1.
The Internet gives us access to many resources we could not otherwise come in contact with.
Correct Answer
A. True
Explanation
The statement is true because the internet provides us with access to a vast amount of information, resources, and opportunities that would not be easily accessible otherwise. It allows us to connect with people from all around the world, access educational materials, conduct research, shop online, and much more. The internet has revolutionized the way we communicate, learn, work, and access information, making it an invaluable tool in today's digital age.
2.
Information on the Internet can always be trusted to be factual. It would not be online if it was not true.
Correct Answer
B. False
Explanation
The statement suggests that information on the internet can always be trusted to be factual because it would not be online if it was not true. However, this statement is false. The internet is a vast platform where anyone can publish information, and not all sources are reliable or accurate. It is important to critically evaluate the credibility of the sources and cross-check information before considering it as factual.
3.
Anythiing I send in my private e-mail, IM or chat cannot be seen by others.
Correct Answer
B. False
Explanation
The statement "Anything I send in my private e-mail, IM or chat cannot be seen by others" is false. It is important to understand that private communication platforms are not completely secure and can be vulnerable to interception or hacking. It is always advisable to exercise caution and use encrypted communication methods to ensure privacy.
4.
Websites must have my permission to put online any personal information about me, like my phone number, address, or birthday.
Correct Answer
B. False
Explanation
Websites do not require explicit permission from individuals to put personal information online. In fact, many websites collect and display personal information without prior consent. Privacy laws and regulations may require websites to provide individuals with options to control the sharing and visibility of their personal information, but permission is not always necessary. Therefore, the statement is false.
5.
If I want to know something about a stranger that sends me an Instant Message, I can check their profile and TRUST that information.
Correct Answer
B. False
Explanation
The explanation for the answer being False is that checking a stranger's profile on an Instant Messaging platform does not guarantee the accuracy or truthfulness of the information provided. People can create fake profiles or provide misleading information, so it is not advisable to fully trust the information found on someone's profile without further verification or getting to know them better.
6.
Installing a virus checker on my machine will keep my PC/computer safe.
Correct Answer
B. False
Explanation
Installing a virus checker on a machine is not a foolproof method to keep it safe. While virus checkers can detect and remove known viruses, they may not be able to catch all types of malware or protect against emerging threats. Additionally, users need to regularly update their virus checker and practice safe browsing habits to minimize the risk of infection. Therefore, relying solely on a virus checker is not enough to ensure the complete safety of a PC/computer.
7.
Putting blocking software on my child's PC will keep my child safe.
Correct Answer
B. False
Explanation
Putting blocking software on a child's PC does not guarantee their safety. While it can help in filtering out inappropriate content and restricting access to certain websites, it is not foolproof. Children can still encounter harmful content through other devices or platforms, and blocking software may give a false sense of security. It is important for parents to have open communication with their child, educate them about online safety, and supervise their online activities to ensure their overall safety.
8.
I can always trust e-mails and attachments I get from friends.
Correct Answer
B. False
Explanation
It is not always safe to trust emails and attachments from friends. Cybercriminals can gain access to a friend's email account and send malicious emails or attachments without their knowledge. These emails or attachments may contain viruses, malware, or phishing attempts that can harm your computer or steal your personal information. Therefore, it is important to exercise caution and verify the authenticity of emails and attachments, even if they come from friends.
9.
People who look for children to harm often do not get caught until they have hurt over 30 children.
Correct Answer
A. True
Explanation
The statement suggests that people who intend to harm children often go undetected until they have already caused harm to more than 30 children. This implies that these individuals are skilled at evading detection or that their actions are not recognized as harmful until a significant number of victims have been affected. This highlights the concerning fact that child predators may operate unnoticed for an extended period, putting numerous children at risk before they are apprehended.
10.
Criminals and terrorists are sending encrypted messages in photos as forwards being mass-emailed around the world.
Correct Answer
A. True
Explanation
The given statement suggests that criminals and terrorists are using encrypted messages in photos that are being shared through mass-emails globally. This implies that these individuals are finding new ways to communicate covertly and securely, making it difficult for authorities to detect and intercept their messages. Therefore, the correct answer is "True."
11.
What do you do if someone keeps bothering you online?
Correct Answer
D. All of the above
Explanation
The correct answer is "All of the above." If someone keeps bothering you online, it is important to take action to protect yourself. Telling your parents is important because they can provide support and guidance. Informing law enforcement is crucial if the harassment becomes severe or threatening. Additionally, telling the person to leave you alone and printing out the attempts to contact can serve as evidence in case further action needs to be taken. By choosing all of the above options, you are taking comprehensive steps to address the issue and ensure your safety online.
