Appropriate Online Behavior - Exam 8.1 9.27.16

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Angiebas
A
Angiebas
Community Contributor
Quizzes Created: 6 | Total Attempts: 571
Questions: 10 | Attempts: 228

SettingsSettingsSettings
Appropriate Online Behavior - Exam 8.1 9.27.16 - Quiz

Please, take your time. Read each question thoroughly. We've went over this in class multiple times that I know you know all of the answers.


Questions and Answers
  • 1. 

    In reality, anyone that you meet online is a ___________.

    • A.

      Guest

    • B.

      Friend

    • C.

      Stranger

    • D.

      Squatter

    Correct Answer
    C. Stranger
    Explanation
    When it comes to meeting people online, it is important to be cautious as you do not know their true intentions or background. The term "stranger" accurately describes someone you meet online, as they are unknown to you and could potentially pose a risk. It is crucial to exercise caution and not trust someone blindly just because you have interacted with them online.

    Rate this question:

  • 2. 

    There are many out there who would like to know more for various reasons so that (Select 3)

    • A.

      They could want to harm you.

    • B.

      They may want to become your best friend.

    • C.

      They could use information to conduct their own business - either selling your info or using it in an illegal manner.

    • D.

      They could want money.

    Correct Answer(s)
    A. They could want to harm you.
    C. They could use information to conduct their own business - either selling your info or using it in an illegal manner.
    D. They could want money.
    Explanation
    The given answer options suggest potential reasons why someone would want to know more about you. They could want to harm you by using the information to cause you harm or take advantage of you. They could use the information to conduct their own business, either by selling your information or using it in an illegal manner. Lastly, they could want money, indicating that they may have ulterior motives for gathering information about you.

    Rate this question:

  • 3. 

    What is the BEST example of a good screen name/ user id?

    • A.

      Saints15DEBBall

    • B.

      SkaterDude12

    • C.

      HunkofLuv4U

    • D.

      Skater2016

    Correct Answer
    D. Skater2016
    Explanation
    Skater2016 is the best example of a good screen name/user ID because it is simple, easy to remember, and does not include personal information or unnecessary characters. It includes a common interest (skater) and a year (2016), making it relevant and unique.

    Rate this question:

  • 4. 

    Some people lie about who they are and what they want on the Internet for various reasons. Sometimes it is to steal an identity or to bully. Other times it is to meet children and teens to form an inappropriate relationship. These people are known as Online Predators. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement is true because there are indeed individuals who lie about their identity and intentions online for various malicious purposes. These individuals, known as online predators, engage in activities such as identity theft, bullying, and forming inappropriate relationships with children and teens. It is important to be cautious and aware of these risks when interacting with others on the internet.

    Rate this question:

  • 5. 

    A predator is 

    • A.

      Someone who is easily harmed or affected in a bad way by someone or something.

    • B.

      Someone who follows and tries to catch or capture (someone or something) for usually a long distance or time.

    • C.

      A person who kills someone (such as a famous or important person) usually for political reasons or for money.

    • D.

      One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.

    Correct Answer
    D. One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.
    Explanation
    A predator is someone who stalks or uses lies, secrecy, or stealth to get close enough to another person in order to easily hurt or harm them. This definition highlights the predatory behavior of individuals who manipulate and deceive others for their own malicious intentions. It emphasizes the predatory nature of someone who preys on others, seeking to cause harm or inflict pain.

    Rate this question:

  • 6. 

    What types of information should you keep private?

    • A.

      Social Security Number (SSN)

    • B.

      Hair & Eye Color

    • C.

      First & Last Name

    • D.

      Date of Birth & Age

    • E.

      Favorite Movie

    • F.

      Car Make

    Correct Answer(s)
    A. Social Security Number (SSN)
    C. First & Last Name
    D. Date of Birth & Age
    Explanation
    It is important to keep private information such as Social Security Number (SSN), First & Last Name, and Date of Birth & Age as they are personally identifiable information that can be used for identity theft or fraud. Hair & Eye Color, Favorite Movie, and Car Make are not considered sensitive information and can be shared publicly without much risk.

