Appropriate Online Behavior - Exam 6.1 9.27.16

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Angiebas
A
Angiebas
Community Contributor
Quizzes Created: 6 | Total Attempts: 571
Questions: 10 | Attempts: 84

SettingsSettingsSettings
Appropriate Online Behavior - Exam 6.1 9.27.16 - Quiz

Please, take your time. Read each question thoroughly. We've went over this in class multiple times that I know you know all of the answers.


Questions and Answers
  • 1. 

    In reality, anyone that you meet online is a ___________.

    • A.

      Guest

    • B.

      Friend

    • C.

      Stranger

    • D.

      Squatter

    Correct Answer
    C. Stranger
    Explanation
    When meeting someone online, it is important to remember that you do not know them personally and have no prior relationship with them. Therefore, the correct answer is "stranger" as it implies that the person is unknown and unfamiliar.

    Rate this question:

  • 2. 

    There are many out there who would like to know more for various reasons so that (Select 3)

    • A.

      They could want to harm you.

    • B.

      They may want to become your best friend.

    • C.

      They could use information to conduct their own business - either selling your info or using it in an illegal manner.

    • D.

      They could want money.

    Correct Answer(s)
    A. They could want to harm you.
    C. They could use information to conduct their own business - either selling your info or using it in an illegal manner.
    D. They could want money.
    Explanation
    The given correct answer choices suggest potential reasons why someone would want to know more about a person. These reasons include wanting to harm the person, using their information for illegal activities or selling it for personal gain, and wanting money. These motivations highlight the potential dangers of sharing personal information and emphasize the importance of being cautious about who has access to such information.

    Rate this question:

  • 3. 

    What is the BEST example of a good screen name/ user id?

    • A.

      Saints15DEBBall

    • B.

      SkaterDude12

    • C.

      HunkofLuv4U

    • D.

      Skater2016

    Correct Answer
    D. Skater2016
    Explanation
    The screen name "Skater2016" is the best example of a good screen name/user id because it is simple, easy to remember, and does not contain any personal or inappropriate information. It also gives a clear indication of the user's interest or hobby (skating) and the year they started using the screen name (2016). This screen name is professional, suitable for various online platforms, and does not reveal any personal details.

    Rate this question:

  • 4. 

    Some people lie about who they are and what they want on the Internet for various reasons. Sometimes it is to steal an identity or to bully. Other times it is to meet children and teens to form an inappropriate relationship. These people are known as Online Predators. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement provided in the question is true. Online predators are individuals who deceive others about their identity and intentions on the internet. They may engage in activities such as identity theft, bullying, or forming inappropriate relationships with children and teenagers. This behavior poses a significant risk to online users, particularly vulnerable individuals.

    Rate this question:

  • 5. 

    A predator is 

    • A.

      Someone who is easily harmed or affected in a bad way by someone or something.

    • B.

      Someone who follows and tries to catch or capture (someone or something) for usually a long distance or time.

    • C.

      A person who kills someone (such as a famous or important person) usually for political reasons or for money.

    • D.

      One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.

    Correct Answer
    D. One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.
    Explanation
    The correct answer for this question is "one who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them." This answer accurately describes the behavior of a predator, who uses deceptive tactics to gain proximity to their victim and cause harm.

    Rate this question:

  • 6. 

    What types of information should you keep private?

    • A.

      Social Security Number (SSN)

    • B.

      Hair & Eye Color

    • C.

      First & Last Name

    • D.

      Date of Birth & Age

    • E.

      Favorite Movie

    • F.

      Car Make

    Correct Answer(s)
    A. Social Security Number (SSN)
    C. First & Last Name
    D. Date of Birth & Age
    Explanation
    The types of information that should be kept private are personal identifiers such as Social Security Number (SSN), First & Last Name, and Date of Birth & Age. These pieces of information are crucial for identity theft and can be used to access sensitive accounts or commit fraudulent activities. Hair & Eye Color, Favorite Movie, and Car Make are not considered private information as they do not pose a significant risk if disclosed.

