MTEL Digital Literacy and Computer Science - Question List

Select how would you like to study

1.
Which of the following strategies is recommended to prevent eyestrain when looking at a computer screen?
  1. Taking a two-minute break every four hours and looking into the distance.
  2. Placing the screen an arm's length away and slightly below eye level.
  3. Adjusting the room lighting so that it is as bright as possible.
  4. Changing the color of the text to a light color against a white background.
2.
Researchers have found that interventions designed to reduce the time children spend viewing screens, playing video games, and using computers result in declines in which of the following health risks? 
  1. Obesity.
  2. Infectious disease.
  3. Bipolar disorder.
  4. Nutritional deficiencies.
3.
The primary difference between an email in a phishing attack and an email in a spear phishing attack is that an email in a spear phishing attack:
  1. Is personalized or includes personal information to make it appear legitimate.
  2. Is designed to mimic an email coming from a known business or organization.
  3. Attempts to trick a user into sharing sensitive account or financial information.
  4. Provides a link to a website where the user can enter the data requested.
4.
A student playing an online video game receives a chat message that appears to come from a friend's account that includes a link to a new plugin. The student installs and uses the new plugin. Soon after, the student learns their friend did not send the message and discovers unexplained activity and unauthorized purchases in their online gaming account. The student has been the victim of a:
  1. Trojan
  2. Worm
  3. Direct denial-of-service attack.
  4. Social engineering attack.
5.
A proxy server is most likely to improve the security of an organization's network in which of the following ways?
  1. Critical data and system files can be backed up if the network is compromised.
  2. The traffic load on the network can be balanced so that no one server is overloaded.
  3. The IP addresses of network computers will be less vulnerable to attacks from hackers.
  4. Data transmitted to and from the Internet will be blocked whenever a threat is detected.

Select how would you like to study