1.
When targeting victims, dangerous criminals disguise their identities on social network sites.
Correct Answer
A. True
Explanation
Dangerous criminals often disguise their identities on social network sites when targeting victims. This allows them to hide their true intentions and gain the trust of potential victims. By pretending to be someone else or creating fake profiles, they can manipulate and deceive individuals, making it easier for them to carry out their harmful actions. Therefore, the statement "When targeting victims, dangerous criminals disguise their identities on social network sites" is true.
2.
Online postings can last for
Correct Answer
C. Both a. and b.
Explanation
Online postings can last for years because once something is posted online, it can remain accessible for a long period of time, unless it is intentionally deleted or removed. Additionally, online platforms and websites often have mechanisms in place to store and archive content, ensuring that it remains available even after a significant amount of time has passed. This means that online postings can potentially remain accessible for decades or even longer, making the answer "both a. and b." correct.
3.
As a precaution, you should make sure your chat room handle or IM screen name makes it easy to determine your real name.
Correct Answer
B. False
Explanation
It is not necessary to make sure your chat room handle or IM screen name makes it easy to determine your real name. In fact, it is generally recommended to use a pseudonym or a username that does not reveal personal information to protect your privacy and security online. Using a different name can help prevent identity theft or unwanted attention from strangers.
4.
Phishing scams target people who eat fish regularly.
Correct Answer
B. False
Explanation
The statement is false because phishing scams have nothing to do with the dietary habits of individuals. Phishing scams are fraudulent attempts to deceive people into revealing sensitive information, such as passwords or credit card numbers, usually through emails, websites, or messages that appear to be from reputable sources. These scams target anyone who uses the internet, regardless of their dietary preferences.
5.
If a cyberbully message contains a threat, you should
Correct Answer
A. Talk to a parent or school counselor.
Explanation
If a cyberbully message contains a threat, it is important to talk to a parent or school counselor. This is the correct answer because threats should always be taken seriously and reported to a trusted adult who can provide guidance and support. Ignoring the threat may not address the issue and could potentially allow the situation to escalate. Sending the threat back is not advisable as it may further aggravate the situation and potentially put oneself at risk. Seeking help from a parent or school counselor is the most appropriate action to ensure one's safety and well-being.
6.
An important safety precaution you can take when buying something online and are on the checkout page is
Correct Answer
C. Both a. and b.
Explanation
Both a. and b. are important safety precautions to take when buying something online and are on the checkout page. Looking for "https" in the browser indicates that the website has a secure connection, which helps protect your personal and financial information from being intercepted by hackers. Additionally, looking for a lock icon signifies that the website has a valid SSL certificate, further ensuring that your data is encrypted and secure. By checking for both of these indicators, you can have more confidence that your online transaction is safe.
7.
Three online precautions you can take to keep dangerous persons from learning your name are
Correct Answer(s)
A. Change any of your handles if they give too many clues about your identity
B. Limit access to your social network page
C. Never email your picture
Explanation
The given answer suggests three online precautions that can help in keeping dangerous persons from learning your name. The first precaution is to change any of your handles if they give too many clues about your identity. This means that if your online usernames or handles reveal personal information or can be easily linked to your real identity, it is advisable to change them to something less revealing. The second precaution is to limit access to your social network page. This implies that you should adjust your privacy settings on social media platforms to restrict who can view your profile and personal information. The third precaution is to never email your picture. This means that you should avoid sending pictures of yourself via email, as it can potentially be misused or used to identify you. By following these precautions, you can minimize the risk of dangerous individuals learning your name and personal information online.
8.
What was Lily Mandelli’s mistake?
Correct Answer(s)
A. She emailed her picture to an online acquaintance
C. Lily's handle revealed too much information about herself.
Explanation
Lily Mandelli made two mistakes. First, she emailed her picture to an online acquaintance, which can be risky as it may lead to misuse of the picture or invasion of privacy. Second, her handle revealed too much information about herself, which can make her vulnerable to identity theft or other online threats.