Refiloe rarely posts on social media and prefers to keep her personal life private. However, her friends occasionally tag her in photos and mention her in posts. What describes Refiloe's digital footprint?

Social digital footprint.

Localised digital footprint.

Passive digital footprint

Active digital footprint.

Passive digital footprint

Emily often visits websites and reads articles, but she does not interact with the content, comment on posts, nor share articles she reads with others. She clears her browser history every week and deletes all cookies. Which of the following options describes Emily's digital footprint?

Passive digital footprint

Both active and passive footprint.

No digital footprint.

Active digital footprint.

No digital footprint.

Sarah often posts about her personal and family matters on social media, including sensitive details about her relationships and personal struggles. What potential risk does Sarah face due to oversharing such personal information?

Damage to personal and professional relationships

Unauthorised access to her social media accounts.

Loss of control over her digital footprint and privacy.

Exposure to online scams and phishing attempts.

Damage to personal and professional relationships

Lindiwe, a filmmaker, produces a short documentary and uploads it to a video-sharing platform. What is the status of copyright protection for Lindiwe's documentary?

Copyright protection is automatic and applies as soon as Lindiwe creates the documentary.

Lindiwe needs to enter the documentary into film festivals for copyright protection

Copyright protection only applies to documentaries aired on television networks

Lindiwe needs to obtain a license from the platform to protect her documenta

Copyright protection is automatic and applies as soon as Lindiwe creates the documentary.

Robert is a social media user and regularly posts updates about his personal life, including pictures, videos, and location check-ins. He often shares his opinions on various topics. Which of the following options describes Robert's digital footprint?

Active digital footprint.

Social digital footprint.

Localised digital footprint.

Passive digital footprint.

Active digital footprint.

Rethabile discovered a suspicious app on her smartphone that she did not remember installing. The app requested extensive permissions to access her personal information and device features. Concerned about her privacy and potential malware, what action should Rethabile take to protect herself?

Grant the app permissions as requested to see its functionality.

Share her personal information with the app to ensure its proper functioning.

Contact customer support for the app and report the suspicious behavior.

Remove the app immediately from her smartphone.

Remove the app immediately from her smartphone.

Marco does not have internet at home and often uses public Wi-Fi networks to access his online accounts, browse the internet, and reply to his emails. What safety measure should Marco take to protect his sensitive information while using public Wi-Fi?

Share his login credentials with the Wi-Fi network administrator.

Use a virtual private network (VPN) to encrypt his internet connection.

Go to the same spots so he can remember the login details and his devices can automatically connect to the Wi-Fi.

Disable the firewall on his device for smoother internet access.

Use a virtual private network (VPN) to encrypt his internet connection.

Grant received an email informing him that he had won a free smartphone in a contest he did not enter. The email asked for his personal information to claim the prize. What safety measure should Grant take to protect himself from potential scams?

Forward the email to friends to share the good news.

Delete the email and report it as a potential phishing attempt.

Reply to the email with his personal information for verification purposes.

Click the link and provide the requested personal information.

Delete the email and report it as a potential phishing attempt.

Expand Question Completion Status:

QUESTION 1

Refiloe rarely posts on social media and prefers to keep her personal life private. However, her friends occasionally tag her in photos and mention her in posts. What describes Refiloe's digital footprint?

Social digital footprint.

Localised digital footprint.

Passive digital footprint

Active digital footprint.

1 points

QUESTION 2

Emily often visits websites and reads articles, but she does not interact with the content, comment on posts, nor share articles she reads with others. She clears her browser history every week and deletes all cookies. Which of the following options describes Emily's digital footprint?

Passive digital footprint

Both active and passive footprint.

No digital footprint.

Active digital footprint.

1 points

QUESTION 3

Sarah often posts about her personal and family matters on social media, including sensitive details about her relationships and personal struggles. What potential risk does Sarah face due to oversharing such personal information?

Damage to personal and professional relationships

Unauthorised access to her social media accounts.

Loss of control over her digital footprint and privacy.

Exposure to online scams and phishing attempts.

1 points

QUESTION 4

Lindiwe, a filmmaker, produces a short documentary and uploads it to a video-sharing platform. What is the status of copyright protection for Lindiwe's documentary?

Copyright protection is automatic and applies as soon as Lindiwe creates the documentary.

Lindiwe needs to enter the documentary into film festivals for copyright protection

Copyright protection only applies to documentaries aired on television networks

Lindiwe needs to obtain a license from the platform to protect her documentary.

1 points

QUESTION 5

Robert is a social media user and regularly posts updates about his personal life, including pictures, videos, and location check-ins. He often shares his opinions on various topics. Which of the following options describes Robert's digital footprint?

Active digital footprint.

Social digital footprint.

Localised digital footprint.

Passive digital footprint.

1 points

QUESTION 6

The email below was sent to a UFS staff member’s UFS work email address. Which part of the email makes this email suspicious? Click on the area in the email that should have warned the staff member that this was likely a phishing scam.

Markerimage related to this question
Selected Coordinates 107, 255Clear
1 points

QUESTION 7

Rethabile discovered a suspicious app on her smartphone that she did not remember installing. The app requested extensive permissions to access her personal information and device features. Concerned about her privacy and potential malware, what action should Rethabile take to protect herself?

