1.
In reality, anyone that you meet online is a ___________.
Correct Answer
C. Stranger
Explanation
When the question states "In reality, anyone that you meet online is a ________," it implies that the person you meet online is not someone you already know. Therefore, the correct answer is "stranger," as it refers to someone who is unknown or unfamiliar to you. This suggests that caution should be exercised when interacting with individuals online, as their true intentions and identity may not be known.
2.
There are many out there who would like to know more for various reasons
Correct Answer(s)
A. They could want to harm you.
C. They could use information to conduct their own business - either selling your info or using it in an illegal manner.
D. They could want money.
Explanation
The given correct answer suggests that there are multiple reasons why someone would want to know more about you. These reasons include wanting to harm you, using your information for their own business (such as selling it or using it illegally), and wanting money.
3.
What is the BEST example of a good screen name/ user id?
Correct Answer
B. Skater4Life
Explanation
Skater4Life is the best example of a good screen name/user ID because it is simple, easy to remember, and reflects the user's interest in skating. It does not contain any personal or inappropriate information, making it suitable for online platforms. Additionally, the use of numbers adds a unique touch to the screen name.
4.
Some people lie about who they are and what they want on the Internet for various reasons. Sometimes it is to steal an identity or to bully. Other times it is to meet children and teens to form an inappropriate relationship. These people are known as online predators.
Correct Answer
A. True
Explanation
The statement is true because there are indeed individuals who lie about their identity and intentions on the internet for various harmful reasons. These individuals, known as online predators, may engage in activities such as stealing identities, bullying others, or forming inappropriate relationships with children and teenagers. It is important to be cautious and aware of these dangers when interacting with others online.
5.
A predator is
Correct Answer
D. One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.
Explanation
The correct answer for this question is "one who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them." This answer accurately describes the behavior of a predator, who manipulates and deceives their victim in order to cause harm.
6.
What types of information should you keep private?
Correct Answer(s)
A. Social Security Number (SSN)
C. First & Last Name
D. Date of Birth & Age
Explanation
The types of information that should be kept private are the Social Security Number (SSN), First & Last Name, and Date of Birth & Age. These pieces of information are personally identifiable and can be used for identity theft or fraud if in the wrong hands. Hair & Eye Color and Favorite Movie, on the other hand, are not sensitive information and can be shared without much risk.
7.
Three Online Risks are Cyber Bullying, Identity Theft, and Online Prey.
Correct Answer
B. False
Explanation
The statement "Three Online Risks are Cyber Bullying, Identity Theft, and Online Prey" is false. It suggests that these are the only three online risks, which is incorrect. There are several other online risks such as phishing scams, malware attacks, online harassment, and data breaches, among others. Therefore, the given statement is false.
8.
What type of grooming tatic is this: Unsafe contacts will try to build a friendship with you and earn your trust. At first, they will say things to you that make you feel special and important. Sometimes they will pretend to be of the same age. On the other hand, some unsafe contacts may reveal their real age, gender and even their first name.
Correct Answer
B. Flattery
Explanation
This type of grooming tactic is flattery. Unsafe contacts will use flattery to make the individual feel special and important, building a friendship and earning their trust. They may pretend to be of the same age or reveal personal information to create a sense of connection and manipulate the individual into divulging more information.
9.
What is the BEST example of a good Screen Name/User ID?
Correct Answer
D. Luv4MickeyMouse
Explanation
The screen name "Luv4MickeyMouse" is the best example of a good screen name/user ID because it is unique, memorable, and reflects the user's interests or personality. It combines the word "love" with the popular character Mickey Mouse, indicating a positive and cheerful attitude. This screen name is likely to stand out and be easily recognized by others.
10.
Which one is NOT a good Screen Name/User ID?
Correct Answer
B. JohnDoe302
Explanation
The screen name "JohnDoe302" is not a good choice because it includes personal information (the name "John Doe") and a number (302) that may not have any significance or meaning to the user. A good screen name should be unique, memorable, and not reveal any personal details. The other options ("Skater4Life," "Daily33Dolphin," and "Mighty7Munchkin") are more creative and do not include personal information.
11.
Which is the BEST example of a good password?
Correct Answer
D. $t@r74ShIpS
Explanation
The password "$t@r74ShIpS" is the best example of a good password because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This combination makes it difficult for hackers to guess or crack the password, increasing the security of the account or system it is used for.
12.