    Rate this question:

  • 7. 

    What type of grooming tatic is this: Unsafe contacts will try to build a friendship with you and earn your trust. At first, they will say things to you that make you feel special and important. Sometimes they will pretend to be of the same age. On the other hand, some unsafe contacts may reveal their real age, gender and even their first name. 

    • A.

      Indirect Solicitation of Information

    • B.

      Flattery

    • C.

      Sympathy

    • D.

      Inappropriate Conversation

    Correct Answer
    B. Flattery
    Explanation
    This type of grooming tactic is known as flattery. Unsafe contacts will try to build a friendship with you and earn your trust by saying things that make you feel special and important. They may also pretend to be of the same age or reveal personal information such as their real age, gender, and first name. Flattery is a common tactic used by predators to manipulate their victims and gain their trust.

    Rate this question:

  • 8. 

    Which grooming tatics are in this story:Marcus is playing WorldCraft, a popular multiplayer game where people of all ages can buld towns, create worlds, design landscapes, and defend their domains against fictional foes. The virtual world allows players to chat with others and work together to build and defend their civilizations. Since Marcus moved to a new school when his parents split, he has not made any new friends. Marcus spends hours in WorldCraft because he feels safe and free from his troubles there. His gamertag is marcus_mayhem12. One gamer, Zaction 145, asked Marcus if they could team up together and build a civilization. Marcus accepted the gamer friend request. Marcus found out that his gamer friend is someone named Zack who was 17. Zack chats with Marcus about his favorite subject - WorldCraft. As Marcus becomes more comfortable, Zack asks him what grade he is in and where he goes to school. When Marcus tells Zack how much he misses his old neighborhood Zack seems like he really understands and cares. After some time, Zack sends Marcus extra virtual goods and even invites Marcus to join him at GameFest. They exchange cell phone numbers and text each other. One night, Zack asks Marcus a question. Marcus feels uncomfortable about what Zack has asked him to do. Zack says he will pay for the tickets and travel expenses if Marcus will do him a favor. 

    • A.

      Private Chat

    • B.

      Sympathy

    • C.

      Indirect Solicitation of Information

    • D.

      A & C

    • E.

      All of the above

    Correct Answer
    E. All of the above
    Explanation
    The correct answer is "All of the above." This is because the story includes all three grooming tactics mentioned: private chat (Zack and Marcus exchange cell phone numbers and text each other), sympathy (Zack shows understanding and care towards Marcus), and indirect solicitation of information (Zack asks Marcus personal questions and eventually asks him to do a favor). These tactics are commonly used by groomers to gain the trust and manipulate their victims.

    Rate this question:

  • 9. 

    According to the story about Marcus Mayhem, what information does Zaction145 NOT know about Marcus (based on the story)?

    • A.

      School Name

    • B.

      Age

    • C.

      Contact Information

    • D.

      Social Security Number

    Correct Answer
    D. Social Security Number
    Explanation
    Zaction145 does not know Marcus Mayhem's social security number based on the story. The story does not mention any information about Marcus's social security number.

    Rate this question:

  • 10. 

    Three Online Risks are:

    • A.

      Identity theft, online predators/stalkers, and personal information solicitation.

    • B.

      Cyberbullying, flattery, and shoulder surfing.

    • C.

      Cyber bullying, identity theft, and online predators/stalkers.

    • D.

      Guessing, dictionary, and phishing.

    Correct Answer
    C. Cyber bullying, identity theft, and online predators/stalkers.
    Explanation
    The correct answer is cyber bullying, identity theft, and online predators/stalkers. These three risks are common dangers that individuals face while using the internet. Cyber bullying refers to the act of harassing, intimidating, or threatening someone online. Identity theft involves stealing someone's personal information to commit fraud or other illegal activities. Online predators/stalkers are individuals who use the internet to target and exploit others, often for sexual or harmful purposes. These risks highlight the importance of being cautious and taking necessary precautions while engaging in online activities.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 17, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 27, 2016
    Quiz Created by
    Angiebas
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.