Appropriate Online Behavior - Exam 6.1 Retake 10/4

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Angiebas
A
Angiebas
Community Contributor
Quizzes Created: 6 | Total Attempts: 571
Questions: 20 | Attempts: 78

SettingsSettingsSettings
Appropriate Online Behavior - Exam 6.1 Retake 10/4 - Quiz

Please, take your time. Read each question thoroughly. We've went over this in class multiple times that I know you know all of the answers.


Questions and Answers
  • 1. 

    In reality, anyone that you meet online is a ___________.

    • A.

      Guest

    • B.

      Friend

    • C.

      Stranger

    • D.

      Squatter

    Correct Answer
    C. Stranger
    Explanation
    When it comes to meeting people online, it is important to remember that you do not personally know them. Therefore, they are considered strangers. It is crucial to exercise caution and not trust someone blindly just because you have interacted with them online.

    Rate this question:

  • 2. 

    There are many out there who would like to know more for various reasons ( S E L E C T  3 )

    • A.

      They could want to harm you.

    • B.

      They may want to become your best friend.

    • C.

      They could use information to conduct their own business - either selling your info or using it in an illegal manner.

    • D.

      They could want money.

    Correct Answer(s)
    A. They could want to harm you.
    C. They could use information to conduct their own business - either selling your info or using it in an illegal manner.
    D. They could want money.
    Explanation
    The correct answer options explain the various reasons why someone would want to know more about you. They could want to harm you by using the information against you. They could use the information to conduct their own business, either by selling your information or using it in an illegal manner. Lastly, they could want money, possibly by exploiting the information they gather about you.

    Rate this question:

  • 3. 

    What is the BEST example of a good screen name/ user id?

    • A.

      Senators15DEBBall

    • B.

      Skater4Life

    • C.

      SexyDime25

    • D.

      SkaterGrl2016

    Correct Answer
    B. Skater4Life
    Explanation
    Skater4Life is the best example of a good screen name/user ID because it is simple, easy to remember, and reflects the user's interest in skating. It does not contain any personal or inappropriate information, making it suitable for a wide range of online platforms.

    Rate this question:

  • 4. 

    Some people lie about who they are and what they want on the Internet for various reasons. Sometimes it is to steal an identity or to bully. Other times it is to meet children and teens to form an inappropriate relationship. These people are known as online predators. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given statement is true. Online predators are individuals who deceive others on the internet by pretending to be someone they are not, often with harmful intentions. They may lie about their identity and intentions to steal personal information, engage in cyberbullying, or groom children and teenagers for inappropriate relationships. These predators pose a significant risk to online users, particularly vulnerable individuals who may be unaware of their true intentions. It is important to be cautious and vigilant while interacting with others online to protect oneself from such individuals.

    Rate this question:

  • 5. 

    A predator is 

    • A.

      Someone who is easily harmed or affected in a bad way by someone or something.

    • B.

      Someone who follows and tries to catch or capture (someone or something) for usually a long distance or time.

    • C.

      A person who kills someone (such as a famous or important person) usually for political reasons or for money.

    • D.

      One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.

    Correct Answer
    D. One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.
    Explanation
    A predator is someone who stalks or uses lies, secrecy, or stealth to get close to another person and easily hurt or harm them. This definition emphasizes the predatory behavior of intentionally seeking out and targeting individuals with the intention of causing harm.

    Rate this question:

  • 6. 

    What types of information should you keep private?

    • A.

      Social Security Number (SSN)

    • B.

      Hair & Eye Color

    • C.

      First & Last Name

    • D.

      Date of Birth & Age

    • E.

      Favorite Movie

    Correct Answer(s)
    A. Social Security Number (SSN)
    C. First & Last Name
    D. Date of Birth & Age
    Explanation
    You should keep your Social Security Number (SSN), First & Last Name, and Date of Birth & Age private. This information is sensitive and can be used for identity theft or fraud if it falls into the wrong hands. It is important to protect this personal information to ensure your privacy and security.

    Rate this question:

  • 7. 

    Three Online Risks are Cyber Bullying, Identity Theft, and Online Prey.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because the given options do not accurately represent the three online risks. Cyber bullying, identity theft, and online prey are indeed online risks, but they are not the only risks. There are several other risks such as hacking, phishing, malware attacks, and online scams that are not mentioned in the options. Therefore, the correct answer is false.

    Rate this question:

  • 8. 

