Which of the following statements about digital footprints are true? Select all that apply.

What other people post does not impact your digital footprint.  


You are in full control of who sees your digital footprint.  


Your digital footprint is permanent.  


Your actions online contribute to your digital footprint.  

Your digital footprint can affect your future opportunities.

Which of the following are good ways to maintain a positive digital footprint? Select all the options that apply.

Treat your social media accounts as live journalling opportunities 


Only post things that you would want everyone to see 


Do not overshare  


Use privacy settings

All of the options listed are good ways to maintain a positive digital footprint.

Which of the following should you do to help create a positive digital footprint for yourself?

Post funny images and memes.  

Post about things or causes you are passionate about.  

Respond to people who post or say things you disagree with. 

Share information that will make you look good, even if it is slightly exaggerated.

To create a positive digital footprint, you should post about things or causes you are passionate about.

Plagiarism can be defined as… (Select all the options that are correct).

representing another person's work — their words and/or ideas — as your own.  


not acknowledging the sources your ideas are built upon.


Using ideas you have previously published and not referencing yourself.


paraphrasing ideas with explicit acknowledgement of the author. 

Plagiarism can be defined as representing another person's work - their words and/or ideas - as your own and not acknowledging the sources your ideas are built upon.

Some phishing attacks are pretty easy to identify; others can be more sophisticated and quite convincing. If you suspect an email to be a phishing attempt, which of the following actions is/are safe to consider? Select all the options that apply.

Forward the email to as many people as possible to get their opinion on whether it's a phishing attempt or not.


Click on any links or attachments in the email to help determine whether the message was sent from a legitimate source. 


If an email seems suspicious, it is best to contact the supposed sender (e.g. bank) through a trusted channel, instead of replying to the message in question.  


Examine the email to look for some of the typical signs of phishing attacks, like a generic greeting, poor language and unusual requests.   

If you suspect an email to be a phishing attempt, it is safe to consider the following actions:

- If an email seems suspicious, it is best to contact the supposed sender (e.g. bank) through a trusted channel, instead of replying to the message in question.
- Examine the email to look for some of the typical signs of phishing attacks, like a generic greeting, poor language, and unusual requests.

Indicate if the following statement is true or false: If you receive an email from your bank or IT services, asking for your password, it most likely is a scam.

True

False

True. If you receive an email from your bank or IT services asking for your password, it is most likely a scam. Legitimate organizations typically do not ask for personal information, such as passwords, through email.

What are some of the tools that can be used to stay safe digitally? Select all the options that apply.

Up-to-date operating systems  


Up-to-date antivirus software   


Ransomware  


Strong passwords  

Up-to-date operating systems, up-to-date antivirus software, and strong passwords are tools that can be used to stay safe digitally. Ransomware, on the other hand, is not a tool but a type of malware that poses a threat to digital safety.

What is online privacy?

An unnecessary burden on social media users

Not important for people who don't use technology

A way to control your physical belongings

About protecting the information you share via the internet

Online privacy is about protecting the information you share via the internet.

Indicate if the following statement is true or false: Privacy is a fundamental right to control your identity and who has access to your information.

True

False

True. Privacy is indeed considered a fundamental right that allows individuals to control their identity and determine who has access to their personal information.

Indicate if the following statement is true or false: Your personal data is a valuable commodity that can be used by cybercriminal organisations to make money.  

True

False

True. Your personal data is indeed a valuable commodity that can be exploited by cybercriminal organizations for monetary gain.