1.
The name that you select to identify yourself in e-mail,chats,etc. is called:
Correct Answer
B. Screen name
Explanation
A screen name is the name that an individual chooses to use when identifying themselves in online platforms such as email and chats. It is a pseudonym or alias that allows individuals to maintain a level of anonymity while still being able to communicate with others. Unlike a first and last name, a screen name does not necessarily reveal a person's true identity and can be customized to reflect their personal preferences or interests.
2.
All of the following are examples of inappropriate screen names EXCEPT:
Correct Answer
C. Funnyface
Explanation
The given options are all screen names, but only "funnyface" does not appear to be inappropriate. While the other options include personal information or suggestive language, "funnyface" is a more neutral and lighthearted choice for a screen name.
3.
A good password should:
Correct Answer
D. Be lengthly, at least eight characters.
Explanation
A good password should be lengthy, at least eight characters, because longer passwords are generally more secure than shorter ones. They provide a larger pool of possible combinations, making it harder for hackers to guess or crack the password. This increases the overall security of the account or system being protected.
4.
All are ways that a predator tries to "groom" their victim EXCEPT:
Correct Answer
C. Never asks to meet in person
Explanation
The given options describe different tactics used by predators to groom their victims. Building trust, making threats, and asking the victim to keep the relationship a secret are all ways predators manipulate their victims. However, the option "never asks to meet in person" does not align with typical grooming behavior. Predators often try to establish physical contact with their victims as part of their grooming process. Therefore, this option is the exception and does not fit the pattern of grooming behavior.
5.
Another name commonly used for junk email is:
Correct Answer
C. Spam
Explanation
Spam is the correct answer because it is a commonly used term for junk email. Spam refers to unsolicited and unwanted emails that are sent in bulk to a large number of recipients. It is often used for advertising purposes or to spread malware. The term "spam" originated from a Monty Python sketch where the word was repetitively used, similar to how unwanted emails can flood an inbox.
6.
Whish of the following is not one of the four "R"s of online safety?
Correct Answer
C. Redirect
Explanation
The four "R"s of online safety are Recognize, Refuse, Respond, and Report. Redirect is not one of the four "R"s of online safety. Redirecting refers to redirecting or forwarding a user to a different website or webpage, which is not directly related to online safety practices.
7.
Anyone met online is:
Correct Answer
C. A stranger.
Explanation
The correct answer is a stranger because meeting someone online does not automatically make them a friend or someone you can confide in. It is important to be cautious and recognize that online interactions can often involve individuals who are unknown and unfamiliar. Therefore, it is crucial to exercise caution and not immediately trust or share personal information with someone met online.
8.
Predators can be a friends if you get to know them.
Correct Answer
B. False
Explanation
The statement suggests that predators can be friends if you get to know them. However, this is not true. Predators are animals that hunt and kill other animals for food. While it is possible to have a mutual understanding or respect for predators in certain situations, they are ultimately driven by their instinct to hunt and survive. Therefore, it is not accurate to say that predators can be friends.
9.
Which is NOT an example of Cyberbullying?
Correct Answer
C. Calling someone names during recess
Explanation
Calling someone names during recess is not an example of cyberbullying because it does not involve the use of electronic communication or technology. Cyberbullying refers to the act of using digital devices or platforms to harass, intimidate, or harm others. Sending harassing messages, posting someone else's personal information, and posting private or doctored pictures about another person are all examples of cyberbullying as they involve the use of technology to target and harm someone.
10.
______________ refers to a set of unwritten rules for social interactions on the Internet.
Correct Answer
B. Netiquette
Explanation
Netiquette refers to a set of unwritten rules for social interactions on the Internet. It encompasses proper online behavior, such as being polite, respectful, and considerate towards others. Netiquette guides individuals on how to communicate effectively in online forums, chat rooms, social media platforms, and email. It promotes a positive and inclusive online environment by discouraging spamming, trolling, cyberbullying, and other disruptive behaviors. Following netiquette ensures that online interactions are productive, respectful, and enjoyable for all participants.
11.
You can help prevent viruses by:
Correct Answer
B. Using antivirus software
Explanation
Using antivirus software is an effective measure to prevent viruses. Antivirus software is specifically designed to detect and eliminate viruses, malware, and other malicious threats from a computer system. It scans files and programs, identifies potential threats, and removes them before they can cause harm. By regularly updating and running antivirus software, users can significantly reduce the risk of their devices being infected by viruses.
12.
You receive the following email:
You have been chosen by the Chase Manhattan Bank online department to take part in our quick and easy 5 question survey. In return we will credit $20 to your account - Just for your time! Helping us better understand how our customers feel benefits everyone.
This is an example of......
Correct Answer
B. Spam
Explanation
This email is an example of spam because it is unsolicited and attempts to deceive the recipient into providing personal information or taking part in a survey for a monetary reward. The mention of a well-known bank like Chase Manhattan Bank is likely a tactic to gain the recipient's trust and make them more likely to engage with the email. However, legitimate banks typically do not send unsolicited emails offering monetary rewards for participating in surveys.
13.
Copy and pasting information from the internet into papers and projects is plagiarism.
Correct Answer
A. True
Explanation
Copying and pasting information from the internet into papers and projects without proper citation or acknowledgement is considered plagiarism. Plagiarism is the act of presenting someone else's work or ideas as your own, which is a serious academic offense. To avoid plagiarism, it is important to properly cite and give credit to the original source of information.