1.
What is cyberbullying?
Correct Answer
B. Bullying through emails, IM, websites, cell pHone, etc.
Explanation
Cyberbullying refers to the act of bullying that takes place through electronic means such as emails, instant messaging, websites, and cell phones. It involves using technology to harass, intimidate, or harm someone, often repeatedly and intentionally. Unlike traditional bullying which may occur in physical locations like playgrounds or bus stops, cyberbullying occurs in the virtual world, making it easier for the perpetrator to remain anonymous and for the victim to be targeted 24/7. This form of bullying can have severe psychological and emotional effects on the victim.
2.
What are Proper Rules for the Internet called?
Correct Answer
C. Netiquette
Explanation
Netiquette refers to the proper rules and guidelines for behavior and communication on the internet. It encompasses various aspects of online etiquette, such as being polite, respectful, and considerate towards others while using online platforms. Netiquette helps to create a positive and harmonious online environment by promoting good manners and responsible online behavior. "Proper Rules for the Internet" and "Internet Politeness" are not commonly used terms to refer to the concept of netiquette.
3.
What is "grooming"?
Correct Answer
C. When someone tries to become your friend online.
Explanation
Grooming refers to the process where an individual, usually an adult, builds an emotional connection with a child or young person online with the intention of gaining their trust and potentially exploiting them. This can involve pretending to be someone else, manipulating the child into sharing personal information or engaging in inappropriate activities. It is important for individuals, especially children, to be aware of the dangers of online grooming and take necessary precautions to protect themselves.
4.
Who can you trust online?
Correct Answer
B. Someone you know well offline.
Explanation
The correct answer is someone you know well offline. This is because offline relationships are typically built on trust and familiarity, whereas online relationships can be more easily manipulated or misrepresented. Knowing someone well offline means that you have had the opportunity to establish trust and gauge their character in person, making them a more reliable source of trust online.
5.
Birthday, school name, full name, phone number are all examples of:
Correct Answer
A. Too much online personal information.
Explanation
The given correct answer is "Too much online personal information." This is because birthday, school name, full name, and phone number are all examples of personal information that should not be shared freely online. Revealing such details can pose a risk to one's privacy and security, as they can be exploited by malicious individuals for identity theft or other harmful activities. It is important to be cautious and mindful of the information we share online to protect ourselves from potential risks.
6.
What is "flaming"?
Correct Answer
C. Online fights using electronic messaging.
Explanation
Flaming refers to engaging in online fights using electronic messaging. This involves sending mean, nasty, and insulting messages to others on the internet. It is a form of aggressive behavior where individuals attack and provoke others with offensive language and personal attacks in online discussions or forums. This can lead to heated arguments and a hostile online environment.
7.
Which is the best way to protect yourself when on MySpace or Facebook?
Correct Answer
C. Use the privacy settings.
Explanation
Using the privacy settings is the best way to protect yourself when on MySpace or Facebook. By adjusting the privacy settings, you can control who can see your posts, personal information, and photos. This allows you to limit the visibility of your content to only your friends or a select group of people, reducing the risk of strangers accessing your information or using it against you. It is important to be cautious about what you post online, but utilizing privacy settings adds an extra layer of protection to ensure your personal information remains secure.
8.
Which of the following personal information is okay to put online?
Correct Answer
C. Your favorite food
Explanation
It is okay to put your favorite food online because it is a personal preference and does not reveal any sensitive or personally identifiable information. Sharing your full name, school, or birthdate online can potentially compromise your privacy and put you at risk of identity theft or other harmful consequences. Therefore, it is advised to refrain from sharing such personal information online.
9.
True or False: It is okay to download or print a single copy of copyright material for your own use.
Correct Answer
A. True
Explanation
It is okay to download or print a single copy of copyright material for your own use. This is because copyright law typically allows for the fair use of copyrighted materials for personal use. However, it is important to note that distributing or sharing copyrighted material without permission is generally illegal.
10.
Which of the following would provide the strongest password?
Correct Answer
B. A mix of letters, numbers or symbols.
Explanation
A mix of letters, numbers, or symbols would provide the strongest password because it increases the complexity and makes it harder for hackers to guess or crack. Using personal information like birthdate, pet's name, or screen name can be easily guessed or obtained through social engineering. However, a combination of letters, numbers, and symbols creates a more random and unique password that is harder to guess or crack using brute force methods.
11.
