Ped Use & Digital Citizenship

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Freitagc
F
Freitagc
Community Contributor
Quizzes Created: 1 | Total Attempts: 220
Questions: 60 | Attempts: 220

SettingsSettingsSettings
Digital Citizenship Quizzes & Trivia

Thousand Islands High School

Directions: Multiple Choice: Choose the answer that best completes each statement or question.
After you have completed th presentation, follow the link to the quiz. You must receive an 85% or greater to register your PED.
Once you have completed the quiz print the certificate that has your name and grade and turn this into Mrs. Balk to register your device.


Questions and Answers
  • 1. 

    What information should you never share online:

    • A.

      Your first name.

    • B.

      Your address.

    • C.

      Your favorite band.

    • D.

      All of the above.

    Correct Answer
    B. Your address.
    Explanation
    The correct answer is "your address." Sharing personal information like your address online can pose a significant risk to your safety and privacy. It can make you vulnerable to identity theft, stalking, or even physical harm. While sharing your first name or favorite band may not have the same level of risk, it is still advisable to be cautious about sharing too much personal information online.

    Rate this question:

  • 2. 

    Following the rules and policies established by the school district for appropriate use of your PED is an example of:

    • A.

      Access.

    • B.

      Etiquette.

    • C.

      Inappropriate behavior.

    • D.

      Law.

    Correct Answer
    B. Etiquette.
    Explanation
    Following the rules and policies established by the school district for appropriate use of your PED is an example of etiquette. Etiquette refers to the accepted code of conduct or behavior in a particular setting or community. In this case, the school district has set guidelines for the appropriate use of personal electronic devices (PEDs), and adhering to these rules demonstrates good etiquette. It shows respect for the school's policies and ensures that PEDs are being used in a responsible and appropriate manner.

    Rate this question:

  • 3. 

    The difference between safety and security is:

    • A.

      Safety is about making sure you don't get hurt or injured using technology and security is about protecting your identity.

    • B.

      Safety is about making sure people don't know who you are online and security is about making sure your computer doesn't get a virus.

    • C.

      Safety is about protecting your identity and Security is about logging off from your computer when it's not being used.

    Correct Answer
    A. Safety is about making sure you don't get hurt or injured using technology and security is about protecting your identity.
  • 4. 

    What is Digital Citizenship:

    • A.

      To be part of an internet group.

    • B.

      To be a good person.

    • C.

      To have a good reputation on the digital world.

    • D.

      To play online games.

    Correct Answer
    C. To have a good reputation on the digital world.
    Explanation
    Digital citizenship refers to the responsible and ethical behavior of individuals in the online world. It involves understanding and practicing good online etiquette, respecting the rights and privacy of others, and being aware of the potential risks and consequences of online actions. Having a good reputation in the digital world is an important aspect of being a responsible digital citizen as it reflects one's integrity, credibility, and trustworthiness in the online community.

    Rate this question:

  • 5. 

    Why was the acceptable use policy implemented:

    • A.

      To protect all internet users.

    • B.

      To monitor the internet.

    • C.

      To ensure integrity of internet.

    • D.

      Both A and C.

    Correct Answer
    D. Both A and C.
    Explanation
    The acceptable use policy was implemented to protect all internet users and ensure the integrity of the internet. By having this policy in place, it sets guidelines and rules for how the internet should be used, preventing any misuse or harm to users. It also helps in maintaining the integrity of the internet by promoting ethical and responsible use, preventing any unauthorized access or malicious activities. By selecting both options A and C, it acknowledges that the implementation of the policy serves the purpose of protecting users and maintaining the integrity of the internet simultaneously.

    Rate this question:

  • 6. 

    What is one reason that it is important to be a good Digital Citizen:

    • A.

      It can make you famous.

    • B.

      It can affect you from getting a good job.

    • C.

      It will make many people like you.

    • D.

      It's not important to be a good Digital Citizen.

