1.
An example of “cyberbullying” is:
Correct Answer
D. All of the above
Explanation
The correct answer is "All of the above" because all three examples mentioned in the options - spreading rumors about kids at school using e-mail, constantly instant messaging rude comments to a classmate, and uploading embarrassing pictures of friends without permission - are instances of cyberbullying. Cyberbullying refers to the use of electronic communication to bully, harass, or intimidate someone, and all three actions described in the options fit this definition.
2.
What is the best way to deal with abusive
messages?
Correct Answer
C. Tell an adult you know and trust
Explanation
The best way to deal with abusive messages is to tell an adult you know and trust. This is because they can provide guidance, support, and help in addressing the issue effectively. They can also offer advice on how to handle the situation and potentially involve other authorities if necessary. Seeking the help of a trusted adult ensures that the matter is taken seriously and appropriate actions can be taken to protect oneself from further harm.
3.
Which of these is a good way to keep from being bullied?
Correct Answer
A. Delete messages from people you don't know, or from those people who seem angry or mean
Explanation
Deleting messages from people you don't know or from those who seem angry or mean is a good way to keep from being bullied because it helps to avoid engaging with potential bullies and prevents them from having access to personal information. By deleting these messages, one can protect themselves from potential harm and maintain their online safety.
4.
There is someone in a chatroom, saying she is twelve.
Would you automatically believe she’s a young girl?
Correct Answer
C. No
Explanation
The correct answer is "no" because it is not safe to automatically believe someone's age or identity based solely on their claim in an online chatroom. It is important to exercise caution and not blindly trust strangers on the internet, especially when it comes to personal information and interactions with minors.
5.
Which of these are things you could do if you
are cyber bullied?
Correct Answer
D. All of the above
Explanation
If you are cyber bullied, you should inform the local police and your school if it is school related. This is important because they can take appropriate action to address the situation and ensure your safety. It is also advised not to erase the messages but instead put them in a folder unread as evidence of the bullying. This can be useful if you need to provide proof of the cyberbullying. Additionally, it is crucial to never agree to meet with a bully or anyone you meet online as it can be dangerous. Therefore, all of the above options are recommended actions to take if you are cyber bullied.
6.
What do you think of when you hear the term "cyberbullying"?
Correct Answer
E. A, C, and D
Explanation
The term "cyberbullying" refers to the act of intentionally excluding someone from an online group, sending rude, angry or gossipy messages on text or online platforms, and engaging in bullying behavior that can be traced through cyber footprints. This includes all of the options A, C, and D.
7.
Cyber threats involve only direct threats to harm someone else.
Correct Answer
B. False
Explanation
False. Cyberthreats are online materials that threaten or raise concern about violence against others, suicide or self-harm.
There are two kinds of Cyberthreats: (1) actual threats to hurt someone or commit suicide, and (2) online
materials (referred to as "distressing materials") that provide clues that the person is emotionally upset and may be considering hurting someone, hurting him or herself or planning to commit suicide
(Nancy Willard, "An Educator's Guide to Cyberbullying and Cyberthreats" Eugene: Center for Safe and Responsible
Internet Use, 2005), www.cyberbully.org/docs/cbceducator.pdf).
8.
Because of First Amendment protections, schools do not have the legal ability to punish students for cyberbullying and Cyberthreats that occur on campus or through school technology.
Correct Answer
B. False
Explanation
False. Students have a limited expectation of privacy on the district's Internet system and routine maintenance and
monitoring should be expected. An individual search of computer and Internet use records can be conducted if there is a reasonable suspicion that the student has violated district policy, including policies against bullying. In addition, schools can place education-based restrictions on student speech that appears to be sponsored by the school or that is necessary to maintain an appropriate school climate. Although no current case law exists, the standard probably applies to student speech through the district Internet system or via cell phones used at school
(Nancy Willard, "An Educator's Guide to Cyberbullying and Cyberthreats" Eugene: Center for Safe and Responsible
Internet Use, 2005), www.cyberbully.org/docs/cbceducator.pdf).
9.
Recipients of an email or IM from a cyberbully should not response and should immediately delete the message.