Grant the app permissions as requested to see its functionality.

Share her personal information with the app to ensure its proper functioning.

Contact customer support for the app and report the suspicious behavior.

Remove the app immediately from her smartphone.

1 points

QUESTION 8

Marco does not have internet at home and often uses public Wi-Fi networks to access his online accounts, browse the internet, and reply to his emails. What safety measure should Marco take to protect his sensitive information while using public Wi-Fi?

Share his login credentials with the Wi-Fi network administrator.

Use a virtual private network (VPN) to encrypt his internet connection.

Go to the same spots so he can remember the login details and his devices can automatically connect to the Wi-Fi.

Disable the firewall on his device for smoother internet access.

1 points

QUESTION 9

Grant received an email informing him that he had won a free smartphone in a contest he did not enter. The email asked for his personal information to claim the prize. What safety measure should Grant take to protect himself from potential scams?

Forward the email to friends to share the good news.

Delete the email and report it as a potential phishing attempt.

Reply to the email with his personal information for verification purposes.

Click the link and provide the requested personal information.

1 points

QUESTION 10

Ntombi received an email claiming to be from a well-known online retailer, stating that her account had been compromised. The email urged her to click on a link and enter her credit card details to resolve the issue. Sensing something suspicious, Ntombi contacted the retailer's customer support directly instead of clicking the link. She discovered that the email was a phishing attempt aimed at obtaining her financial information. In this case, the primary goal of the phishing attack was to:

Spread viruses and malware.

Disrupt online services and websites.

Gain unauthorised access to a system or network.

Trick users into disclosing sensitive information

Trick users into disclosing sensitive information

What should you prioritise regarding privacy and security in digital communication? 

Using secure communication channels for confidential matters

Forgetting that there are real people behind the screens 

Considering the privacy and security of others 

Sharing sensitive information online 

Using secure communication channels for confidential matters

Considering the privacy and security of others

Question Completion Status:

QUESTION 1

Refiloe rarely posts on social media and prefers to keep her personal life private. However, her friends occasionally tag her in photos and mention her in posts. What describes Refiloe's digital footprint?

Social digital footprint.

Localised digital footprint.

Passive digital footprint

Active digital footprint.

1 points

QUESTION 2

Emily often visits websites and reads articles, but she does not interact with the content, comment on posts, nor share articles she reads with others. She clears her browser history every week and deletes all cookies. Which of the following options describes Emily's digital footprint?

Passive digital footprint

Both active and passive footprint.

No digital footprint.

Active digital footprint.

1 points

QUESTION 3

Sarah often posts about her personal and family matters on social media, including sensitive details about her relationships and personal struggles. What potential risk does Sarah face due to oversharing such personal information?

Damage to personal and professional relationships

Unauthorised access to her social media accounts.

Loss of control over her digital footprint and privacy.

Exposure to online scams and phishing attempts.

1 points

QUESTION 4

Lindiwe, a filmmaker, produces a short documentary and uploads it to a video-sharing platform. What is the status of copyright protection for Lindiwe's documentary?

Copyright protection is automatic and applies as soon as Lindiwe creates the documentary.

Lindiwe needs to enter the documentary into film festivals for copyright protection

Copyright protection only applies to documentaries aired on television networks

Lindiwe needs to obtain a license from the platform to protect her documentary.

1 points

QUESTION 5

Robert is a social media user and regularly posts updates about his personal life, including pictures, videos, and location check-ins. He often shares his opinions on various topics. Which of the following options describes Robert's digital footprint?

Active digital footprint.

Social digital footprint.

Localised digital footprint.

Passive digital footprint.

1 points

QUESTION 6

The email below was sent to a UFS staff member’s UFS work email address. Which part of the email makes this email suspicious? Click on the area in the email that should have warned the staff member that this was likely a phishing scam.

Markerimage related to this question
Selected Coordinates 107, 255Clear
1 points

QUESTION 7

Rethabile discovered a suspicious app on her smartphone that she did not remember installing. The app requested extensive permissions to access her personal information and device features. Concerned about her privacy and potential malware, what action should Rethabile take to protect herself?

Grant the app permissions as requested to see its functionality.

Share her personal information with the app to ensure its proper functioning.

Contact customer support for the app and report the suspicious behavior.

Remove the app immediately from her smartphone.

1 points

QUESTION 8

Marco does not have internet at home and often uses public Wi-Fi networks to access his online accounts, browse the internet, and reply to his emails. What safety measure should Marco take to protect his sensitive information while using public Wi-Fi?

Share his login credentials with the Wi-Fi network administrator.

Use a virtual private network (VPN) to encrypt his internet connection.

Go to the same spots so he can remember the login details and his devices can automatically connect to the Wi-Fi.

Disable the firewall on his device for smoother internet access.

1 points

QUESTION 9

Grant received an email informing him that he had won a free smartphone in a contest he did not enter. The email asked for his personal information to claim the prize. What safety measure should Grant take to protect himself from potential scams?

Forward the email to friends to share the good news.