    Correct Answer
    B. It can affect you from getting a good job.
    Explanation
    Being a good digital citizen is important because it can affect your chances of getting a good job. In today's digital age, employers often conduct online searches and review social media profiles of potential candidates. If someone has a negative online presence, such as engaging in cyberbullying or posting inappropriate content, it can create a negative impression on employers and impact their decision to hire. On the other hand, being a responsible digital citizen by maintaining a positive online presence, respecting others' privacy, and using technology ethically can enhance one's professional reputation and increase job prospects.

    Rate this question:

  • 7. 

    In order to have a registered PED with TICSD what are you required to sign:

    • A.

      The Student Handbook.

    • B.

      The Acceptable Use Policy.

    • C.

      The Internet User Contract.

    • D.

      The Internet Account Policy.

    Correct Answer
    B. The Acceptable Use Policy.
    Explanation
    To have a registered PED with TICSD, you are required to sign the Acceptable Use Policy. This policy outlines the guidelines and rules for using the internet and technology provided by TICSD. By signing this policy, you agree to abide by the terms and conditions stated within it, ensuring responsible and appropriate use of the PED and its associated resources. The Student Handbook, Internet User Contract, and Internet Account Policy may contain other important information, but they are not specifically required for registering a PED with TICSD.

    Rate this question:

  • 8. 

    What is the problem with meeting people for the first time online instead of meeting them in person:

    • A.

      You might be embarrassed when you finally get to see them.

    • B.

      They might not want to continue to be your friend.

    • C.

      You don't really know if what they are typing to you is really the truth.

    • D.

      All of the above.

    Correct Answer
    D. All of the above.
    Explanation
    Meeting people for the first time online instead of in person can lead to various problems. Firstly, when you finally meet them in person, there is a possibility of feeling embarrassed if they don't match your expectations or if there are any awkward moments. Secondly, they might not want to continue being your friend after meeting in person, which can be disappointing. Lastly, online interactions may not always reflect the truth, and you can never be completely sure if the person is being honest or genuine. Therefore, all the mentioned options can be potential problems when meeting people for the first time online.

    Rate this question:

  • 9. 

    What does "think before you post" mean:

    • A.

      Information you share online can be widely distributed.

    • B.

      Information shared online can be almost impossible to remove from the web.

    • C.

      Will sharing this information damage my reputation or that of someone else?

    • D.

      All of the above.

    Correct Answer
    D. All of the above.
    Explanation
    "Think before you post" means that one should carefully consider the potential consequences of sharing information online. The answer "All of the above" is correct because it encompasses all the given statements. Sharing information online can have far-reaching effects as it can be widely distributed and difficult to remove from the web. Additionally, one should consider whether sharing certain information could harm their own reputation or that of someone else.

    Rate this question:

  • 10. 

    Where can you find a copy of the AUP:

    • A.

      The student agenda book.

    • B.

      Computer class.

    • C.

      People Magazine.

    • D.

      Nurses Office.

    Correct Answer
    A. The student agenda book.
    Explanation
    The AUP (Acceptable Use Policy) is a set of guidelines that outlines the proper use of technology resources in an educational setting. It is typically provided to students and staff to ensure responsible and appropriate use of computers and other devices. The student agenda book is a common place to find a copy of the AUP as it serves as a reference guide for students, containing important information such as school policies, rules, and guidelines.

    Rate this question:

  • 11. 

    What is the benefit of having Digital Access at school:

    • A.

      To go on facebook, myspace, and twitter.

    • B.

      To be able to check your personal e-mail.

    • C.

      To learn digitally, other than just pen and paper.

    • D.

      There are no benefits. Pen and paper is the best way to learn everything in this modern world.

    Correct Answer
    C. To learn digitally, other than just pen and paper.
    Explanation
    The benefit of having Digital Access at school is to learn digitally, other than just pen and paper. This means that students can use digital resources such as online textbooks, educational websites, and multimedia tools to enhance their learning experience. Digital access allows for more interactive and engaging learning opportunities, as well as access to a wide range of information and resources that may not be available in traditional pen and paper formats.

    Rate this question:

  • 12. 

    What is the negative side of being able to have digital access:

    • A.

      To have a lot of tools that you can use for school.

    • B.

      Facebook, myspace, and twitter.

    • C.

      There are no negative sides. Everything you want you can have digitally.

    • D.

      To become addicted to the internet, having no social life with family or friends.

