Level-2 Pillar-3 POST Test

Dear Participant,

You are here for the completion of the Self Evaluation POST Test Tool for Level 2; for you to assess and to see/verify if you have achieved Level 2 skilledness of the Pillar 3 - Digital Skills. Here are the questions to assess yourself to check if you are already at the Level 2.

Depending on your score and our related advice, you are always free to repeat Level 2 training; or even go back to Level 1 training to further enhance your related skills.

Results will be made known only to you and the self-Learn project team, who will keep all your name and e-mail address information and results with the utmost confidentiality and never share them with third parties.

Please make sure that you will have answered ALL questions and fill in ALL required fields, otherwise, you can not receive an answer.

Thank you for your participation!

The self-Learn Project Team


1. Which of the following are techniques for conducting an Internet search?

a) The use of quotation marks
b) The use of the symbol "AND“
c) The use of the symbol "+“
d) The three above

2. Offline maps…

a) Cannot be automatically downloaded and updated based on your current location and travel patterns
b) Can be automatically downloaded and updated based on your current location and travel patterns
c) Can be automatically downloaded and updated based on any location and travel patterns
d) Can be only updated based on your current location and travel patterns

3. Minecraft…

a) Is a 3D sandbox game that has no required goals to accomplish, allowing players a large amount of freedom in choosing how to play the game
b) Cannot be played online
c) Has a modding community that consists on workers making annual updates
d) All answers above are correct

4. Which are special webinar features?

a) Screen sharing, downloading and multi-attendance
b) Calendar reminders for all members of the webinar, invitation integration with social media and presentation collaboration support
c) Q&A tools, Integrated streaming software and taking phone calls
d) None of the above

5. Which are types of phishing attacks?

a) Bulk phishing emails
b) Business email compromise
c) Spear phishing
d) All of the above

6. Which of the following is NOT a tip to avoid copyright infringement on social media?

a) Obtain licensing
b) Post original content
c) Use trending sounds with caution
d) Ask always for permission to the platform manager

7. Google Translate can translate multiple forms of text and media, which includes text, speech, and text within still or moving images. Including:

a) Website and written word Translation
b) Image Translation
c) Mobile App Translation
d) All the above are correct

8. Cyber threats come in many forms, excluding:

a) Digital leftovers
b) Phishing scams
c) Ransomware attacks
d) Malware

9. AI is meant to be:

a) A foundational and transformational technology that will provide compelling and helpful benefits
b) A still-emerging technology, that poses various and evolving complexities and risks
c) A free usable tool with some limitations
d) All of the above

10. Mobile banking…

a) Is only used to conduct financial transactions remotely
b) Is susceptible to cyber attacks
c) Cannot be used 72h after its creation
d) Is not a free service provided for most banks

Send Results to below Coordinates:
Name: (required)
Email:

How many tires on a typical bicycle? (e.g: 4)

self-Learn Calendar

Feedback - How did you find us?

How did you find us?