1.
What information should you never share online:
Correct Answer
B. Your address.
Explanation
The correct answer is "your address." Sharing personal information like your address online can pose a significant risk to your safety and privacy. It can make you vulnerable to identity theft, stalking, or even physical harm. While sharing your first name or favorite band may not have the same level of risk, it is still advisable to be cautious about sharing too much personal information online.
2.
Following the rules and policies established by the school district for appropriate use of your PED is an example of:
Correct Answer
B. Etiquette.
Explanation
Following the rules and policies established by the school district for appropriate use of your PED is an example of etiquette. Etiquette refers to the accepted code of conduct or behavior in a particular setting or community. In this case, the school district has set guidelines for the appropriate use of personal electronic devices (PEDs), and adhering to these rules demonstrates good etiquette. It shows respect for the school's policies and ensures that PEDs are being used in a responsible and appropriate manner.
3.
The difference between safety and security is:
Correct Answer
A. Safety is about making sure you don't get hurt or injured using technology and security is about protecting your identity.
4.
What is Digital Citizenship:
Correct Answer
C. To have a good reputation on the digital world.
Explanation
Digital citizenship refers to the responsible and ethical behavior of individuals in the online world. It involves understanding and practicing good online etiquette, respecting the rights and privacy of others, and being aware of the potential risks and consequences of online actions. Having a good reputation in the digital world is an important aspect of being a responsible digital citizen as it reflects one's integrity, credibility, and trustworthiness in the online community.
5.
Why was the acceptable use policy implemented:
Correct Answer
D. Both A and C.
Explanation
The acceptable use policy was implemented to protect all internet users and ensure the integrity of the internet. By having this policy in place, it sets guidelines and rules for how the internet should be used, preventing any misuse or harm to users. It also helps in maintaining the integrity of the internet by promoting ethical and responsible use, preventing any unauthorized access or malicious activities. By selecting both options A and C, it acknowledges that the implementation of the policy serves the purpose of protecting users and maintaining the integrity of the internet simultaneously.
6.
What is one reason that it is important to be a good Digital Citizen:
Correct Answer
B. It can affect you from getting a good job.
Explanation
Being a good digital citizen is important because it can affect your chances of getting a good job. In today's digital age, employers often conduct online searches and review social media profiles of potential candidates. If someone has a negative online presence, such as engaging in cyberbullying or posting inappropriate content, it can create a negative impression on employers and impact their decision to hire. On the other hand, being a responsible digital citizen by maintaining a positive online presence, respecting others' privacy, and using technology ethically can enhance one's professional reputation and increase job prospects.
7.
In order to have a registered PED with TICSD what are you required to sign:
Correct Answer
B. The Acceptable Use Policy.
Explanation
To have a registered PED with TICSD, you are required to sign the Acceptable Use Policy. This policy outlines the guidelines and rules for using the internet and technology provided by TICSD. By signing this policy, you agree to abide by the terms and conditions stated within it, ensuring responsible and appropriate use of the PED and its associated resources. The Student Handbook, Internet User Contract, and Internet Account Policy may contain other important information, but they are not specifically required for registering a PED with TICSD.
8.
What is the problem with meeting people for the first time online instead of meeting them in person:
Correct Answer
D. All of the above.
Explanation
Meeting people for the first time online instead of in person can lead to various problems. Firstly, when you finally meet them in person, there is a possibility of feeling embarrassed if they don't match your expectations or if there are any awkward moments. Secondly, they might not want to continue being your friend after meeting in person, which can be disappointing. Lastly, online interactions may not always reflect the truth, and you can never be completely sure if the person is being honest or genuine. Therefore, all the mentioned options can be potential problems when meeting people for the first time online.
9.
What does "think before you post" mean:
Correct Answer
D. All of the above.
Explanation
"Think before you post" means that one should carefully consider the potential consequences of sharing information online. The answer "All of the above" is correct because it encompasses all the given statements. Sharing information online can have far-reaching effects as it can be widely distributed and difficult to remove from the web. Additionally, one should consider whether sharing certain information could harm their own reputation or that of someone else.
10.
Where can you find a copy of the AUP:
Correct Answer
A. The student agenda book.
Explanation
The AUP (Acceptable Use Policy) is a set of guidelines that outlines the proper use of technology resources in an educational setting. It is typically provided to students and staff to ensure responsible and appropriate use of computers and other devices. The student agenda book is a common place to find a copy of the AUP as it serves as a reference guide for students, containing important information such as school policies, rules, and guidelines.