    Correct Answer
    D. To become addicted to the internet, having no social life with family or friends.
    Explanation
    The negative side of having digital access is becoming addicted to the internet and losing social connections with family and friends. This addiction can lead to spending excessive amounts of time online, neglecting personal relationships and responsibilities. It can also result in isolation and a lack of real-life social interactions, which are important for overall well-being and mental health.

    Rate this question:

  • 13. 

    It's important to teach people how to use technology in a way that is safe and appropriate. People should learn to use technology in ways that help make tasks easier, quicker and less expensive. This is an example of:

    • A.

      Digital Commerce.

    • B.

      Digital Literacy.

    • C.

      Digital Access.

    • D.

      Digital Law.

    Correct Answer
    B. Digital Literacy.
    Explanation
    The given explanation suggests that teaching people how to use technology in a safe and appropriate manner, as well as using it to make tasks easier, quicker, and less expensive, is an example of digital literacy. Digital literacy refers to the ability to use digital technology effectively and responsibly. It involves understanding how to use technology to access, evaluate, and create information, as well as understanding the potential risks and benefits associated with technology use.

    Rate this question:

  • 14. 

    What should you do if you are being cyberbullied:

    • A.

      Be mature and just ignore it.

    • B.

      Tell someone and keep the evidence.

    • C.

      Be strong and use similar methods in return.

    • D.

      All of the above.

    Correct Answer
    B. Tell someone and keep the evidence.
    Explanation
    If you are being cyberbullied, it is important to tell someone and keep the evidence. Cyberbullying can have serious emotional and psychological effects, so it is crucial to seek support from a trusted adult or authority figure who can help address the situation. Keeping evidence of the cyberbullying can also be useful in providing proof of the harassment and assisting in any potential investigations or legal actions that may be taken. Ignoring the cyberbullying or retaliating with similar methods may not effectively address the issue and could potentially escalate the situation further.

    Rate this question:

  • 15. 

    What is the problem with opening an email from someone you don't recognize and with a strange Subject Line:

    • A.

      It wastes storage space on your hard drive.

    • B.

      It might contain a computer virus.

    • C.

      It wastes your valuable time.

    • D.

      All of the above.

    Correct Answer
    B. It might contain a computer virus.
    Explanation
    Opening an email from someone you don't recognize and with a strange subject line might contain a computer virus. Computer viruses can be disguised as email attachments or embedded in links within the email. When the email is opened, the virus can infect the computer, causing harm to the system, stealing personal information, or spreading to other devices on the network. Therefore, it is important to be cautious and avoid opening emails from unknown sources to protect the computer and personal data from potential threats.

    Rate this question:

  • 16. 

    What are the benefits of Digital Communication:

    • A.

      To be able to see friends without meeting them face to face.

    • B.

      To meet strangers.

    • C.

      To share personal information with everyone.

    • D.

      There are no benefits.

    Correct Answer
    A. To be able to see friends without meeting them face to face.
    Explanation
    The correct answer is "To be able to see friends without meeting them face to face." This answer highlights one of the main benefits of digital communication, which is the ability to connect with friends and loved ones even when they are physically far away. Through various digital platforms such as video calls, social media, and messaging apps, people can maintain relationships and stay connected despite distance or other barriers.

    Rate this question:

  • 17. 

    What does AUP stand for:

    • A.

      Apple use policy.

    • B.

      Acceptable use policy.

    • C.

      Appropriate use program.

    • D.

      Appropriate use policy.

    Correct Answer
    B. Acceptable use policy.
    Explanation
    The correct answer is "Acceptable use policy". An acceptable use policy (AUP) is a set of rules and guidelines that define the acceptable and appropriate use of computer systems, networks, and resources. It outlines the responsibilities and expectations of users regarding the use of technology and helps to ensure that users understand and adhere to the rules to maintain a secure and productive computing environment.

    Rate this question:

  • 18. 

    Why is it important to know your information is safe:

    • A.

      Because nobody should know it.

    • B.

      So people don't stalk you or hack into your computer.

    • C.

      So that you can make your website anonymous.

    • D.

      It doesn't matter if it is safe or not.

