1.
Cyberbullying generally doesn't involve physical violence. What does physical mean in this case?
Correct Answer
B. Body-related
Explanation
In this case, "physical" refers to actions or behaviors that involve the body. Cyberbullying typically involves harmful and aggressive actions that are carried out online or through digital means, such as sending threatening messages or sharing embarrassing photos. These actions do not involve physical violence, such as hitting or physically harming someone. Therefore, "body-related" is the most appropriate explanation for the term "physical" in the context of cyberbullying.
2.
Which of the following text messages would most likely be an example of cyberbullying?
Correct Answer
C. Don't tell Rita about Tim's party
Explanation
The text message "Don't tell Rita about Tim's party" would most likely be an example of cyberbullying because it involves excluding someone from an event intentionally. This exclusion can be seen as a form of bullying, as it may cause the person to feel left out or isolated.
3.
Which of the following is a factual statement about cyberbullying?
Correct Answer
D. Cyberbullying can make people feel bad
Explanation
The statement "Cyberbullying can make people feel bad" is a factual statement about cyberbullying because it acknowledges the emotional impact it can have on individuals. It does not make any subjective claims or opinions, but rather states a commonly recognized consequence of cyberbullying.
4.
Over a few days, you receive a series of insulting IMs from someone at school. Which sequence of actions is the best response?
Correct Answer
C. Ignore/delete the first IM: save/print any further IMs; tell a parent or other adult you trust.
Explanation
The best response in this situation is to ignore/delete the first insulting IM, but save/print any further IMs as evidence. It is important to involve a trusted adult, such as a parent or school counselor, who can provide support and guidance in dealing with the situation. Additionally, it may be necessary to report the issue to the IM host and seek their assistance in addressing the bullying behavior. By taking these actions, the victim can gather evidence, seek help, and potentially put an end to the insulting IMs.
5.
What can you infer from the fact that people are more likely to say mean things online then in person?
Correct Answer
D. Being anonymous can make some people forget their manners
Explanation
Being anonymous can make some people forget their manners. This means that when people are not identifiable online, they may feel less accountable for their actions and words, leading them to behave in a way that they wouldn't in person. Anonymity can provide a sense of detachment and freedom from consequences, which can result in individuals saying mean things online that they would not say face-to-face.
6.
Why should you never send emails, texts, or IMs when you are angry or upset
Correct Answer
A. You may not have the best judgement when your emotions are running high
Explanation
When you are angry or upset, your emotions can cloud your judgment and impair your ability to think rationally. This can lead to saying things you may regret later or making impulsive decisions. By sending emails, texts, or IMs in this state, you risk damaging relationships or creating unnecessary conflicts. It is important to wait until you have calmed down and regained control over your emotions before engaging in any form of communication. This allows you to approach the situation with a clear mind and make more rational decisions.
7.
What's the best way to prove that you've been a victim of cyberbullying?
Correct Answer
C. Saving screenshots of instances of instances where you've been harasssed
Explanation
The best way to prove that you've been a victim of cyberbullying is by saving screenshots of instances where you've been harassed. This evidence can be used to show the nature and extent of the bullying, making it easier to report and take action against the cyberbully. By having concrete proof, it becomes more difficult for the bully to deny their actions, and it provides a clear record of the harassment that can be shown to authorities or trusted adults for support and intervention.
8.
Why is ignoring a mean email usually the first best response?
Correct Answer
B. It frustrates cyberbullies' desire for an emotional response
Explanation
Ignoring a mean email is usually the first best response because it frustrates cyberbullies' desire for an emotional response. Cyberbullies often send mean emails to provoke a reaction and derive satisfaction from the victim's emotional distress. By not responding, the victim denies the cyberbully the satisfaction they seek, potentially discouraging further bullying behavior. Additionally, responding to a mean email could escalate the situation or even lead to the victim being accused of cyberbullying as well.
9.
What do cyberbullies have in common with regular bullies?
Correct Answer
D. They both end up hurting people
Explanation
Cyberbullies and regular bullies have the commonality of both ending up hurting people. This means that regardless of the medium they use to bully others, whether it be online or in person, both types of bullies cause harm and distress to their victims. It is important to address and combat bullying in all its forms to create a safe and inclusive environment for everyone.
10.
On its own, which of the following is most likely an example of plagiarism ?
Correct Answer
C. Forgetting to include a bibliograpHy at the end of your paper
Explanation
Forgetting to include a bibliography at the end of your paper is most likely an example of plagiarism because it fails to give proper credit to the original sources used in the research. A bibliography is essential in academic writing as it allows readers to locate and verify the information presented in the paper. When a bibliography is omitted, it gives the impression that the ideas and information presented are the writer's original work, which is a form of plagiarism.
11.
How might you classify copying and pasting a paragraph from a website into a school assignment? Choose the best answer,
Correct Answer
D. Stealing
Explanation
Copying and pasting a paragraph from a website into a school assignment can be classified as "stealing" because it involves taking someone else's work without giving proper credit or acknowledging the original source. This act is considered plagiarism and goes against academic integrity, as it implies claiming someone else's ideas or words as one's own.
12.
It's often said that plagiarizing is like cheating yourself.
Why is this?
Correct Answer
D. You loose the opportunity to practice critical thinking and writing skills
Explanation
By plagiarizing, you are essentially taking someone else's work and presenting it as your own. This means that you are not putting in the effort to think critically and develop your own ideas. Writing is a skill that is developed through practice, and by plagiarizing, you are depriving yourself of the opportunity to improve your writing abilities. Additionally, critical thinking skills are essential for analyzing information, making connections, and forming original thoughts. By plagiarizing, you are cheating yourself out of the chance to enhance these important skills.