11.
What is the benefit of having Digital Access at school:
Correct Answer
C. To learn digitally, other than just pen and paper.
Explanation
The benefit of having Digital Access at school is to learn digitally, other than just pen and paper. This means that students can use digital resources such as online textbooks, educational websites, and multimedia tools to enhance their learning experience. Digital access allows for more interactive and engaging learning opportunities, as well as access to a wide range of information and resources that may not be available in traditional pen and paper formats.
12.
What is the negative side of being able to have digital access:
Correct Answer
D. To become addicted to the internet, having no social life with family or friends.
Explanation
The negative side of having digital access is becoming addicted to the internet and losing social connections with family and friends. This addiction can lead to spending excessive amounts of time online, neglecting personal relationships and responsibilities. It can also result in isolation and a lack of real-life social interactions, which are important for overall well-being and mental health.
13.
It's important to teach people how to use technology in a way that is safe and appropriate. People should learn to use technology in ways that help make tasks easier, quicker and less expensive. This is an example of:
Correct Answer
B. Digital Literacy.
Explanation
The given explanation suggests that teaching people how to use technology in a safe and appropriate manner, as well as using it to make tasks easier, quicker, and less expensive, is an example of digital literacy. Digital literacy refers to the ability to use digital technology effectively and responsibly. It involves understanding how to use technology to access, evaluate, and create information, as well as understanding the potential risks and benefits associated with technology use.
14.
What should you do if you are being cyberbullied:
Correct Answer
B. Tell someone and keep the evidence.
Explanation
If you are being cyberbullied, it is important to tell someone and keep the evidence. Cyberbullying can have serious emotional and psychological effects, so it is crucial to seek support from a trusted adult or authority figure who can help address the situation. Keeping evidence of the cyberbullying can also be useful in providing proof of the harassment and assisting in any potential investigations or legal actions that may be taken. Ignoring the cyberbullying or retaliating with similar methods may not effectively address the issue and could potentially escalate the situation further.
15.
What is the problem with opening an email from someone you don't recognize and with a strange Subject Line:
Correct Answer
B. It might contain a computer virus.
Explanation
Opening an email from someone you don't recognize and with a strange subject line might contain a computer virus. Computer viruses can be disguised as email attachments or embedded in links within the email. When the email is opened, the virus can infect the computer, causing harm to the system, stealing personal information, or spreading to other devices on the network. Therefore, it is important to be cautious and avoid opening emails from unknown sources to protect the computer and personal data from potential threats.
16.
What are the benefits of Digital Communication:
Correct Answer
A. To be able to see friends without meeting them face to face.
Explanation
The correct answer is "To be able to see friends without meeting them face to face." This answer highlights one of the main benefits of digital communication, which is the ability to connect with friends and loved ones even when they are physically far away. Through various digital platforms such as video calls, social media, and messaging apps, people can maintain relationships and stay connected despite distance or other barriers.
17.
What does AUP stand for:
Correct Answer
B. Acceptable use policy.
Explanation
The correct answer is "Acceptable use policy". An acceptable use policy (AUP) is a set of rules and guidelines that define the acceptable and appropriate use of computer systems, networks, and resources. It outlines the responsibilities and expectations of users regarding the use of technology and helps to ensure that users understand and adhere to the rules to maintain a secure and productive computing environment.
18.
Why is it important to know your information is safe:
Correct Answer
B. So people don't stalk you or hack into your computer.
Explanation
Knowing that your information is safe is important to prevent people from stalking you or hacking into your computer. This ensures your privacy and security, protecting your personal and sensitive data from being exploited or misused. By keeping your information secure, you can maintain control over your online presence and avoid potential harm or unauthorized access to your personal information.
19.
What are the potential consequences of sexting:
Correct Answer
D. All of the above.
Explanation
The potential consequences of sexting include damaged reputations, prosecution for possessing, sending, and/or receiving child pornography, and damaged relationships. Sexting can lead to negative consequences such as public humiliation, legal consequences, and the breakdown of trust in personal relationships. Therefore, all of the options mentioned above are potential outcomes of engaging in sexting.
20.