    Correct Answer
    B. So people don't stalk you or hack into your computer.
    Explanation
    Knowing that your information is safe is important to prevent people from stalking you or hacking into your computer. This ensures your privacy and security, protecting your personal and sensitive data from being exploited or misused. By keeping your information secure, you can maintain control over your online presence and avoid potential harm or unauthorized access to your personal information.

    Rate this question:

  • 19. 

    What are the potential consequences of sexting:

    • A.

      Damaged reputations.

    • B.

      Prosecution for possessing, sending, and/or receiving child pornography.

    • C.

      Damaged relationships.

    • D.

      All of the above.

    Correct Answer
    D. All of the above.
    Explanation
    The potential consequences of sexting include damaged reputations, prosecution for possessing, sending, and/or receiving child pornography, and damaged relationships. Sexting can lead to negative consequences such as public humiliation, legal consequences, and the breakdown of trust in personal relationships. Therefore, all of the options mentioned above are potential outcomes of engaging in sexting.

    Rate this question:

  • 20. 

    When can you use your PED device during class:

    • A.

      Anytime.

    • B.

      When you have permission from your teacher.

    • C.

      When you have permission from your parent.

    • D.

      Never.

    Correct Answer
    B. When you have permission from your teacher.
    Explanation
    The correct answer is "When you have permission from your teacher." This means that you can use your PED device during class only if your teacher allows it. It is important to seek permission from your teacher before using any electronic device in the classroom to ensure that it does not disrupt the learning environment or distract other students.

    Rate this question:

  • 21. 

    What is the benefit of being able to buy goods online:

    • A.

      Being lazy.

    • B.

      Less expensive and you do not need to use cash.

    • C.

      There are no benefits.

    • D.

      Not having to go to the store, and being able to look at the whole store collection of goods.

    Correct Answer
    D. Not having to go to the store, and being able to look at the whole store collection of goods.
    Explanation
    The benefit of being able to buy goods online is not having to go to the store and being able to look at the whole store collection of goods. This allows individuals to shop conveniently from the comfort of their own homes without the need to physically travel to a store. Additionally, online shopping provides the advantage of being able to browse through a wide range of products and compare prices easily, leading to a greater selection and potentially finding better deals.

    Rate this question:

  • 22. 

    What is the negative side of buying goods online:

    • A.

      There are no negative sides. It's perfect. You don't need to move.

    • B.

      More expensive.

    • C.

      It requires your personal information and credit card number.

    • D.

      You have to look through many things to find what you want.

    Correct Answer
    C. It requires your personal information and credit card number.
    Explanation
    Buying goods online requires providing personal information and credit card details, which can be a negative aspect. This information can be at risk of being stolen or misused by hackers or fraudulent websites. Additionally, some people may feel uncomfortable sharing their personal information online, leading to concerns about privacy and security.

    Rate this question:

  • 23. 

    Who has to sign the AUP contract:

    • A.

      Parents.

    • B.

      Students.

    • C.

      Teachers.

    • D.

      All of the above.

    Correct Answer
    D. All of the above.
    Explanation
    The AUP (Acceptable Use Policy) contract is a document that outlines the guidelines and rules for using technology or accessing the internet. It is important for all parties involved, including parents, students, and teachers, to sign the AUP contract. This ensures that everyone is aware of and agrees to the terms and conditions set forth in the contract. By signing the contract, all parties take responsibility for their actions and commit to using technology in a safe and responsible manner.

    Rate this question:

  • 24. 

    What helps prevent inappropriate use of your PED:

    • A.

      Signing the AUP.

    • B.

      Being connected through the TICSD filtering system.

    • C.

      Sharing your PED with a friend.

    • D.

      Texting.

    Correct Answer
    B. Being connected through the TICSD filtering system.
    Explanation
    Being connected through the TICSD filtering system helps prevent inappropriate use of your PED. The TICSD filtering system is designed to block access to websites and content that may be inappropriate or harmful. By connecting through this system, it ensures that your PED is filtered and restricted from accessing such content, thus promoting a safer and more secure online experience. Signing the AUP is also important, as it sets guidelines and rules for appropriate use, but being connected through the TICSD filtering system is specifically focused on preventing inappropriate use. Sharing your PED with a friend or texting are not effective measures in preventing inappropriate use.

