1.
A predator online who pretends to be a friend and tries to meet you in person is known as:
Correct Answer
C. Cybergrooming
Explanation
Cybergrooming refers to the act of an online predator who pretends to be a friend in order to establish a relationship with the intention of meeting the victim in person. This behavior is a form of online manipulation where the predator gains the trust of the victim before exploiting them offline. It is important to be aware of this type of online threat and take necessary precautions to protect oneself from such predators.
2.
A predator online who goes through all your details on the internet to find you is called:
Correct Answer
B. Cyberstalking
Explanation
Cyberstalking refers to the act of an online predator who meticulously searches and gathers personal information about an individual on the internet with the intention of locating and potentially harming them. This behavior involves persistent and unwanted attention, often leading to fear and distress for the victim. It is important to be aware of cyberstalking and take necessary precautions to protect oneself online.
3.
Being sent SMS, email or online groups message threatening and teasing you is called:
Correct Answer
A. Cyberbullying
Explanation
Cyberbullying refers to the act of sending threatening or teasing messages through SMS, email, or online groups. It involves the use of technology to harass, intimidate, or humiliate someone. This can include sending abusive or derogatory messages, spreading rumors, or sharing embarrassing photos or videos. Cyberbullying can have serious emotional and psychological effects on the victim, and it is important to address and report such behavior to ensure the safety and well-being of individuals online.
4.
Someone sends you a message threatening they are going to kill you. What do you do?
Correct Answer
C. Show it to parents/police
Explanation
The correct answer is to show the threatening message to parents or the police. This is the most appropriate action to take when receiving a serious threat. By involving trusted adults or authorities, they can assess the situation, provide guidance, and take necessary steps to ensure your safety. Ignoring or deleting the message may not address the potential danger and could put you at risk. Replying back to the sender might escalate the situation further.
5.
What ONE of the following is OK to put online?
Correct Answer
A. Your first name
Explanation
It is generally considered safe to put your first name online as it is a common practice and does not reveal too much personal information. Providing your first name allows others to address you without compromising your privacy or security. However, sharing your full name, phone number, or address online can potentially lead to identity theft, harassment, or other security risks. It is important to be cautious and mindful of the information we share online to protect ourselves.
6.
What ONE of the following is OK to put online?
Correct Answer
D. A pHoto of yourself inside someone's house
Explanation
A photo of yourself inside someone's house may be considered acceptable to put online because it does not reveal any personal or sensitive information about yourself or others. However, it is important to consider the privacy of the person whose house it is and obtain their consent before posting such a photo.
7.
The internet is made up of:
Correct Answer
D. Computers and Servers
Explanation
The internet is made up of computers and servers. Computers are the devices that individuals use to access the internet, while servers are powerful computers that store and distribute information across the internet. Servers handle requests from computers, store website data, and facilitate communication between different devices. Without servers, the internet would not be able to function as it does, allowing users to access and share information globally.
8.
A firewall:
Correct Answer
B. Stops certain websites and information being uploaded/downloaded
Explanation
A firewall is a security measure that prevents unauthorized access to a computer or network. It acts as a barrier between the internal network and the external network (usually the internet), monitoring and controlling incoming and outgoing network traffic. By stopping certain websites and information from being uploaded or downloaded, a firewall helps to protect the computer or network from potential threats, such as malware, hackers, or unauthorized data transfers.
9.
ISP stands for:
Correct Answer
C. Internet Service Provider
Explanation
An ISP, or Internet Service Provider, is a company that provides internet access to individuals and businesses. They offer various types of internet connections, such as dial-up, DSL, cable, or fiber optic, and typically charge a monthly fee for their services. ISPs also offer additional services like email accounts, web hosting, and virtual private networks (VPNs). They play a crucial role in connecting users to the internet and enabling them to access websites, send emails, stream videos, and perform other online activities.
10.
To save Pivot animations into a format you can import into Windows Movie Maker, you save it as a:
Correct Answer
B. .gif file
Explanation
To save Pivot animations into a format that can be imported into Windows Movie Maker, you would save it as a .gif file. The .gif file format is commonly used for animations and supports multiple frames, making it suitable for saving Pivot animations.
11.
When finishing your movie, to get it suitable for YouTube, you need to use the video setting:
Correct Answer
C. Video for Broadband (512)
Explanation
To make a movie suitable for YouTube, the correct video setting to use is "Video for Broadband (512)". This setting ensures that the video is optimized for streaming on the internet and is compatible with YouTube's platform. It is specifically designed for broadband connections and provides a balance between video quality and file size, making it ideal for online video sharing.