Brody's phone falls out of his pocket during the passing period between classes. Two other students find the phone. They enter 1111 for the password. To their suprise, the phone unlocks, giving them access to all of Brody's cell phone contacts, email account, social networking profiles, images and text messages. Amused, the two students send offensive text messages to Brody's friends and family. Then, the two students open Brody's social media accounts and proceed to share photos and videos that Brody never intended to make public. To make matters worse, they use Brody's email address to create accounts on inappropriate sites. Brody's email inbox is flooded with obscene content and SPAM. Which of the 3 Online Risks is represented here?
Correct Answer
B. Cyberbullying
Explanation
The given scenario represents cyberbullying. Cyberbullying refers to the act of using technology, such as phones or social media, to harass, intimidate, or humiliate someone. In this case, the two students not only accessed Brody's personal information without permission but also sent offensive text messages to his friends and family, shared private photos and videos, and used his email address for inappropriate purposes. This behavior falls under the category of cyberbullying as it involves the intentional and malicious targeting of Brody through online means.
13.
Brody used a safe password.
Correct Answer
B. False
Explanation
This statement suggests that Brody did not use a safe password.
14.
Personal Information that you should NOT use in a User Name is
Correct Answer
D. All of the Above
Explanation
Personal information such as location, zip code, and first & last name should not be used in a user name. Including these details in a user name can compromise one's privacy and make it easier for others to identify or locate them. Therefore, using any of the mentioned personal information in a user name is not recommended.
15.
What is a good tip for Password Security
Correct Answer
D. If you think your friend knows your password, change it.
Explanation
It is important to change your password if you suspect that your friend knows it. This is because sharing your password with someone else, even if it is a friend, can compromise the security of your account. By changing your password, you ensure that only you have access to your account and protect your personal information from being accessed or misused by others.
16.
Last year, Kendra received the title of Junior Miss Montana. She is actively involved in community service and hopes to someday become Miss Teen USA. She sent a few racy photos to a significant other on ClickChat - a disappearing photo app. Kendra's password is "pageant." One day, Kendra receives an email from an unknown sender. The message reads, Thank you for using such and easy password. Here's what will happen unless you do what I ask of you. Send me a REALLY good picture of video on ClickChat, or video call me and do whatever I tell you to do for 5 minutes, or I am going to spread the racy photos I have of you all over the Internet. Your reputation will be ruined. How do you think your parents will feel about that? The choice is yours." Which one of the 3 Online Risks is represented here?
Correct Answer
A. Cyber Stalker/Predator
Explanation
The correct answer is Cyber Stalker/Predator. In this scenario, Kendra is being targeted by an unknown sender who is threatening to spread her racy photos unless she complies with their demands. This individual is using fear and coercion to manipulate Kendra into doing what they want, which is a characteristic behavior of a cyber stalker or predator. They are exploiting her vulnerability and attempting to control her actions through blackmail. This situation highlights the dangers of online interactions and the importance of being cautious with personal information and online activities.
17.
What could happen if you share your password with someone else?
Correct Answer
B. Possible identity theft could occur.
Explanation
Sharing your password with someone else can potentially lead to identity theft. When you share your password, you are giving someone else access to your personal accounts and sensitive information. This person could misuse your credentials to gain unauthorized access to your accounts, steal your personal data, make fraudulent transactions, or impersonate you online. It is important to keep your passwords confidential and not share them with anyone to protect your identity and prevent potential security breaches.
18.
What are characteristics of a strong password?
Correct Answer
D. All of the Above
Explanation
A strong password should include a combination of symbols and numbers, as well as other characters like uppercase and lowercase letters. By using a variety of characters, the password becomes more complex and harder to guess or crack. Therefore, "All of the Above" is the correct answer as it encompasses the characteristics of a strong password.
19.
Cyber Bullies are people who want to intentionally hurt or harass you.
Correct Answer
A. True
Explanation
Cyber bullies are individuals who purposely seek to inflict harm or harass others online. They engage in activities such as sending threatening messages, spreading rumors, or posting derogatory comments with the intention of causing emotional distress. This behavior is often done anonymously, making it easier for cyber bullies to target their victims without facing immediate consequences. Therefore, the statement "Cyber Bullies are people who want to intentionally hurt or harass you" is true, as it accurately describes the motivations and actions of cyber bullies.
20.
____________ a way of gathering information about a person without openly asking questions.
Correct Answer
B. Indirect Solicitation of Information
Explanation
Indirect solicitation of information refers to the act of obtaining information about a person without directly asking them questions. This can be done through various means such as observing their behavior, analyzing their social media posts, or gathering information from their friends or acquaintances. It is a covert method of gathering information that allows the person conducting it to obtain insights about the individual without their knowledge or consent. This approach is often used in investigative or research settings where direct questioning may not be feasible or appropriate.