    Rate this question:

  • 25. 

    During school hours the correct cell phone ringer setting is: 

    • A.

      Low or off.

    • B.

      Vibrate or off.

    • C.

      Specialized ring tone.

    • D.

      High.

    Correct Answer
    B. Vibrate or off.
    Explanation
    During school hours, it is important for students to minimize distractions and disruptions in the classroom. Having a cell phone on a low or off setting ensures that it does not ring or make any noise that could disturb the learning environment. Alternatively, having the phone on vibrate mode also prevents any audible disruptions while still allowing the user to receive notifications silently. Therefore, setting the cell phone ringer to vibrate or off is the correct choice during school hours.

    Rate this question:

  • 26. 

    When can you text message during the school day:

    • A.

      Never.

    • B.

      When you have permission from your teacher.

    • C.

      When noone is looking.

    • D.

      Anytime.

    Correct Answer
    B. When you have permission from your teacher.
    Explanation
    The correct answer is "When you have permission from your teacher." This answer is the most appropriate because it implies that texting during the school day is generally not allowed unless a student receives explicit permission from their teacher. This suggests that there are specific circumstances in which texting may be permitted, but it is not a free-for-all and should be regulated by the teacher.

    Rate this question:

  • 27. 

    Information on the Internet is: 

    • A.

      Copyrighted and should be treated as other's property.

    • B.

      Available for anyone to use as they want.

    • C.

      Easy to copy and paste so it looks original.

    • D.

      Unreliable and should be held suspect.

    Correct Answer
    A. Copyrighted and should be treated as other's property.
    Explanation
    The correct answer is that information on the Internet is copyrighted and should be treated as other's property. This means that the content found on the Internet, such as articles, images, videos, and music, is protected by copyright laws and cannot be used or reproduced without permission from the original creator. It is important to respect these rights and give credit to the rightful owners when using their work.

    Rate this question:

  • 28. 

    E-mail messages should be:  

    • A.

      Long and full of details.

    • B.

      Made up of many ideas.

    • C.

      Short and to the point.

    • D.

      Sent without a subject line.

    Correct Answer
    C. Short and to the point.
    Explanation
    E-mail messages should be short and to the point because lengthy and detailed emails can be overwhelming for the recipient and may result in important information being overlooked or misunderstood. A concise email ensures that the main message is clear and easily understood, saving time for both the sender and the recipient. Additionally, a brief email is more likely to hold the reader's attention and elicit a prompt response.

    Rate this question:

  • 29. 

    Who is responsible for following the Acceptable Use Policy: 

    • A.

      Students.

    • B.

      Teachers.

    • C.

      The principal.

    • D.

      Everyone.

    Correct Answer
    D. Everyone.
    Explanation
    Everyone is responsible for following the Acceptable Use Policy. This means that both students and teachers, as well as the principal, have a responsibility to adhere to the guidelines outlined in the policy. The policy is applicable to all individuals within the organization, emphasizing the importance of everyone's compliance to ensure a safe and appropriate use of resources.

    Rate this question:

  • 30. 

    All PED's must access the internet via:

    • A.

      3G.

    • B.

      4G.

    • C.

      The schools filtering system.

    • D.

      All of the above.

    Correct Answer
    C. The schools filtering system.
    Explanation
    The correct answer is "The schools filtering system." This is because the question states that all PEDs (Portable Electronic Devices) must access the internet via a certain method. Out of the given options, only the schools filtering system is a valid method for accessing the internet. 3G and 4G are mobile network technologies and do not represent a method for accessing the internet. Therefore, the correct answer is the schools filtering system.

    Rate this question:

  • 31. 

    If someone puts copyrighted material on the internet and another person wants to use it, that person should:

    • A.

      Use it, if it is for educational use.

    • B.

      Take it, and use it as they want.

    • C.

      Not use the information because it is too much trouble.

    • D.

      Ask permission from the author or at least cite the source.