12.
I have a digital picture of myself and someone I met online wants to see it. Is it OK to send it to that person?
Correct Answer
B. No
Explanation
No, it is not okay to send a digital picture of yourself to someone you met online. Sharing personal pictures with strangers online can be risky as you have no control over how they will use or share the image. They could potentially use it for malicious purposes or share it without your consent. It is important to prioritize your online safety and only share personal information or pictures with trusted individuals.
13.
I am visiting a site from a company or organization with which I am familiar. they want my name and phone number so I can enter a contest. Is it OK to enter?
Correct Answer
B. No
Explanation
It is not okay to enter because providing personal information such as name and phone number for a contest on a website can potentially lead to privacy and security risks. Even if the website belongs to a familiar company or organization, there is no guarantee that the information will be handled securely or not misused. It is important to be cautious and protect personal information online.
14.
As I travel through "Cyberspace" information I should never give out to someone I meet online is:
Correct Answer
B. My real name, address, pHone number, school I attend, or my pHotograpH
Explanation
When traveling through "Cyberspace," it is important to never give out personal information to someone you meet online. This includes your real name, address, phone number, school you attend, or your photograph. Sharing such information can put your privacy and safety at risk. It is always better to be cautious and protect your personal information when interacting with strangers online.
15.
If someone online sends me an inappropriate message or material I should:
Correct Answer
C. Tell my parents so they can alert our internet service provider
Explanation
If someone online sends me an inappropriate message or material, it is important to tell my parents so they can alert our internet service provider. This is the correct answer because it is crucial to involve a trusted adult who can help handle the situation appropriately and take necessary actions to ensure my safety online. Keeping it a secret may allow the inappropriate behavior to continue, and responding to the person may further escalate the situation. By involving parents and the internet service provider, they can take necessary steps to address the issue and protect me from further harm.
16.
If someone is on my E-mail "buddy list", "friend list", or "contact list", and I only know that person online, he or she is:
Correct Answer
C. Someone I should be cautious about because I do not know him or her
Explanation
This answer suggests that if someone is on the person's email buddy list, friend list, or contact list, and the person only knows that individual online, they should be cautious because they do not know them personally. It implies that online relationships may not always be trustworthy and it is important to exercise caution when interacting with people solely through the internet.
17.
The cybertipline is:
Correct Answer
C. My online source to report child sexual-exploitation or other scary internet encounters
Explanation
The correct answer is "My online source to report child sexual-exploitation or other scary internet encounters." The cybertipline refers to a platform or website where individuals can report instances of child sexual exploitation or any other frightening encounters they have had on the internet. It serves as a resource for people to seek help and report illegal activities happening online.
18.
A web cookie is all of these except:
Correct Answer
A. Delicious snack
Explanation
A web cookie is not a delicious snack. It is a small piece of data that is stored on a user's computer by a website. It is used to track the user's browsing activity, personalize their experience, and gather information about their preferences and behavior. However, it can be turned off if the user does not want it.
19.
As I travel through Cyberspace, I should never agree to meet someone in person who I have met online.
Correct Answer
A. True
Explanation
It is important to prioritize personal safety when interacting with strangers online. Meeting someone in person whom you have only met online can be risky as their true intentions and identity may not be known. It is always better to exercise caution and avoid such meetings to protect oneself from potential harm or dangerous situations.
20.
If you purchase a term paper online, would this be considered plagiarizing?
Correct Answer
A. True
Explanation
Purchasing a term paper online can be considered as plagiarizing because it involves obtaining someone else's work and presenting it as one's own. Plagiarism is the act of using someone else's ideas, words, or work without giving them proper credit. By buying a term paper, the person is not contributing any original content and is essentially taking credit for someone else's efforts. This goes against academic integrity and is generally considered unethical. Therefore, the correct answer is true.
21.
When working at the computer for long periods of time you should glance away from the screen periodically to avoid eye strain.
Correct Answer
A. True
Explanation
Glancing away from the computer screen periodically while working for long periods of time helps to prevent eye strain. Staring at a screen for extended periods can cause eye fatigue and discomfort. Taking short breaks to look at objects in the distance or focusing on something other than the screen helps to relax the eye muscles and reduce strain. Therefore, it is important to glance away from the screen regularly to protect and maintain good eye health.
