1.
In reality, anyone that you meet online is a ___________.
Correct Answer
C. Stranger
Explanation
When it comes to meeting people online, it is important to be cautious as you do not know their true intentions or background. The term "stranger" accurately describes someone you meet online, as they are unknown to you and could potentially pose a risk. It is crucial to exercise caution and not trust someone blindly just because you have interacted with them online.
2.
There are many out there who would like to know more for various reasons so that (Select 3)
Correct Answer(s)
A. They could want to harm you.
C. They could use information to conduct their own business - either selling your info or using it in an illegal manner.
D. They could want money.
Explanation
The given answer options suggest potential reasons why someone would want to know more about you. They could want to harm you by using the information to cause you harm or take advantage of you. They could use the information to conduct their own business, either by selling your information or using it in an illegal manner. Lastly, they could want money, indicating that they may have ulterior motives for gathering information about you.
3.
What is the BEST example of a good screen name/ user id?
Correct Answer
D. Skater2016
Explanation
Skater2016 is the best example of a good screen name/user ID because it is simple, easy to remember, and does not include personal information or unnecessary characters. It includes a common interest (skater) and a year (2016), making it relevant and unique.
4.
Some people lie about who they are and what they want on the Internet for various reasons. Sometimes it is to steal an identity or to bully. Other times it is to meet children and teens to form an inappropriate relationship. These people are known as Online Predators.
Correct Answer
A. True
Explanation
The statement is true because there are indeed individuals who lie about their identity and intentions online for various malicious purposes. These individuals, known as online predators, engage in activities such as identity theft, bullying, and forming inappropriate relationships with children and teens. It is important to be cautious and aware of these risks when interacting with others on the internet.
5.
A predator is
Correct Answer
D. One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.
Explanation
A predator is someone who stalks or uses lies, secrecy, or stealth to get close enough to another person in order to easily hurt or harm them. This definition highlights the predatory behavior of individuals who manipulate and deceive others for their own malicious intentions. It emphasizes the predatory nature of someone who preys on others, seeking to cause harm or inflict pain.
6.
What types of information should you keep private?
Correct Answer(s)
A. Social Security Number (SSN)
C. First & Last Name
D. Date of Birth & Age
Explanation
It is important to keep private information such as Social Security Number (SSN), First & Last Name, and Date of Birth & Age as they are personally identifiable information that can be used for identity theft or fraud. Hair & Eye Color, Favorite Movie, and Car Make are not considered sensitive information and can be shared publicly without much risk.
7.
What type of grooming tatic is this: Unsafe contacts will try to build a friendship with you and earn your trust. At first, they will say things to you that make you feel special and important. Sometimes they will pretend to be of the same age. On the other hand, some unsafe contacts may reveal their real age, gender and even their first name.
Correct Answer
B. Flattery
Explanation
This type of grooming tactic is called "Flattery." Unsafe contacts will try to build a friendship with you and earn your trust by saying things that make you feel special and important. They may pretend to be of the same age or reveal their real age, gender, and first name to gain your trust. Flattery is used to manipulate and deceive individuals, making them more susceptible to exploitation or harm.
8.
Which grooming tatics are in this story:Marcus is playing WorldCraft, a popular multiplayer game where people of all ages can buld towns, create worlds, design landscapes, and defend their domains against fictional foes. The virtual world allows players to chat with others and work together to build and defend their civilizations. Since Marcus moved to a new school when his parents split, he has not made any new friends. Marcus spends hours in WorldCraft because he feels safe and free from his troubles there. His gamertag is marcus_mayhem12. One gamer, Zaction 145, asked Marcus if they could team up together and build a civilization. Marcus accepted the gamer friend request. Marcus found out that his gamer friend is someone named Zack who was 17. Zack chats with Marcus about his favorite subject - WorldCraft. As Marcus becomes more comfortable, Zack asks him what grade he is in and where he goes to school. When Marcus tells Zack how much he misses his old neighborhood Zack seems like he really understands and cares. After some time, Zack sends Marcus extra virtual goods and even invites Marcus to join him at GameFest. They exchange cell phone numbers and text each other. One night, Zack asks Marcus a question. Marcus feels uncomfortable about what Zack has asked him to do. Zack says he will pay for the tickets and travel expenses if Marcus will do him a favor.
Correct Answer
E. All of the above
Explanation
The correct answer is "All of the above". This is because the story includes instances of private chat (Zack and Marcus exchanging messages), sympathy (Zack showing understanding and care towards Marcus), and indirect solicitation of information (Zack asking Marcus about his grade and school). All three grooming tactics are present in the story.
9.
According to the story about Marcus Mayhem, what information does Zaction145 NOT know about Marcus (based on the story)?
Correct Answer
D. Social Security Number
Explanation
In the story about Marcus Mayhem, Zaction145 does not know Marcus's social security number. The story does not mention anything about Zaction145 having access to or knowledge of Marcus's social security number. Therefore, it can be inferred that this information is not known by Zaction145 based on the story.
10.
Three Online Risks are:
Correct Answer
C. Cyber bullying, identity theft, and online predators/stalkers.
Explanation
The answer "cyber bullying, identity theft, and online predators/stalkers" is correct because these three options are the actual online risks mentioned in the given question. The other options, such as "guessing, dictionary, and phishing," and "cyberbullying, flattery, and shoulder surfing," are not listed as online risks in the question. Therefore, the correct answer is "cyber bullying, identity theft, and online predators/stalkers."