    Correct Answer
    D. Ask permission from the author or at least cite the source.
    Explanation
    If someone puts copyrighted material on the internet and another person wants to use it, they should ask permission from the author or at least cite the source. This is because using copyrighted material without permission is a violation of the author's rights. Asking for permission shows respect for the author's work and protects against potential legal consequences. Citing the source is also important as it gives credit to the original creator and allows others to verify the information.

    Rate this question:

  • 32. 

    When there is a reasonable suspicion that a violation of the PED policy has occurred.  Who reserves the right to monitor, inspect, copy, and review your PED:

    • A.

      Teacher.

    • B.

      Principal.

    • C.

      Guidance Counselor.

    • D.

      All of the above

    Correct Answer
    B. Principal.
    Explanation
    The principal reserves the right to monitor, inspect, copy, and review your PED (Personal Electronic Device) when there is a reasonable suspicion of a violation of the PED policy. This means that if there is a belief or evidence that you have violated the policy, the principal has the authority to take these actions to investigate the situation. The teacher and guidance counselor may also play a role in enforcing the policy, but the ultimate responsibility lies with the principal.

    Rate this question:

  • 33. 

    When dealing with strangers, online users should: 

    • A.

      Give personal information freely.

    • B.

      Be cautious about giving information.

    • C.

      Provide passwords and credit information if asked.

    • D.

      Not tell anyone about people they meet online.

    Correct Answer
    B. Be cautious about giving information.
    Explanation
    When dealing with strangers online, it is important for users to be cautious about giving out personal information. This is because sharing personal information freely can lead to privacy breaches, identity theft, and other cybercrimes. It is crucial to protect one's personal information and only share it with trusted sources. Therefore, being cautious about giving information is the safest approach when interacting with strangers online.

    Rate this question:

  • 34. 

    The intended purpose for the use of your PED is for:

    • A.

      Educational purposes.

    • B.

      Texting with your friends.

    • C.

      Keeping your parents informed of your activities throughout the day.

    • D.

      Digital Commerce.

    Correct Answer
    A. Educational purposes.
    Explanation
    The intended purpose for the use of your PED (Personal Electronic Device) is for educational purposes. This suggests that the device is primarily meant to be used for educational activities such as studying, research, accessing educational resources, and learning. It is not meant for texting with friends, keeping parents informed, or engaging in digital commerce.

    Rate this question:

  • 35. 

    Sending text messages is an example of: 

    • A.

      Digital Communication.

    • B.

      Digital Etiquette.

    • C.

      Digital Literacy.

    • D.

      Digital Rights and Responsibilities.

    Correct Answer
    A. Digital Communication.
    Explanation
    Sending text messages involves the use of digital devices and technology to transmit written messages. It is a form of communication that relies on digital platforms such as smartphones and computers. Digital communication refers to the exchange of information through electronic means, and sending text messages falls under this category. It allows individuals to communicate quickly and efficiently, making it a common method of communication in today's digital age.

    Rate this question:

  • 36. 

    Explaining to your mom how to send an email is an example of: 

    • A.

      Digital Commerce.

    • B.

      Digital Literacy.

    • C.

      Digital Access.

    • D.

      Digital Security.

    Correct Answer
    B. Digital Literacy.
    Explanation
    Explaining to your mom how to send an email falls under the category of digital literacy. Digital literacy refers to the ability to use and navigate digital technologies effectively and responsibly. In this scenario, you are helping your mom develop the necessary skills and knowledge to operate email, which is a fundamental aspect of digital literacy.

    Rate this question:

  • 37. 

    Anti-Virus software relates to which element of Digital Citizenship: 

    • A.

      Digital Security.

    • B.

      Digital Rights and Responsibilities.

    • C.

      Digital Communication.

    • D.

      Digital Access.

    Correct Answer
    A. Digital Security.
    Explanation
    Anti-virus software is a tool designed to protect digital devices from malware, viruses, and other security threats. It plays a crucial role in ensuring the security and safety of digital systems. Digital Security is a key element of Digital Citizenship that emphasizes the importance of protecting oneself and others in the digital world. By using anti-virus software, individuals can actively practice digital security and fulfill their responsibilities towards maintaining a safe digital environment.