Facebook, MySpace, Twitter are examples of:
Correct Answer
B. Social Networking
Explanation
Facebook, MySpace, and Twitter are all examples of social networking platforms. These websites allow users to create profiles, connect with friends, and share information, photos, and updates with their network. Users can also join groups, participate in discussions, and interact with others through comments and messages. Social networking platforms have become popular for both personal and professional use, providing a means for people to stay connected, share interests, and engage with others online.
12.
All of the following are things to do about a cyberbully EXCEPT:
Correct Answer
B. Respond the the bully and make threats.
Explanation
The correct answer is "Respond to the bully and make threats." This option is not a recommended action to take when dealing with a cyberbully. Responding to the bully and making threats can escalate the situation and potentially make it worse. It is important to avoid engaging with the bully and instead focus on seeking help from a trusted adult, saving evidence of the bullying, and not responding to the bully's messages.
13.
Which of the following probably gives the most accurate data about "atoms"?
Correct Answer
B. Www.wextoncollege.edu/science/atoms
Explanation
The website www.wextoncollege.edu/science/atoms is likely to provide the most accurate data about "atoms" because it is a specific educational institution's website that focuses on science and specifically mentions atoms in the URL. This suggests that the website is dedicated to providing credible and reliable information about atoms.
14.
What things should you look for on a website to determine if the data is appropriate or accurate?
Correct Answer
D. All of the above.
Explanation
To determine if the data on a website is appropriate or accurate, it is important to look for the contributor or author's name, the date when the data was last updated, and an email address. The contributor or author's name helps establish credibility and expertise, while the date of the last update ensures that the information is current and relevant. Additionally, an email address allows users to contact the website owner for further clarification or verification. Considering all of these factors together helps to ensure the accuracy and appropriateness of the data on a website.
15.
Your parents (or you) have received an email from their (your) bank saying there is a problem with their (your) account. Instructions say to click on the link in the email and enter their (your) username and password to solve the problem. This is an example of:
Correct Answer
C. pHishing
Explanation
This scenario is an example of phishing. Phishing is a fraudulent activity where scammers impersonate a legitimate institution, such as a bank, to deceive individuals into providing sensitive information like usernames and passwords. In this case, the email instructs the recipient to click on a link and enter their account credentials, which is a common tactic used by phishers to gain unauthorized access to personal information and commit identity theft. It is important to be cautious and never provide sensitive information in response to unsolicited emails or messages.
16.
If you or someone else posts something about you online, it will probably go away:
Correct Answer
E. Never
Explanation
Once something is posted online, it becomes part of the digital world and can be difficult to completely erase. Even if you delete it, there is a possibility that it has already been saved or shared by someone else. Additionally, online content can be archived or indexed by search engines, making it accessible even after a long period of time. Therefore, it is unlikely that something posted online will ever completely go away.
17.
What is SPAM?
Correct Answer
B. Unwanted email.
Explanation
SPAM refers to unwanted email that is typically sent in bulk to a large number of recipients. It often contains unsolicited advertisements or promotional messages. This type of email is considered spam because it is sent without the consent of the recipients and is usually irrelevant or unwanted. Spam emails can be a nuisance and may also pose security risks, such as phishing attempts or the spread of malware.
18.
How should you stop communicating with someone online?Click all the apply.
Correct Answer(s)
A. The person asks for personal information.
B. The person asks to meet in person.
C. The person asks you to keep secrets.
E. The person sends you inappropriate pictures or messages.
Explanation
When communicating with someone online, it is important to be cautious and protect your personal information. If the person asks for personal information, it is a red flag and a sign that you should stop communicating with them. Similarly, if the person asks to meet in person, it can be a potential danger and it is best to end the communication. Additionally, if the person asks you to keep secrets or sends you inappropriate pictures or messages, it is important to cut off communication with them to ensure your safety and well-being.
19.
What per cent of teenagers report they have been contacted by a potential predator?
Correct Answer
B. 20
Explanation
The correct answer is 20. This means that 20% of teenagers report that they have been contacted by a potential predator. This suggests that a significant portion of teenagers have experienced this concerning and dangerous situation. It highlights the need for education and awareness about online safety and the potential risks that teenagers face when using the internet.
20.
Who are the most likely targets of on line predators?
Correct Answer
B. Teenage girls
Explanation
Teenage girls are the most likely targets of online predators because they are often perceived as more vulnerable and easily manipulated. Predators may exploit their curiosity, naivety, and desire for attention or validation. Additionally, teenage girls are more likely to engage in online activities such as social media, online gaming, and chat rooms, making them more accessible to predators. The anonymity of the internet allows predators to create fake identities and establish relationships with unsuspecting victims, putting teenage girls at higher risk.