Level 2 Lesson 14

Created by Bradley Conrad

Repetitive Strain Injury (RSI), also known as Repetitive Stress Injury, refers to muscular issues associated with long-term computer use. To help prevent RSI, which three actions should you take?
c. Use an ergonomic keyboard and mouse d. Sit with your feet resting flat on the floor or a footrest f. Adjust your chair so your forearms are level with the keyboard

1/11

TermDefinition
Repetitive Strain Injury (RSI), also known as Repetitive Stress Injury, refers to muscular issues associated with long-term computer use. To help prevent RSI, which three actions should you take?
c. Use an ergonomic keyboard and mouse d. Sit with your feet resting flat on the floor or a footrest f. Adjust your chair so your forearms are level with the keyboard
Which two of the following are risks associated with Internet use?
a. Sharing your personally identifiable information e. Downloading malware
The arrangement of elements to minimize the chance and consequences of accidental or unintended actions is part of which universal design principle?
b. Tolerance for Error
Which of the following is NOT considered a sign of a potential catfishing scheme?
b. A distant relative sends you an email invitation to a family reunion
Which of the following conditions is characterized by feelings of anxiety that occur when someone believes others are having fun while they are not present?
a. Fear of missing out (FOMO)
Which two of the following behaviors are examples of FOMO behavior?
b. Waiting in line all night to ensure you purchase a copy of a new video game e. Constantly checking your social media to see what your friends are doing
Which of the following is NOT a likely consequence of posting negative responses to someone’s social media post?
c. The provider will suspend both accounts
Methods used to protect against the dangers associated with untrusted portable media devices include: o Regularly scanning devices using an anti-virus program o Never plugging an unknown or untrusted device into your computer o Disabling AutoRun/AutoPlay on your computer Which of the following is another method used to protect against untrusted media devices?
a. Don’t plug personal devices into a school computer
In which two of the following scenarios would it be appropriate to allow camera access?
b. When the photo app you are installing requests access c. While actively participating in an online video conference
Which file encryption type uses a public key to encrypt data and a private key to decrypt data?
d. Asymmetric
Nathan is collaborating on a Microsoft Word document with his team. He would like to apply editing restrictions to the document. Which of the following actions CANNOT be configured using Microsoft Word’s Restrict Editing feature?
a. Protect the document from being deleted