    Rate this question:

  • 38. 

    Sitting up straight and tall when in front of a computer is an example of: 

    • A.

      Digital Literacy.

    • B.

      Digital Health and Wellness.

    • C.

      Digital Etiquette.

    • D.

      Digital Communication.

    Correct Answer
    B. Digital Health and Wellness.
    Explanation
    Sitting up straight and tall when in front of a computer is an example of digital health and wellness. This practice promotes good posture and prevents the development of musculoskeletal problems that can arise from prolonged computer use. Digital health and wellness encompasses practices that prioritize physical and mental well-being while using digital devices. It includes activities such as taking breaks, practicing ergonomics, and maintaining a healthy balance between screen time and other activities.

    Rate this question:

  • 39. 

    Demonstrating good conduct and being a responsible user of your PED is an example of: 

    • A.

      Digital Rights and Responsibilities.

    • B.

      Digital Etiquette.

    • C.

      Digital Access.

    • D.

      Digital Communication.

    Correct Answer
    B. Digital Etiquette.
    Explanation
    Demonstrating good conduct and being a responsible user of your PED (Personal Electronic Device) refers to following the appropriate behavior and guidelines while using digital technology. This includes respecting others' privacy, being mindful of the content shared online, and using technology in a respectful and responsible manner. This falls under the concept of Digital Etiquette, which encompasses the proper use of digital devices and platforms in a socially acceptable way.

    Rate this question:

  • 40. 

    You must be aware of appropriateness of communications when using your PED. Inappropriate communication is prohibited:

    • A.

      In any public messages.

    • B.

      In any private messages.

    • C.

      In any material posted online by you.

    • D.

      All of the above.

    Correct Answer
    D. All of the above.
    Explanation
    The correct answer is "All of the above." This means that inappropriate communication is prohibited in any public messages, any private messages, and any material posted online by you. This implies that regardless of the platform or medium, it is important to be mindful of the appropriateness of your communications when using your PED (Personal Electronic Device).

    Rate this question:

  • 41. 

    Hacking, pirated software, and identity theft are in violation of which of the elements of Digital Citizenship:

    • A.

      Digital Etiquette.

    • B.

      Digital Security.

    • C.

      Digital Access.

    • D.

      Digital Law.

    Correct Answer
    D. Digital Law.
    Explanation
    Hacking, pirated software, and identity theft are all activities that are illegal and against the law in the digital world. They involve unauthorized access, distribution, and use of digital resources, which is a violation of digital laws and regulations. Digital Law encompasses the legal rights and responsibilities of individuals in the digital space, including issues related to privacy, copyright, and cybercrime. Therefore, these activities are in violation of the element of Digital Law in Digital Citizenship.

    Rate this question:

  • 42. 

    When dealing with people online, giving personal information is: 

    • A.

      Okay as long as these people live far away.

    • B.

      Never a good idea, no matter the reason.

    • C.

      Fine as long as the people are nice.

    • D.

      Nothing to worry about.

    Correct Answer
    B. Never a good idea, no matter the reason.
    Explanation
    Giving personal information online is never a good idea, regardless of the reason. This is because personal information can be easily misused or exploited by malicious individuals for various purposes such as identity theft, fraud, or harassment. It is important to prioritize privacy and security when interacting with people online to protect oneself from potential risks and maintain personal safety.

    Rate this question:

  • 43. 

    When using a PED, a user should:

    • A.

      Do whatever they want, no one ever checks.

    • B.

      Ask teachers and parents about what can be done.

    • C.

      Not ask parents and teachers because they never allow anything.

    • D.

      Ask their friends because they know about technology.

    Correct Answer
    B. Ask teachers and parents about what can be done.
    Explanation
    When using a PED (Personal Electronic Device), it is important for a user to ask teachers and parents about what can be done. This is because teachers and parents are responsible for setting guidelines and rules regarding the use of electronic devices. They can provide valuable information about appropriate and safe usage, as well as any restrictions or limitations that may be in place. Seeking guidance from trusted adults ensures that the user is using their PED responsibly and in accordance with the rules set by their educational institution or household.

    Rate this question:

  • 44. 