When can you use your PED device during class:
Correct Answer
B. When you have permission from your teacher.
Explanation
The correct answer is "When you have permission from your teacher." This means that you can use your PED device during class only if your teacher allows it. It is important to seek permission from your teacher before using any electronic device in the classroom to ensure that it does not disrupt the learning environment or distract other students.
21.
What is the benefit of being able to buy goods online:
Correct Answer
D. Not having to go to the store, and being able to look at the whole store collection of goods.
Explanation
The benefit of being able to buy goods online is not having to go to the store and being able to look at the whole store collection of goods. This allows individuals to shop conveniently from the comfort of their own homes without the need to physically travel to a store. Additionally, online shopping provides the advantage of being able to browse through a wide range of products and compare prices easily, leading to a greater selection and potentially finding better deals.
22.
What is the negative side of buying goods online:
Correct Answer
C. It requires your personal information and credit card number.
Explanation
Buying goods online requires providing personal information and credit card details, which can be a negative aspect. This information can be at risk of being stolen or misused by hackers or fraudulent websites. Additionally, some people may feel uncomfortable sharing their personal information online, leading to concerns about privacy and security.
23.
Who has to sign the AUP contract:
Correct Answer
D. All of the above.
Explanation
The AUP (Acceptable Use Policy) contract is a document that outlines the guidelines and rules for using technology or accessing the internet. It is important for all parties involved, including parents, students, and teachers, to sign the AUP contract. This ensures that everyone is aware of and agrees to the terms and conditions set forth in the contract. By signing the contract, all parties take responsibility for their actions and commit to using technology in a safe and responsible manner.
24.
What helps prevent inappropriate use of your PED:
Correct Answer
B. Being connected through the TICSD filtering system.
Explanation
Being connected through the TICSD filtering system helps prevent inappropriate use of your PED. The TICSD filtering system is designed to block access to websites and content that may be inappropriate or harmful. By connecting through this system, it ensures that your PED is filtered and restricted from accessing such content, thus promoting a safer and more secure online experience. Signing the AUP is also important, as it sets guidelines and rules for appropriate use, but being connected through the TICSD filtering system is specifically focused on preventing inappropriate use. Sharing your PED with a friend or texting are not effective measures in preventing inappropriate use.
25.
During school hours the correct cell phone ringer setting is:
Correct Answer
B. Vibrate or off.
Explanation
During school hours, it is important for students to minimize distractions and disruptions in the classroom. Having a cell phone on a low or off setting ensures that it does not ring or make any noise that could disturb the learning environment. Alternatively, having the phone on vibrate mode also prevents any audible disruptions while still allowing the user to receive notifications silently. Therefore, setting the cell phone ringer to vibrate or off is the correct choice during school hours.
26.
When can you text message during the school day:
Correct Answer
B. When you have permission from your teacher.
Explanation
The correct answer is "When you have permission from your teacher." This answer is the most appropriate because it implies that texting during the school day is generally not allowed unless a student receives explicit permission from their teacher. This suggests that there are specific circumstances in which texting may be permitted, but it is not a free-for-all and should be regulated by the teacher.
27.
Information on the Internet is:
Correct Answer
A. Copyrighted and should be treated as other's property.
Explanation
The correct answer is that information on the Internet is copyrighted and should be treated as other's property. This means that the content found on the Internet, such as articles, images, videos, and music, is protected by copyright laws and cannot be used or reproduced without permission from the original creator. It is important to respect these rights and give credit to the rightful owners when using their work.
28.
E-mail messages should be:
Correct Answer
C. Short and to the point.
Explanation
E-mail messages should be short and to the point because lengthy and detailed emails can be overwhelming for the recipient and may result in important information being overlooked or misunderstood. A concise email ensures that the main message is clear and easily understood, saving time for both the sender and the recipient. Additionally, a brief email is more likely to hold the reader's attention and elicit a prompt response.
29.
Who is responsible for following the Acceptable Use Policy:
Correct Answer
D. Everyone.
Explanation
Everyone is responsible for following the Acceptable Use Policy. This means that both students and teachers, as well as the principal, have a responsibility to adhere to the guidelines outlined in the policy. The policy is applicable to all individuals within the organization, emphasizing the importance of everyone's compliance to ensure a safe and appropriate use of resources.
30.
All PED's must access the internet via:
Correct Answer
C. The schools filtering system.
Explanation
The correct answer is "The schools filtering system." This is because the question states that all PEDs (Portable Electronic Devices) must access the internet via a certain method. Out of the given options, only the schools filtering system is a valid method for accessing the internet. 3G and 4G are mobile network technologies and do not represent a method for accessing the internet. Therefore, the correct answer is the schools filtering system.