22.
Sitting up straight at your computer is bad for your back.
Correct Answer
B. False
Explanation
Sitting up straight at your computer is not bad for your back. This is because maintaining good posture while sitting helps to align the spine properly and distribute the weight evenly, reducing strain on the back muscles. Slouching or hunching over, on the other hand, can lead to increased pressure on the spine and result in back pain. Therefore, it is important to sit up straight with proper ergonomics to support a healthy back.
23.
It is important to know the locations of fire extinquishers and fire exits in the computer lab.
Correct Answer
A. True
Explanation
Knowing the locations of fire extinguishers and fire exits in a computer lab is important for safety reasons. In the event of a fire, having this knowledge can help individuals quickly locate and use fire extinguishers to suppress the fire or evacuate the area through the nearest fire exit. This information is crucial in preventing injuries and minimizing property damage during emergencies. Therefore, the statement "It is important to know the locations of fire extinguishers and fire exits in the computer lab" is true.
24.
It is OK to drink soda near the computer.
Correct Answer
B. False
Explanation
Drinking soda near the computer is not okay because it can spill and damage the computer's hardware. Liquids can cause short circuits and corrosion, leading to malfunctions or permanent damage. Additionally, soda contains sugar and other sticky substances that can attract dust and debris, clogging the computer's components and affecting its performance. Therefore, it is not advisable to drink soda near the computer.
25.
Always shut down your computer by pressing the power button on the computer case.
Correct Answer
B. False
Explanation
Pressing the power button on the computer case is not the recommended way to shut down the computer. It is better to use the proper shutdown procedure provided by the operating system, such as selecting "Shut Down" from the Start menu. Pressing the power button directly can cause data loss and potential damage to the system.
26.
Use a surge protector to keep excess electric power from damaging your computer.
Correct Answer
A. True
Explanation
Using a surge protector is indeed a recommended measure to protect electronic devices, including computers, from damage caused by sudden power surges or voltage spikes. Surge protectors work by diverting excess electrical energy away from the connected devices, preventing it from reaching and potentially damaging them. Therefore, it is advisable to use a surge protector to safeguard your computer against potential electrical hazards.
27.
When a computer is on, it is fine to move it around as much as you like.
Correct Answer
B. False
Explanation
Moving a computer around while it is on can cause damage to the internal components, such as the hard drive or other sensitive parts. It is recommended to shut down the computer properly before moving it to prevent any potential damage.
28.
You should always have at least two copies of important files.
Correct Answer
A. True
Explanation
It is important to always have at least two copies of important files because it provides a backup in case one copy gets lost, corrupted, or damaged. Having multiple copies ensures that you can still access and recover the files even if something happens to one of the copies. This practice helps to prevent data loss and ensures the security and availability of important information.
29.
It is not important to write down your computer's serial number.
Correct Answer
B. False
Explanation
Writing down your computer's serial number can be important for several reasons. Firstly, it can help in identifying and tracking your computer in case it gets lost or stolen. Additionally, the serial number may be required for warranty purposes or when seeking technical support. It can also be useful for insurance claims or when selling your computer. Therefore, it is important to write down your computer's serial number.
30.
If your computer does not work, you do not need to report it to the teacher--just begin working on it.
Correct Answer
B. False
Explanation
This statement is false because if your computer is not working, it is important to report it to the teacher so that they can assist you in fixing the issue or provide you with a different computer to work on. Ignoring the problem and continuing to work on a faulty computer will only hinder your progress and make it difficult to complete your tasks effectively.
31.
Coats, bags and other items hsould be placed
Correct Answer
B. On the table away from the computers to avoid tripping
Explanation
Coats, bags, and other items should be placed on the table away from the computers to avoid tripping. This is because placing them on the floor next to the computer or under the chair can create obstacles and increase the risk of tripping or accidentally damaging the items. Placing them on top of the system unit is also not recommended as it can obstruct the airflow and potentially cause overheating. Therefore, the safest option is to keep them on the table, away from the computers.
32.
Infringing on someone's copyright is not against the law, so it is really no big deal.
Correct Answer
B. False
Explanation
Infringing on someone's copyright is against the law, making it a big deal. Copyright laws protect the rights of creators, giving them exclusive control over their work. When someone uses, reproduces, or distributes copyrighted material without permission, it is considered infringement and can result in legal consequences. Therefore, it is important to respect copyright laws and obtain proper authorization before using someone else's work.