    What type of grooming tatic is this: Unsafe contacts will try to build a friendship with you and earn your trust. At first, they will say things to you that make you feel special and important. Sometimes they will pretend to be of the same age. On the other hand, some unsafe contacts may reveal their real age, gender and even their first name. 

    • A.

      Indirect Solicitation of Information

    • B.

      Flattery

    • C.

      Sympathy

    • D.

      Inappropriate Conversation

    Correct Answer
    B. Flattery
    Explanation
    This type of grooming tactic is known as "Flattery". Unsafe contacts will try to build a friendship with you by saying things that make you feel special and important. They may even pretend to be of the same age or reveal personal information about themselves to gain your trust. Flattery is a common tactic used by predators to manipulate and exploit their victims.

    Rate this question:

  • 9. 

    What is the BEST example of a good Screen Name/User ID?

    • A.

      September21Bby

    • B.

      74MainStreet

    • C.

      SaintsPCA12

    • D.

      Luv4MickeyMouse

    Correct Answer
    D. Luv4MickeyMouse
    Explanation
    The screen name "Luv4MickeyMouse" is the best example of a good screen name/user ID because it is unique, easy to remember, and reflects the user's interests or personality. It combines a term of endearment ("Luv4") with a well-known character ("MickeyMouse"), making it catchy and memorable. Additionally, it does not include any personal information or numbers that could be easily guessed or linked to the user's identity.

    Rate this question:

  • 10. 

    Which one is NOT a good Screen Name/User ID?

    • A.

      Skater4Life

    • B.

      JohnDoe302

    • C.

      Daily33Dolphin

    • D.

      Mighty7Munchkin

    Correct Answer
    B. JohnDoe302
    Explanation
    The screen name "JohnDoe302" is not a good choice because it includes personal information (John Doe) and a numerical sequence (302), which can make it easy for someone to identify or track the user. It is generally recommended to avoid using personal information or easily guessable patterns in screen names to protect one's privacy and security online.

    Rate this question:

  • 11. 

    Which is the BEST example of a good password?

    • A.

      ReW

    • B.

      122333444!

    • C.

      123456789

    • D.

      $t@r74ShIpS

    Correct Answer
    D. $t@r74ShIpS
    Explanation
    The password "$t@r74ShIpS" is the best example of a good password because it includes a combination of upper and lowercase letters, numbers, and special characters. This makes it more complex and harder for hackers to guess or crack. Additionally, it is longer than the other options, which adds an extra layer of security.

    Rate this question:

  • 12. 

    Brody's phone falls out of his pocket during the passing period between classes. Two other students find the phone. They enter 1111 for the password. To their suprise, the phone unlocks, giving them access to all of Brody's cell phone contacts, email account, social networking profiles, images and text messages. Amused, the two students send offensive text messages to Brody's friends and family. Then, the two students open Brody's social media accounts and proceed to share photos and videos that Brody never intended to make public. To make matters worse, they use Brody's email address to create accounts on inappropriate sites. Brody's email inbox is flooded with obscene content and SPAM. Which of the 3 Online Risks is represented here?

    • A.

      Identity Theft

    • B.

      Cyberbullying

    • C.

      Cyber Stalker/Predator

    Correct Answer
    B. Cyberbullying
    Explanation
    The given scenario represents cyberbullying. Cyberbullying involves using technology, such as a phone or social media, to harass, intimidate, or harm others. In this case, the two students gain unauthorized access to Brody's phone and use it to send offensive text messages, share private photos and videos, and create accounts on inappropriate sites, causing harm and distress to Brody and his contacts. This behavior aligns with the definition of cyberbullying, making it the correct answer.

    Rate this question:

  • 13. 

    Brody used a safe password.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement says that Brody used a safe password, but the correct answer is false. This means that Brody did not use a safe password.

    Rate this question:

  • 14. 

    Personal Information that you should NOT use in a User Name is 

    • A.

      Location

    • B.

      Zip Code

    • C.

      First & Last Name

    • D.

      All of the Above

    Correct Answer
    D. All of the Above
    Explanation
    Personal information such as location, zip code, and first and last name should not be used in a user name. Using this information in a user name can compromise the user's privacy and security. Location and zip code can reveal the user's physical address, while first and last name can provide personal identification. By avoiding the use of this information in a user name, individuals can protect their personal information and reduce the risk of identity theft or unauthorized access to their accounts.