31.
If someone puts copyrighted material on the internet and another person wants to use it, that person should:
Correct Answer
D. Ask permission from the author or at least cite the source.
Explanation
If someone puts copyrighted material on the internet and another person wants to use it, they should ask permission from the author or at least cite the source. This is because using copyrighted material without permission is a violation of the author's rights. Asking for permission shows respect for the author's work and protects against potential legal consequences. Citing the source is also important as it gives credit to the original creator and allows others to verify the information.
32.
When there is a reasonable suspicion that a violation of the PED policy has occurred. Who reserves the right to monitor, inspect, copy, and review your PED:
Correct Answer
B. Principal.
Explanation
The principal reserves the right to monitor, inspect, copy, and review your PED (Personal Electronic Device) when there is a reasonable suspicion of a violation of the PED policy. This means that if there is a belief or evidence that you have violated the policy, the principal has the authority to take these actions to investigate the situation. The teacher and guidance counselor may also play a role in enforcing the policy, but the ultimate responsibility lies with the principal.
33.
When dealing with strangers, online users should:
Correct Answer
B. Be cautious about giving information.
Explanation
When dealing with strangers online, it is important for users to be cautious about giving out personal information. This is because sharing personal information freely can lead to privacy breaches, identity theft, and other cybercrimes. It is crucial to protect one's personal information and only share it with trusted sources. Therefore, being cautious about giving information is the safest approach when interacting with strangers online.
34.
The intended purpose for the use of your PED is for:
Correct Answer
A. Educational purposes.
Explanation
The intended purpose for the use of your PED (Personal Electronic Device) is for educational purposes. This suggests that the device is primarily meant to be used for educational activities such as studying, research, accessing educational resources, and learning. It is not meant for texting with friends, keeping parents informed, or engaging in digital commerce.
35.
Sending text messages is an example of:
Correct Answer
A. Digital Communication.
Explanation
Sending text messages involves the use of digital devices and technology to transmit written messages. It is a form of communication that relies on digital platforms such as smartphones and computers. Digital communication refers to the exchange of information through electronic means, and sending text messages falls under this category. It allows individuals to communicate quickly and efficiently, making it a common method of communication in today's digital age.
36.
Explaining to your mom how to send an email is an example of:
Correct Answer
B. Digital Literacy.
Explanation
Explaining to your mom how to send an email falls under the category of digital literacy. Digital literacy refers to the ability to use and navigate digital technologies effectively and responsibly. In this scenario, you are helping your mom develop the necessary skills and knowledge to operate email, which is a fundamental aspect of digital literacy.
37.
Anti-Virus software relates to which element of Digital Citizenship:
Correct Answer
A. Digital Security.
Explanation
Anti-virus software is a tool designed to protect digital devices from malware, viruses, and other security threats. It plays a crucial role in ensuring the security and safety of digital systems. Digital Security is a key element of Digital Citizenship that emphasizes the importance of protecting oneself and others in the digital world. By using anti-virus software, individuals can actively practice digital security and fulfill their responsibilities towards maintaining a safe digital environment.
38.
Sitting up straight and tall when in front of a computer is an example of:
Correct Answer
B. Digital Health and Wellness.
Explanation
Sitting up straight and tall when in front of a computer is an example of digital health and wellness. This practice promotes good posture and prevents the development of musculoskeletal problems that can arise from prolonged computer use. Digital health and wellness encompasses practices that prioritize physical and mental well-being while using digital devices. It includes activities such as taking breaks, practicing ergonomics, and maintaining a healthy balance between screen time and other activities.
39.
Demonstrating good conduct and being a responsible user of your PED is an example of:
Correct Answer
B. Digital Etiquette.
Explanation
Demonstrating good conduct and being a responsible user of your PED (Personal Electronic Device) refers to following the appropriate behavior and guidelines while using digital technology. This includes respecting others' privacy, being mindful of the content shared online, and using technology in a respectful and responsible manner. This falls under the concept of Digital Etiquette, which encompasses the proper use of digital devices and platforms in a socially acceptable way.
40.