    Rate this question:

  • 7. 

    What type of grooming tatic is this: Unsafe contacts will try to build a friendship with you and earn your trust. At first, they will say things to you that make you feel special and important. Sometimes they will pretend to be of the same age. On the other hand, some unsafe contacts may reveal their real age, gender and even their first name. 

    • A.

      Indirect Solicitation of Information

    • B.

      Flattery

    • C.

      Sympathy

    • D.

      Inappropriate Conversation

    Correct Answer
    B. Flattery
    Explanation
    This type of grooming tactic is called "Flattery." Unsafe contacts will try to build a friendship with you and earn your trust by saying things that make you feel special and important. They may pretend to be of the same age or reveal their real age, gender, and first name to gain your trust. Flattery is used to manipulate and deceive individuals, making them more susceptible to exploitation or harm.

    Rate this question:

  • 8. 

    Which grooming tatics are in this story:Marcus is playing WorldCraft, a popular multiplayer game where people of all ages can buld towns, create worlds, design landscapes, and defend their domains against fictional foes. The virtual world allows players to chat with others and work together to build and defend their civilizations. Since Marcus moved to a new school when his parents split, he has not made any new friends. Marcus spends hours in WorldCraft because he feels safe and free from his troubles there. His gamertag is marcus_mayhem12. One gamer, Zaction 145, asked Marcus if they could team up together and build a civilization. Marcus accepted the gamer friend request. Marcus found out that his gamer friend is someone named Zack who was 17. Zack chats with Marcus about his favorite subject - WorldCraft. As Marcus becomes more comfortable, Zack asks him what grade he is in and where he goes to school. When Marcus tells Zack how much he misses his old neighborhood Zack seems like he really understands and cares. After some time, Zack sends Marcus extra virtual goods and even invites Marcus to join him at GameFest. They exchange cell phone numbers and text each other. One night, Zack asks Marcus a question. Marcus feels uncomfortable about what Zack has asked him to do. Zack says he will pay for the tickets and travel expenses if Marcus will do him a favor. 

    • A.

      Private Chat

    • B.

      Sympathy

    • C.

      Indirect Solicitation of Information

    • D.

      A & C

    • E.

      All of the above

    Correct Answer
    E. All of the above
    Explanation
    The correct answer is "All of the above". This is because the story includes instances of private chat (Zack and Marcus exchanging messages), sympathy (Zack showing understanding and care towards Marcus), and indirect solicitation of information (Zack asking Marcus about his grade and school). All three grooming tactics are present in the story.

    Rate this question:

  • 9. 

    According to the story about Marcus Mayhem, what information does Zaction145 NOT know about Marcus (based on the story)?

    • A.

      School Name

    • B.

      Age

    • C.

      Contact Information

    • D.

      Social Security Number

    Correct Answer
    D. Social Security Number
    Explanation
    In the story about Marcus Mayhem, Zaction145 does not know Marcus's social security number. The story does not mention anything about Zaction145 having access to or knowledge of Marcus's social security number. Therefore, it can be inferred that this information is not known by Zaction145 based on the story.

    Rate this question:

  • 10. 

    Three Online Risks are:

    • A.

      Identity theft, online predators/stalkers, and personal information solicitation.

    • B.

      Cyberbullying, flattery, and shoulder surfing.

    • C.

      Cyber bullying, identity theft, and online predators/stalkers.

    • D.

      Guessing, dictionary, and phishing.

    Correct Answer
    C. Cyber bullying, identity theft, and online predators/stalkers.
    Explanation
    The answer "cyber bullying, identity theft, and online predators/stalkers" is correct because these three options are the actual online risks mentioned in the given question. The other options, such as "guessing, dictionary, and phishing," and "cyberbullying, flattery, and shoulder surfing," are not listed as online risks in the question. Therefore, the correct answer is "cyber bullying, identity theft, and online predators/stalkers."

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 27, 2016
    Quiz Created by
    Angiebas
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.