Delete the email and report it as a potential phishing attempt.

Reply to the email with his personal information for verification purposes.

Click the link and provide the requested personal information.

1 points

QUESTION 10

Ntombi received an email claiming to be from a well-known online retailer, stating that her account had been compromised. The email urged her to click on a link and enter her credit card details to resolve the issue. Sensing something suspicious, Ntombi contacted the retailer's customer support directly instead of clicking the link. She discovered that the email was a phishing attempt aimed at obtaining her financial information. In this case, the primary goal of the phishing attack was to:

Spread viruses and malware.

Disrupt online services and websites.

Gain unauthorised access to a system or network.

Trick users into disclosing sensitive information.

1 points

QUESTION 11

What should you prioritise regarding privacy and security in digital communication? 

Using secure communication channels for confidential matters

Forgetting that there are real people behind the screens 

Considering the privacy and security of others 

Sharing sensitive information online 

1 points

QUESTION 12

How can assumptions based on unclear language and appearance be damaging in a professional setting, as shown in the case study?

Misunderstandings caused by unclear language and appearance are easily resolved and should have no lasting impact in a professional setting. 

Assumptions based on unclear language and appearance can create bias and prejudice.

Assumptions based on unclear language and appearance should be critically reviewed to resolve the ambiguity.  

Professional decisions based on assumptions make the decision-maker seem incompetent

Assumptions based on unclear language and appearance can create bias and prejudice.

How did social distancing measures affect personal relationships? 

They limited physical contact and gatherings, leading to decreased in-person interactions and affecting the dynamics of personal relationships. 

They did not impact personal relationships, as people could still communicate and connect through digital platforms. 

They did not affect personal relationships as people found alternative ways to spend time together, such as outdoor activities. 

Personal relationships were unaffected as individuals could compensate for the lack of physical contact through virtual interactions

They limited physical contact and gatherings, leading to decreased in-person interactions and affecting the dynamics of personal relationships.

How can project management tools facilitate communication in collaborative environments? 

Project management tools provide transparency by documenting and archiving project-related conversations and decisions. 

Project management tools provide access to external communication channels like email or chat apps.

Project management tools offer video conferencing features for virtual team meetings. 

Project management tools automate communication processes and eliminate the need for direct interaction. 

Project management tools provide transparency by documenting and archiving project-related conversations and decisions.

What are some guidelines for maintaining professionalism in digital communication in professional settings? (Select TWO) 

Prioritise communication according to personal preferences, not organisational guidelines or expectations. 

Incorporate slang, abbreviations, or jargon extensively to demonstrate your familiarity with industry-specific language. 

Maintain confidentiality and respect the privacy of others by not sharing sensitive or personal information without permission. 

Use informal language and a casual tone to establish a friendly and approachable atmosphere in professional settings.

Provide constructive feedback or criticism respectfully and tactfully, focusing on the issue

Maintain confidentiality and respect the privacy of others by not sharing sensitive or personal information without permission.

Provide constructive feedback or criticism respectfully and tactfully, focusing on the issue.

When discussing clients in online forums, which of the following statements is true?

Discussing clients in online forums helps professionals gather insights and advice from a larger community, benefiting their practice. 

Professionals can trust that the information shared in online forums will remain confidential and not be shared beyond the intended audience. 

Breaching client confidentiality can lead to legal consequences, such as lawsuits or loss of business. 

Professionals are not obligated to protect client confidentiality in online forums if personal identifying information is not disclosed.

Breaching client confidentiality can lead to legal consequences, such as lawsuits or loss of business.

What is key to practicing proper communication skills in the digital environment? 

Limiting your use of abbreviations or acronyms 

Engaging in heated discussions online 

Maintaining a professional tone 

Answer messages and requests when you can 

Maintaining a professional tone.

Why is it important to consider the context, communication type, and formality when using digital tools and resources?

Considering the context, communication type, and formality is important because it helps ensure effective and appropriate communication. 



The context and formality of the communication do not influence the level of professionalism required. 

Different digital tools and resources work equally well regardless of the context and communication type. 

There is no need to adjust our language or approach based on context, communication type, or formality. 

Considering the context, communication type, and formality is important because it helps ensure effective and appropriate communication.

What is the main purpose of educational platforms like Coursera, Udemy, and Khan Academy? 

Access online courses and educational resources 

Develop a community of inquiry  

Manage your learning journey 

Share ideas and opinions 

The main purpose of educational platforms like Coursera, Udemy, and Khan Academy is to access online courses and educational resources.

What is the importance of reflecting on and adapting to responsible technology use? 

To avoid ethical considerations and guidelines for technology use 

To ignore the impact of technology on individuals, communities, and society 

To neglect personal consequences of inappropriate technology use 

To reinforce addictive behaviours and excessive use of technology

To evaluate progress, identify challenges, and make necessary adjustments 

To evaluate progress, identify challenges, and make necessary adjustments

What can individuals do to start advocating for victims of cyberbullying?

Support the perpetrators and ignore the victims 

Be a bystander and report incidents 

Report evidence and resolve bullying constructively 

Share gossip anonymously 

Encourage more cyberbullying incidents