1.
In reality, anyone that you meet online is a ___________.
Correct Answer
C. Stranger
Explanation
When meeting someone online, it is important to remember that you do not know them personally and have no prior relationship with them. Therefore, the correct answer is "stranger" as it implies that the person is unknown and unfamiliar.
2.
There are many out there who would like to know more for various reasons so that (Select 3)
Correct Answer(s)
A. They could want to harm you.
C. They could use information to conduct their own business - either selling your info or using it in an illegal manner.
D. They could want money.
Explanation
The given correct answer choices suggest potential reasons why someone would want to know more about a person. These reasons include wanting to harm the person, using their information for illegal activities or selling it for personal gain, and wanting money. These motivations highlight the potential dangers of sharing personal information and emphasize the importance of being cautious about who has access to such information.
3.
What is the BEST example of a good screen name/ user id?
Correct Answer
D. Skater2016
Explanation
The screen name "Skater2016" is the best example of a good screen name/user id because it is simple, easy to remember, and does not contain any personal or inappropriate information. It also gives a clear indication of the user's interest or hobby (skating) and the year they started using the screen name (2016). This screen name is professional, suitable for various online platforms, and does not reveal any personal details.
4.
Some people lie about who they are and what they want on the Internet for various reasons. Sometimes it is to steal an identity or to bully. Other times it is to meet children and teens to form an inappropriate relationship. These people are known as Online Predators.
Correct Answer
A. True
Explanation
The statement provided in the question is true. Online predators are individuals who deceive others about their identity and intentions on the internet. They may engage in activities such as identity theft, bullying, or forming inappropriate relationships with children and teenagers. This behavior poses a significant risk to online users, particularly vulnerable individuals.
5.
A predator is
Correct Answer
D. One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.
Explanation
The correct answer for this question is "one who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them." This answer accurately describes the behavior of a predator, who uses deceptive tactics to gain proximity to their victim and cause harm.
6.
What types of information should you keep private?
Correct Answer(s)
A. Social Security Number (SSN)
C. First & Last Name
D. Date of Birth & Age
Explanation
The types of information that should be kept private are personal identifiers such as Social Security Number (SSN), First & Last Name, and Date of Birth & Age. These pieces of information are crucial for identity theft and can be used to access sensitive accounts or commit fraudulent activities. Hair & Eye Color, Favorite Movie, and Car Make are not considered private information as they do not pose a significant risk if disclosed.
7.
What type of grooming tatic is this: Unsafe contacts will try to build a friendship with you and earn your trust. At first, they will say things to you that make you feel special and important. Sometimes they will pretend to be of the same age. On the other hand, some unsafe contacts may reveal their real age, gender and even their first name.
Correct Answer
B. Flattery
Explanation
This type of grooming tactic is known as flattery. Unsafe contacts will try to build a friendship with you and earn your trust by saying things that make you feel special and important. They may also pretend to be of the same age or reveal personal information such as their real age, gender, and first name. Flattery is a common tactic used by predators to manipulate their victims and gain their trust.
8.
Which grooming tatics are in this story:Marcus is playing WorldCraft, a popular multiplayer game where people of all ages can buld towns, create worlds, design landscapes, and defend their domains against fictional foes. The virtual world allows players to chat with others and work together to build and defend their civilizations. Since Marcus moved to a new school when his parents split, he has not made any new friends. Marcus spends hours in WorldCraft because he feels safe and free from his troubles there. His gamertag is marcus_mayhem12. One gamer, Zaction 145, asked Marcus if they could team up together and build a civilization. Marcus accepted the gamer friend request. Marcus found out that his gamer friend is someone named Zack who was 17. Zack chats with Marcus about his favorite subject - WorldCraft. As Marcus becomes more comfortable, Zack asks him what grade he is in and where he goes to school. When Marcus tells Zack how much he misses his old neighborhood Zack seems like he really understands and cares. After some time, Zack sends Marcus extra virtual goods and even invites Marcus to join him at GameFest. They exchange cell phone numbers and text each other. One night, Zack asks Marcus a question. Marcus feels uncomfortable about what Zack has asked him to do. Zack says he will pay for the tickets and travel expenses if Marcus will do him a favor.
Correct Answer
E. All of the above
Explanation
The correct answer is "All of the above." This is because the story includes all three grooming tactics mentioned: private chat (Zack and Marcus exchange cell phone numbers and text each other), sympathy (Zack shows understanding and care towards Marcus), and indirect solicitation of information (Zack asks Marcus personal questions and eventually asks him to do a favor). These tactics are commonly used by groomers to gain the trust and manipulate their victims.
9.
According to the story about Marcus Mayhem, what information does Zaction145 NOT know about Marcus (based on the story)?
Correct Answer
D. Social Security Number
Explanation
Zaction145 does not know Marcus Mayhem's social security number based on the story. The story does not mention any information about Marcus's social security number.
10.
Three Online Risks are:
Correct Answer
C. Cyber bullying, identity theft, and online predators/stalkers.
Explanation
The correct answer is cyber bullying, identity theft, and online predators/stalkers. These three risks are common dangers that individuals face while using the internet. Cyber bullying refers to the act of harassing, intimidating, or threatening someone online. Identity theft involves stealing someone's personal information to commit fraud or other illegal activities. Online predators/stalkers are individuals who use the internet to target and exploit others, often for sexual or harmful purposes. These risks highlight the importance of being cautious and taking necessary precautions while engaging in online activities.