Correct Answer(s)
A. True
B. False
Explanation
True and False. Recipients should NOT respond - engaging in conversation with the perpetrator of a cyberbullying
incident or retaliating can make the situation worse. However, students SHOULD save the IMs or e-mails as a record of the cyberbullying behavior and tell an adult about what has occurred.
10.
I am completely safe when I’m surfing the Internet because:
Correct Answer
E. None of the above
Explanation
The given options do not guarantee complete safety while surfing the internet. Being at home with parents or in a public place does not ensure protection from online threats such as cyberbullying, scams, or inappropriate content. Additionally, assuming that only parents and teachers know what one is doing online is not accurate as there could be other individuals who may have access or knowledge of one's online activities. Therefore, none of the given options provide a comprehensive assurance of safety while surfing the internet.
11.
If a friend you met on the Internet starts sending you gifts, you should:
Correct Answer
D. Do not open the box and go immediately to an adult in charge.
Explain what happened to the adult.
Explanation
The correct answer advises not to open the box and instead go immediately to an adult in charge. This is because receiving gifts from someone you met on the internet can be potentially dangerous. It is important to prioritize safety and inform a responsible adult who can help assess the situation and ensure appropriate action is taken.
12.
What shouldn’t you do if you are being bullied online?
Correct Answer
A. Respond
Explanation
When being bullied online, it is important not to respond to the bully. Engaging with the bully may escalate the situation and give them the attention they seek. It is better to ignore their hurtful messages or comments. Instead, it is advisable to tell a parent or a trusted adult about the situation, as they can provide guidance and support. Calling a friend can also be helpful to seek emotional support. Additionally, saving the hurtful messages or comments can serve as evidence if further action needs to be taken.
13.
When a person goes online and starts talking to you that you don't know, what shouldn't you do?
Correct Answer(s)
B. Tell him/her your name.
C. Tell him/her why you are talking to them
D. Tell him/her when you will come back on line
Explanation
When a person goes online and starts talking to you that you don't know, you shouldn't tell him/her your name because it can compromise your privacy and personal information. Additionally, you shouldn't tell him/her why you are talking to them as it may reveal personal motivations or vulnerabilities. Lastly, you shouldn't tell him/her when you will come back online as it can give the person an opportunity to track your online presence and potentially invade your privacy.
14.
Who is MORE likely to be a target to cyberbullying?
Correct Answer
A. Girls
Explanation
Girls are more likely than boys to be the target of cyberbullying.
There is a direct correlation to the amount of time girls spend online and the likelihood that they will be bullied.
(http://www.copperwiki.org/index.php/Cyberbullying)
15.
_________ is intentional bullying over e-mail, instant messages, gaming Web sites, texting, phone messages, or through other digital messaging.
Correct Answer
cyberbullying
cyber bullying
cyber-bullying
Explanation
Cyberbullying refers to the intentional act of bullying that takes place through various digital platforms such as email, instant messages, gaming websites, texting, phone messages, or other forms of digital messaging. It involves using technology to harass, intimidate, or harm individuals, often repeatedly and persistently. The term can be spelled as "cyberbullying," "cyber bullying," or "cyber-bullying," all of which are correct variations.
16.
How can you avoid becoming a victim of cyberbullying?(which is incorrect)
Correct Answer
D. Witchcraft
17.
As I travel through "Cyberspace," information
I should never give out to someone I meet online is
Correct Answer
B. My real name, address, telephone number, the school I attend, or my photograph.
Explanation
The correct answer is the first option because sharing personal information like real name, address, telephone number, the school one attends, or photographs can be potentially dangerous when interacting with strangers online. It is important to prioritize online safety and protect one's privacy by not disclosing such sensitive information to unknown individuals.
18.
What are the risks of putting your picture on
the Internet?
Correct Answer(s)
A. You could be traced by someone who might wish you harm
C. The picture could be edited in an embarrassing way and sent to others or published on the web
Explanation
Putting your picture on the internet can pose risks such as being traced by someone who might wish you harm. This means that someone with malicious intent could use your picture to track you down and potentially cause harm. Additionally, the picture could be edited in an embarrassing way and shared with others or published on the web. This could lead to personal embarrassment or damage to your reputation.