click below
click below
Normal Size Small Size show me how
duty H and I
| Question | Answer |
|---|---|
| • Understand basic account management (3:3) | “Manage usernames, passwords, and permissions for each account.” “Use strong passwords and change them regularly.” “Enable two-factor authentication for extra security.” |
| • Understand basic threats to security of computers, data, and identity (3 | “Viruses, malware, phishing, and hackers can steal data.” “Avoid suspicious links and downloads.” “Monitoring tracks activity on devices.” |
| • Understand implications of monitoring software (i.e. surveillance) (3:3) | “Monitoring tracks activity on devices.” “Used for security, productivity, or parental control.” “Secured networks require password; safer than unsecured.” |
| • Differentiate connecting to secured vs. unsecured network (i.e. wired and wireless) (3:3) | “Secured networks require password; safer than unsecured.” “Unsecured networks risk data theft or hacking.” “Use VPN or security measures on public networks.” |
| • Understand importance of anti-virus software usage (3:3) | “Protects against malware, viruses, and spyware.” “Regular scans keep devices safe.” “Keep virus definitions updated for best protection.” |
| • Understand firewalls and basic settings (3:3) | “Firewall blocks unauthorized network access.” “Can allow or deny specific apps.” “Helps prevent hacking and malware attacks.” |
| • Identify e-commerce interactions and best purchasing practices (1:1) | “Shop on trusted sites; use secure payment methods; check reviews.” |
| • Define virtual private networks (VPNs) (1:1) | “VPN encrypts internet traffic to secure data and protect privacy.” |
| • Compare differences between plain text and HTML (i.e. text with markup) (3:3) | “Plain text = simple text; HTML = text with formatting and markup.” “HTML adds links, images, and styles; plain text cannot.” “Web pages use HTML; emails or notes often use plain text.” |
| • Use spell check (3:3) | “Check and correct spelling errors in documents.” “Highlight mistakes and suggest corrections.” “Use automatic or manual spell check tools |
| • Use review features (3:3) | “Track changes and add comments in documents.” “Review edits before finalizing work.” “Collaborate with others using review tools.” |
| • Demonstrate find/replace (3:3) | “Find specific text in a document quickly.” “Replace words or phrases automatically.” “Saves time editing large documents.” |
| • Select text or cells (3:3) | “Highlight text or spreadsheet cells to edit or format.” “Click and drag or use keyboard shortcuts.” “Multiple selections allow bulk changes.” |
| • Demonstrate redo and undo (3:3) | “Undo reverses last action; redo reapplies it.” “Helps fix mistakes quickly.” “Shortcut keys speed up editing.” |
| • Demonstrate drag and drop (3:3) | “Move files, text, or cells by dragging them.” “Easier than cut/paste for organization.” “Can copy or move depending on settings.” |
| • Understand read-only view (3:3) | “Cannot edit content; can only view documents.” “Prevents accidental changes.” “Often used for sharing files safely.” |
| • Understand protected mode (3:3) | “Limits edits and restricts unsafe content.” “Prevents malware from modifying files.” “Common in Office apps for security.” |
| • Demonstrate magnification (3:3) | “Zoom in/out to see content clearly.” “Helps with detailed editing or presentations.” “Adjust via view settings or shortcuts.” |