    Rate this question:

  • 15. 

    What is a good tip for Password Security

    • A.

      It is sometimes okay to tell a friend your password.

    • B.

      If you think you can not remember your password to a certain account, write it down and keep it in a safe place at home.

    • C.

      If you have trouble remembering your password, tell a trusted best friend.

    • D.

      If you think your friend knows your password, change it.

    Correct Answer
    D. If you think your friend knows your password, change it.
    Explanation
    If you suspect that your friend knows your password, it is important to change it. This is because sharing passwords, even with trusted friends, can pose a security risk. By changing your password, you can ensure that your account remains secure and that unauthorized access is prevented. It is always best to keep your passwords confidential and not share them with anyone, even close friends.

    Rate this question:

  • 16. 

    Last year, Kendra received the title of Junior Miss Montana. She is actively involved in community service and hopes to someday become Miss Teen USA. She sent a few racy photos to a significant other on ClickChat - a disappearing photo app. Kendra's password is "pageant." One day, Kendra receives an email from an unknown sender. The message reads, Thank you for using such and easy password. Here's what will happen unless you do what I ask of you. Send me a REALLY good picture of video on ClickChat, or video call me and do whatever I tell you to do for 5 minutes, or I am going to spread the racy photos I have of you all over the Internet. Your reputation will be ruined. How do you think your parents will feel about that? The choice is yours." Which one of the 3 Online Risks is represented here?

    • A.

      Cyber Stalker/Predator

    • B.

      Identity Theft

    • C.

      Cyber Bullying

    Correct Answer
    A. Cyber Stalker/Predator
    Explanation
    The correct answer is Cyber Stalker/Predator. In this scenario, Kendra is being targeted by an unknown sender who is threatening to spread her racy photos unless she complies with their demands. This person is exhibiting predatory behavior by attempting to manipulate and control Kendra through blackmail and coercion. Their actions can be classified as cyber stalking, as they are using technology to harass and intimidate her.

    Rate this question:

  • 17. 

    What could happen if you share your password with someone else?

    • A.

      Nothing would happen.

    • B.

      Possible identity theft could occur.

    • C.

      They can help give you your password if you forget.

    • D.

      They will tell you their password.

    Correct Answer
    B. Possible identity theft could occur.
    Explanation
    If you share your password with someone else, possible identity theft could occur. Sharing your password increases the risk of unauthorized access to your personal information and accounts. The person you share the password with could misuse it to gain unauthorized access to your accounts, steal your sensitive data, or impersonate you online. This can lead to various consequences, such as financial loss, privacy invasion, and damage to your online reputation. It is important to keep your passwords confidential and not share them with anyone.

    Rate this question:

  • 18. 

    What are characteristics of a strong password?

    • A.

      Using Symbols

    • B.

      Using Numbers

    • C.

      None of the Above

    • D.

      All of the Above

    Correct Answer
    D. All of the Above
    Explanation
    A strong password should have a combination of different characters and symbols to make it harder to guess or crack. Using symbols and numbers in a password increases its complexity and makes it more secure. Therefore, "Using Symbols" and "Using Numbers" are characteristics of a strong password. "All of the Above" is the correct answer as it includes both of these characteristics, while "None of the Above" is incorrect as it does not include any of the mentioned characteristics.

    Rate this question:

  • 19. 

    Cyber Bullies are people who want to intentionally hurt or harass you. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Cyber bullies are individuals who intentionally aim to harm or harass others. They use digital platforms to carry out their malicious actions, such as sending threatening messages, spreading rumors, or sharing private information without consent. This behavior is often driven by a desire to exert power or control over their victims. The statement "Cyber Bullies are people who want to intentionally hurt or harass you" accurately describes the nature of cyber bullies, making the answer true.

    Rate this question:

  • 20. 

    ____________ a way of gathering information about a person without openly asking questions.

    • A.

      Grooming process

    • B.

      Indirect Solicitation of Information

    • C.

      None of the Above

    Correct Answer
    B. Indirect Solicitation of Information
    Explanation
    Indirect solicitation of information refers to a method of obtaining information about someone without directly asking them questions. This can be done through various means such as observation, listening to conversations, or gathering information from third parties. It is a subtle and discreet way of gathering information without arousing suspicion or making the person feel uncomfortable. This approach is often used in investigative or research settings where direct questioning may not be appropriate or effective.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 04, 2016
    Quiz Created by
    Angiebas
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.