A) Unknown links in emails. B) Search results from reputable websites. C) Websites you visit often. D) Links on verified social media.
A) Faster internet access. B) An extra layer of security. C) Free software downloads. D) A way to recover lost passwords.
A) Forward it to friends. B) Open it to see what it’s about. C) Report it and do not open attachments. D) Reply to ask if it's legitimate.
A) To secure your internet connection. B) To improve your download speed. C) To block ads. D) To find public Wi-Fi.
A) To increase your friend list. B) To attract more followers. C) To control who sees your information. D) To make your profile more colorful.
A) Software that enhances performance. B) Malicious software designed to harm devices. C) A type of computer hardware. D) A program for creating websites.
A) Change your password immediately. B) Ignore it and hope it returns. C) Delete the account. D) Continue using the account as normal.
A) A platform for buying products. B) A secure encryption method. C) A type of online game. D) Software that displays unwanted ads. |