You must be aware of appropriateness of communications when using your PED. Inappropriate communication is prohibited:
Correct Answer
D. All of the above.
Explanation
The correct answer is "All of the above." This means that inappropriate communication is prohibited in any public messages, any private messages, and any material posted online by you. This implies that regardless of the platform or medium, it is important to be mindful of the appropriateness of your communications when using your PED (Personal Electronic Device).
41.
Hacking, pirated software, and identity theft are in violation of which of the elements of Digital Citizenship:
Correct Answer
D. Digital Law.
Explanation
Hacking, pirated software, and identity theft are all activities that are illegal and against the law in the digital world. They involve unauthorized access, distribution, and use of digital resources, which is a violation of digital laws and regulations. Digital Law encompasses the legal rights and responsibilities of individuals in the digital space, including issues related to privacy, copyright, and cybercrime. Therefore, these activities are in violation of the element of Digital Law in Digital Citizenship.
42.
When dealing with people online, giving personal information is:
Correct Answer
B. Never a good idea, no matter the reason.
Explanation
Giving personal information online is never a good idea, regardless of the reason. This is because personal information can be easily misused or exploited by malicious individuals for various purposes such as identity theft, fraud, or harassment. It is important to prioritize privacy and security when interacting with people online to protect oneself from potential risks and maintain personal safety.
43.
When using a PED, a user should:
Correct Answer
B. Ask teachers and parents about what can be done.
Explanation
When using a PED (Personal Electronic Device), it is important for a user to ask teachers and parents about what can be done. This is because teachers and parents are responsible for setting guidelines and rules regarding the use of electronic devices. They can provide valuable information about appropriate and safe usage, as well as any restrictions or limitations that may be in place. Seeking guidance from trusted adults ensures that the user is using their PED responsibly and in accordance with the rules set by their educational institution or household.
44.
Your science teacher has assigned a report on animal adaption. You must include pictures. From which source can you use pictures in your report without including it in your bibliography:
Correct Answer
C. Your pictures from the zoo.
Explanation
You can use pictures from the zoo in your report without including them in your bibliography because they are your own personal pictures that you have taken. They are not external sources that need to be cited.
45.
You need to take a form home to be signed. It will allow you to use the internet at school. What is the name of the form:
Correct Answer
D. Acceptable Use Policy.
Explanation
The form that needs to be taken home to be signed in order to use the internet at school is called the "Acceptable Use Policy." This policy outlines the guidelines and rules for using the internet responsibly and safely within the school setting. By signing this form, the student and their parent or guardian agree to abide by these rules and understand the consequences of any misuse or violation of the policy.
46.
If you own a PED, when are you required to bring it to school:
Correct Answer
D. Never.
Explanation
The correct answer is "Never." This means that if you own a PED (Portable Electronic Device), you are not required to bring it to school at any time. This suggests that the school does not have a policy or requirement for students to bring their PEDs to school. Therefore, bringing a PED to school is not necessary or mandatory.
47.
Who is liable for the loss, damage, misuse, or theft of your PED during School:
Correct Answer
D. You.
Explanation
You are liable for the loss, damage, misuse, or theft of your PED during school. This means that you are responsible for any harm or loss that occurs to your personal electronic device while you are at school. It is important to take care of your belongings and keep them safe to avoid any potential issues.
48.
What is the rule for using your PED in commom areas such as hallways, auditorium, and locker room:
Correct Answer
C. Text your teacher if you are going to be late for class.
Explanation
The rule for using your PED in common areas such as hallways, auditorium, and locker room is to text your teacher if you are going to be late for class.
49.
Where you sit or relax when you work with technology:
Correct Answer
D. Is important, because improper seating cause pHysical problems later.
Explanation
It is important to have proper seating when working with technology because improper seating can cause physical problems later. Sitting in a comfortable and ergonomic position helps to maintain good posture and reduces the risk of developing musculoskeletal issues such as back pain, neck strain, and repetitive strain injuries. Therefore, paying attention to seating arrangements is crucial for maintaining good health and preventing long-term physical problems.
50.
Your friend tells you about a website where you can download all of the latest songs that you hear on the radio for free. If you use this website for this purpose, you will be violating which of the following:
Correct Answer
C. Copyright.
Explanation
Using a website to download songs for free that are protected by copyright would be a violation of copyright law. Copyright grants exclusive rights to the creators of original works, such as songs, and allows them to control the distribution and reproduction of their work. Downloading copyrighted songs without permission or payment infringes upon the rights of the artists and the owners of the songs.