Compétences en Numératie

Cher participant,

Cette section est un test final (POST Test) vous permettant de vérifier si vous avez atteint le niveau 2 pour le Pilier 3 - Compétences Numériques. Voici les questions à compléter afin de vérifier si vous avez déjà atteint le niveau 2.

En fonction de votre score et de nos conseils, vous êtes toujours libre de reprendre le parcours d'apprentissage du niveau 2 ou même de revenir au parcours d'apprentissage du niveau 1 pour améliorer encore vos connaissances.

Nous vous informons que l'équipe self-Learn s'engage à conserver de façon confidentielle les informations vous concernant (votre nom, votre adresse électronique et vos résultats).

Veuillez vérifier que vous avez répondu à TOUTES les questions et que vous avez rempli TOUS les champs obligatoires, auquel cas vous ne pourrez pas recevoir de réponse.

Nous vous remercions pour votre participation !

L'équipe self-Learn


1. Which of the following are techniques for conducting an Internet search?

a) The use of quotation marks
b) The use of the symbol "AND“
c) The use of the symbol "+“
d) The three above

2. Offline maps…

a) Cannot be automatically downloaded and updated based on your current location and travel patterns
b) Can be automatically downloaded and updated based on your current location and travel patterns
c) Can be automatically downloaded and updated based on any location and travel patterns
d) Can be only updated based on your current location and travel patterns

3. Minecraft…

a) Is a 3D sandbox game that has no required goals to accomplish, allowing players a large amount of freedom in choosing how to play the game
b) Cannot be played online
c) Has a modding community that consists on workers making annual updates
d) All answers above are correct

4. Which are special webinar features?

a) Screen sharing, downloading and multi-attendance
b) Calendar reminders for all members of the webinar, invitation integration with social media and presentation collaboration support
c) Q&A tools, Integrated streaming software and taking phone calls
d) None of the above

5. Which are types of phishing attacks?

a) Bulk phishing emails
b) Business email compromise
c) Spear phishing
d) All of the above

6. Which of the following is NOT a tip to avoid copyright infringement on social media?

a) Obtain licensing
b) Post original content
c) Use trending sounds with caution
d) Ask always for permission to the platform manager

7. Google Translate can translate multiple forms of text and media, which includes text, speech, and text within still or moving images. Including:

a) Website and written word Translation
b) Image Translation
c) Mobile App Translation
d) All the above are correct

8. Cyber threats come in many forms, excluding:

a) Digital leftovers
b) Phishing scams
c) Ransomware attacks
d) Malware

9. AI is meant to be:

a) A foundational and transformational technology that will provide compelling and helpful benefits
b) A still-emerging technology, that poses various and evolving complexities and risks
c) A free usable tool with some limitations
d) All of the above

10. Mobile banking…

a) Is only used to conduct financial transactions remotely
b) Is susceptible to cyber attacks
c) Cannot be used 72h after its creation
d) Is not a free service provided for most banks

Informations joueur
Nom: (indispensable)
Email:

Combien y a-t-il de pneus sur une voiture? (ex : 7)

Calendrier self-Learn

Comment nous avez-vous trouvé?

Comment nous avez-vous trouvé?