12.
Pivot crashes a lot. :( Stupid Pivot. What can you do to reduce losing work?
Correct Answer
D. All of the above
Explanation
The best way to reduce losing work in Pivot is to follow all of the given options. Saving copies on your USB or Y:/ ensures that you have backup copies of your work in case of crashes. Keeping animations small helps to minimize the chances of crashes. Making new pivot files for different scenes allows you to work on separate files, reducing the risk of losing all your progress if one file crashes. By following all of these options, you can effectively reduce the chances of losing work in Pivot.
13.
What can you do if you are cyberbullied?
Correct Answer
C. Tell your parents/school
Explanation
If you are cyberbullied, it is important to tell your parents or school about the situation. They can provide support and guidance on how to handle the situation effectively. Ignoring the cyberbullying may not make it go away and could potentially escalate the problem. Fighting the cyberbullies or cyberbullying them back is not a recommended solution as it could lead to further harm and legal consequences. Seeking help from trusted adults is the best way to address cyberbullying and ensure your safety.
14.
How do you prevent being CYBERSTALKED?
Correct Answer
C. Don't put any personal information about yourself online
Explanation
The best way to prevent being cyberstalked is to not put any personal information about yourself online. Cyberstalkers often gather personal information from social media profiles, online forums, or other websites, which they then use to harass or stalk their victims. By refraining from sharing personal details such as your full name, address, phone number, or specific location, you can minimize the risk of becoming a target for cyberstalkers. It is crucial to maintain privacy and be cautious about what information you share on the internet to protect yourself from potential harm.
15.
What kind of animation is Pivot?
Correct Answer
B. 2D
Explanation
Pivot is a type of 2D animation. This means that the animation is created using two-dimensional graphics, such as drawings or images, and is displayed on a two-dimensional plane. Unlike 3D animation, which creates a sense of depth and realism, 2D animation focuses on creating movement and storytelling using flat, two-dimensional visuals. Pivot is a popular software used for creating simple stick figure animations, where characters are represented by basic lines and shapes.
16.
What do you need to reduce getting viruses or hacked into?
Correct Answer
D. All of the above
Explanation
To reduce the risk of getting viruses or being hacked, it is important to have multiple layers of protection. Antivirus software helps detect and remove viruses, antimalware software protects against malicious software, and a firewall acts as a barrier between a computer network and external threats. By having all of these measures in place, the chances of getting viruses or being hacked are significantly reduced.
17.
Netspace is a:
Correct Answer
B. ISP
Explanation
Netspace is an ISP (Internet Service Provider). ISPs are companies that provide internet access to customers, allowing them to connect to the internet through various means such as dial-up, DSL, cable, or fiber optic. They offer services like internet connectivity, email, web hosting, and more. Netspace, in this context, refers to a specific ISP that provides internet services to its customers.
18.
What is blocking Facebook at school?
Correct Answer
B. The ISP's Firewall
Explanation
The correct answer is "The ISP's Firewall." The ISP's Firewall refers to the internet service provider's firewall, which is a security measure put in place by the ISP to block certain websites or content. In this case, it is blocking Facebook at school, indicating that the ISP has implemented restrictions on accessing Facebook through their network.
19.
What is the shortcut key for paste?
Correct Answer
B. CTRL + V
Explanation
The shortcut key for paste is CTRL + V. This combination of keys allows the user to paste copied or cut content into a document or application. The "CTRL" key is commonly used in keyboard shortcuts to perform various actions, and the "V" key is specifically associated with the paste function. By pressing these keys simultaneously, the user can quickly and easily paste content without the need to navigate through menus or use the mouse.
20.
When inserting YouTube into PowerPoint, which two things do you do to the link?
Correct Answer
A. Remove "watch?" and replace "=" with "/"
Explanation
To insert a YouTube video into PowerPoint, you need to modify the link by removing "watch?" and replacing "=" with "/". This is because the YouTube link format includes a "watch?" parameter followed by the video ID, which needs to be changed to "/embed/" in order to embed the video correctly. The "=" sign is replaced with "/" to separate the video ID from the rest of the link. By making these modifications, the YouTube video will be properly inserted into the PowerPoint presentation.
21.
Which of these computer parts stores all your files?
Correct Answer
C. Hard disk
Explanation
The hard disk is the computer part that stores all your files. It is a non-volatile storage device that retains data even when the computer is turned off. Unlike RAM, which is volatile and temporary, the hard disk provides long-term storage for files, programs, and operating systems. The CPU and motherboard are essential components of a computer but do not directly store files.