    Your science teacher has assigned a report on animal adaption. You must include pictures. From which source can you use pictures in your report without including it in your bibliography: 

    • A.

      An animal book.

    • B.

      A search engine page.

    • C.

      Your pictures from the zoo.

    • D.

      A Web page.

    Correct Answer
    C. Your pictures from the zoo.
    Explanation
    You can use pictures from the zoo in your report without including them in your bibliography because they are your own personal pictures that you have taken. They are not external sources that need to be cited.

    Rate this question:

  • 45. 

    You need to take a form home to be signed. It will allow you to use the internet at school. What is the name of the form:

    • A.

      Internet Use Policy.

    • B.

      Parent Waiver.

    • C.

      Technology Acceptance Form.

    • D.

      Acceptable Use Policy.

    Correct Answer
    D. Acceptable Use Policy.
    Explanation
    The form that needs to be taken home to be signed in order to use the internet at school is called the "Acceptable Use Policy." This policy outlines the guidelines and rules for using the internet responsibly and safely within the school setting. By signing this form, the student and their parent or guardian agree to abide by these rules and understand the consequences of any misuse or violation of the policy.

    Rate this question:

  • 46. 

    If you own a PED, when are you required to bring it to school:

    • A.

      Everyday.

    • B.

      When your teacher asks you to bring it to school.

    • C.

      When the principal asks you to bring it to school.

    • D.

      Never.

    Correct Answer
    D. Never.
    Explanation
    The correct answer is "Never." This means that if you own a PED (Portable Electronic Device), you are not required to bring it to school at any time. This suggests that the school does not have a policy or requirement for students to bring their PEDs to school. Therefore, bringing a PED to school is not necessary or mandatory.

    Rate this question:

  • 47. 

    Who is liable for the loss, damage, misuse, or theft of your PED during School: 

    • A.

      The school district.

    • B.

      Your teacher.

    • C.

      Your friend.

    • D.

      You.

    Correct Answer
    D. You.
    Explanation
    You are liable for the loss, damage, misuse, or theft of your PED during school. This means that you are responsible for any harm or loss that occurs to your personal electronic device while you are at school. It is important to take care of your belongings and keep them safe to avoid any potential issues.

    Rate this question:

  • 48. 

    What is the rule for using your PED in commom areas such as hallways, auditorium, and locker room:

    • A.

      Ask staff member for permission to use them.

    • B.

      Remove your head phones / ear-buds.

    • C.

      Text your teacher if you are going to be late for class.

    • D.

      There are no rules.

    Correct Answer
    C. Text your teacher if you are going to be late for class.
    Explanation
    The rule for using your PED in common areas such as hallways, auditorium, and locker room is to text your teacher if you are going to be late for class.

    Rate this question:

  • 49. 

    Where you sit or relax when you work with technology: 

    • A.

      Doesn't matter as long as you are comfortable.

    • B.

      Depends on where you are.

    • C.

      Isn't something to worry about.

    • D.

      Is important, because improper seating cause physical problems later.

    Correct Answer
    D. Is important, because improper seating cause pHysical problems later.
    Explanation
    It is important to have proper seating when working with technology because improper seating can cause physical problems later. Sitting in a comfortable and ergonomic position helps to maintain good posture and reduces the risk of developing musculoskeletal issues such as back pain, neck strain, and repetitive strain injuries. Therefore, paying attention to seating arrangements is crucial for maintaining good health and preventing long-term physical problems.

    Rate this question:

  • 50. 

    Your friend tells you about a website where you can download all of the latest songs that you hear on the radio for free. If you use this website for this purpose, you will be violating which of the following: 

    • A.

      Fair use.

    • B.

      Right to privacy.

    • C.

      Copyright.

    • D.

      Freedom of Information.

    Correct Answer
    C. Copyright.
    Explanation
    Using a website to download songs for free that are protected by copyright would be a violation of copyright law. Copyright grants exclusive rights to the creators of original works, such as songs, and allows them to control the distribution and reproduction of their work. Downloading copyrighted songs without permission or payment infringes upon the rights of the artists and the owners of the songs.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 28, 2013
    Quiz Created by
    Freitagc
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.