfer files over Wi-Fi network to your
desktop computer or your smartphone. (Correct)
100. What does VPN stand for?
,A. Virtual Private Network
B. Very Private Network
C. Volatile Privacy Network
D. Verified Private Network Ans✓✓✓ A. Virtual Private Network
101. The main function of a VPN is to secure and encrypt wireless
networks.
A. False
B. True Ans✓✓✓ False
102. What is the definition of VPN?
A. An encrypted and safe wireless network.
B. A network that you can login to without any authentication.
C. A network designed to be used by a single person.
D. A network that extends a private network across a public network.
Ans✓✓✓ D. A network that extends a private network across a public
network.
103. What is not true about a VPN?
A. It is a network that extends a private network across a public network.
B. It secures and encrypts any wireless network
C. All VPNs can be trusted.
D. VPNs can only be used by a single person.
,E. Its name stands for Virtual Private Network. Ans✓✓✓ B. It secures
and encrypts any wireless network. (Correct)
C. All VPNs can be trusted. (Correct)
D. VPNs can only be used by a single person. (Correct)
104. Which actions do not constitute a good practice for making a
password more secure?
A. It should be small.
B. It should be the same for all sites.
C. It is preferable to include some personal information (such as
birthday).
D. It should be at least 8 characters long.
E. It should not be a word but a random sequence of letters. Ans✓✓✓
A. It should be small. (Correct)
B. It should be the same for all sites. (Correct)
C. It is preferable to include some personal information (such as
birthday). (Correct)
105. Which password is more secure?
A. G!*n70899
B. John79
C. Password
D. 1234 Ans✓✓✓ A. G!*n70899
, 106. It is preferable to use passwords that are short and easy to
remember.
A. False
B. True Ans✓✓✓ False
107. There are some common characteristics of phishing emails. Can
you recognize them?
A. They try to scare you with fake alerts.
B. They try to disguise their true source under the name of a well-known
sender.
C. They redirect you to dummy sites, usually replicas of well-known
ones.
D. They contain the identity of the true sender in their attachments.
E. They are send by your friend's hacked email account. Ans✓✓✓ A.
They try to scare you with fake alerts. (Correct)
B. They try to disguise their true source under the name of a well-known
sender. (Correct)
C. They redirect you to dummy sites, usually replicas of well-known
ones. (Correct)
108. You received an email from your bank asking you to reply to this
email with some sensitive personal information (like your e-banking
username and password).
A. You provide them with the information they asked for.
They claim that my account has been hacked and they need to restore it.
B. It is a phishing mail. Report it to your mail provider and your bank.