1.
What percentage of youths age 10-17 post personal information online?
Correct Answer
A. 56%
Explanation
Approximately 56% of youths between the ages of 10 and 17 post personal information online. This suggests that a significant majority of young individuals in this age group are actively sharing personal information on the internet. It highlights the need for education and awareness regarding online privacy and safety, as posting personal information can potentially expose them to various risks such as identity theft, cyberbullying, and online predators.
2.
What kind of activities to youth between the ages of 10-17 engage in on line?
Correct Answer
E. All of the above
Explanation
The correct answer is "All of the above" because youth between the ages of 10-17 engage in various activities online, including social networking, chat rooms, file sharing, and online gaming. This age group is highly active on social media platforms, connecting with friends and peers. They also participate in chat rooms to communicate with others who share similar interests. File sharing allows them to exchange files, such as music or videos, with others. Additionally, online gaming is popular among this age group, offering entertainment and opportunities for social interaction.
3.
What is one of the basic online safety rules?
Correct Answer
C. Follow the guidelines set by your parents and guardians.
Explanation
The correct answer is "Follow the guidelines set by your parents and guardians." This answer is the most appropriate because it emphasizes the importance of obeying the rules and instructions given by trusted adults. Parents and guardians are responsible for ensuring the safety of their children online, and following their guidelines helps to protect against potential risks and dangers. It promotes responsible internet usage and encourages children to seek guidance from trusted adults when navigating the online world.
4.
When should you stop communicating with someone online?
Correct Answer
D. B and C only
Explanation
The correct answer is B and C only. This means that you should stop communicating with someone online when they ask you for personal information and when they want to meet you in person. These actions can potentially be dangerous and may put your safety and privacy at risk. It is important to prioritize your personal safety and be cautious when interacting with strangers online.
5.
In the video "Julie's Journey" what was the consequence of her online relationship?
Correct Answer
B. She ran away from home.
Explanation
In the video "Julie's Journey," the consequence of her online relationship was that she ran away from home. This suggests that her online relationship had a negative impact on her life, leading her to make the decision to leave her home. The fact that she ran away indicates that the situation became difficult or dangerous for her, prompting her to take such drastic action.
6.
All but which of the following is an example of "grooming"?
Correct Answer
C. Purchase hygiene products for you.
Explanation
The act of purchasing hygiene products for someone is not an example of grooming. Grooming refers to manipulative behavior used by abusers to establish control and build a relationship with their victims. Encouraging secrecy, isolating from loved ones, and making threats are all tactics commonly used in grooming. However, purchasing hygiene products does not fit into this pattern of manipulation and control.
7.
Who can you trust online?
Correct Answer
B. Someone who you know personally offline
Explanation
The answer suggests that the person you can trust online is someone who you know personally offline. This is because offline relationships are typically built on trust and familiarity, whereas online relationships can be more easily manipulated or misrepresented. Knowing someone in person provides a higher level of assurance and reduces the risk of interacting with potentially untrustworthy individuals online.
8.
Birthday, School Name, Address, and Pictures are examples of what?
Correct Answer
A. Too much information
Explanation
The given examples of Birthday, School Name, Address, and Pictures can be considered as too much information. This is because sharing personal details like birthday, school name, address, and pictures can potentially compromise one's privacy and security. It is important to be cautious about sharing such information online to protect oneself from potential risks.
9.
In the video "Everyone Knows Your Name", what lesson does Sarah learn?
Correct Answer
D. You may not want everything you post to be seen
Explanation
Sarah learns the lesson that she may not want everything she posts to be seen. This implies that she realizes the importance of being cautious about what she shares online and the potential consequences of making everything public. It highlights the need for privacy and the understanding that not everything needs to be shared with the entire online community.
10.
Cyber bullying includes all but which of the following:
Correct Answer
D. Visiting someone's profile page
Explanation
Visiting someone's profile page is not considered cyber bullying because it does not involve any harmful or malicious actions towards the person. Cyber bullying typically involves activities such as stealing passwords, posting unauthorized pictures, and spreading rumors, which are all intended to harass, intimidate, or harm someone online. Simply visiting someone's profile page does not fall under these categories and therefore is not considered cyber bullying.