13.
Why is paraphrasing a good way to avoid plagiarizing a source?
Correct Answer
B. It shows your readers you have a firm grasp of the subject
Explanation
Paraphrasing is a good way to avoid plagiarizing a source because it demonstrates that you have a deep understanding of the subject matter. By rephrasing the original source in your own words, you are able to convey the information in a way that shows your comprehension and interpretation. This not only avoids copying someone else's work, but also showcases your ability to synthesize and articulate ideas. It is a way of demonstrating your knowledge and expertise on the topic to your readers.
14.
What's the best way to quote online resources without plagiarizing?
Correct Answer
D. Citing all your online resources with proper attribution
Explanation
The best way to quote online resources without plagiarizing is by citing all your online resources with proper attribution. This means acknowledging the original source of the information and giving credit to the author or website. By doing so, you are showing respect for intellectual property and avoiding any accusations of plagiarism.
15.
Keeping your personal information a secret online is a wise policy. In the preceding sentence, what does "policy" mean?
Correct Answer
D. General plan
Explanation
In the given sentence, the word "policy" refers to a general plan. It implies that keeping personal information confidential while using the internet is a wise approach or strategy.
16.
If you're confronted by a difficult situation online, and you don't know exactly how to handle it, what should you do?
Correct Answer
D. Tell an adult you trust
Explanation
In difficult situations online, it is important to seek guidance from a trusted adult. This is because adults have more experience and knowledge to handle such situations effectively. They can provide valuable advice, support, and help in resolving the issue safely. Turning off the computer or making an educated guess may not be the best approach as it does not address the problem directly. Asking an online friend for help may not be reliable as they may not have the necessary expertise or may not always have the best intentions.
17.
You receive the following text from a number you don't recognize
Meet me near the library water fountain
What's the best response ?
Correct Answer
C. Don't respond and tell your parents
Explanation
The best response is to not respond and tell your parents because receiving a text from an unknown number and being asked to meet someone near a specific location can be potentially dangerous. It is important to prioritize personal safety and involve trusted adults, such as parents, who can help assess the situation and take appropriate action if necessary.
18.
Why do you need to be more cautious with friends you meet online than with the friends you meet at school?
Correct Answer
C. Online, it's more difficult to tell if a person is who he says he is
Explanation
When interacting with friends online, it is more difficult to verify their true identity compared to friends met at school. Online, people can create fake personas or hide their true intentions, making it harder to trust them. In the real world, one can rely on physical cues, body language, and personal interactions to gauge a person's authenticity. However, online friendships lack these cues, making it necessary to exercise caution and be more skeptical about the true identity and intentions of individuals met on the internet.
19.
Which word best describes how you should proceed with a new online friend?
Correct Answer
B. Cautiously
Explanation
When proceeding with a new online friend, it is important to be cautious. This means being careful and vigilant in order to protect oneself from potential risks or harm. It is crucial to exercise caution when interacting with someone online, as their true intentions may not always be clear. Being cautious involves taking steps to verify the person's identity, setting boundaries, and being mindful of sharing personal information. It is important to proceed with a new online friend cautiously to ensure one's safety and well-being.
20.
What kind of personal information is it okay to reveal online?
Correct Answer
D. Your favorite actor
Explanation
It is okay to reveal your favorite actor online because it is a personal preference and does not disclose any sensitive or private information. Sharing this information can help in connecting with others who have similar interests and can be a topic of conversation or discussion.
21.
If you're friendly to people you meet online, chances are that your behavior will be reciprocated. In other words:
Correct Answer
C. If your nice to people, they'll probably be nice to you as well
Explanation
The answer suggests that if you are nice to people online, they will likely respond with kindness. This implies that being friendly online can lead to positive interactions and relationships with others.
22.
When is it okay to submit your personal information to a website?
Correct Answer
B. When your parents say it's okay
Explanation
It is okay to submit your personal information to a website when your parents say it's okay. This is because parents usually have a better understanding of online safety and can assess the trustworthiness of a website. They can guide you in making informed decisions about sharing personal information online and ensure that you are protected from potential risks or scams. It is important to seek their approval and follow their advice to maintain your online security.
23.
Olive is a 12-year-old girl living in Orlando, Florida. Which of the following screen names is the safest for her?
Correct Answer
C. AstroCat
Explanation
The screen name "AstroCat" is the safest for Olive because it does not include any personal information such as her name or location. This reduces the risk of someone identifying and targeting her based on her screen name. Additionally, "AstroCat" does not include any age-related or potentially revealing terms, making it a more secure choice.
24.
Which would make the best password?
Correct Answer
D. C4liforn14
Explanation
The password "c4liforn14" would make the best password out of the given options because it is a combination of uppercase and lowercase letters, as well as numbers. This makes it more secure and harder to guess compared to the other options. Additionally, it is not a common word or a simple number, further increasing its strength as a password.
25.
Which of the following would be a creative work protected by copyright?
Correct Answer
B. A portrait of your family
Explanation
A portrait of your family would be a creative work protected by copyright because it is an original artistic expression. Copyright protects original works of authorship, including visual arts such as paintings, drawings, and photographs. Since a portrait involves creativity and skill in capturing the likeness and emotions of individuals, it qualifies as a creative work eligible for copyright protection.
26.
If you own the copyright to a poster with a giraffe design on it, which of the following actions can you take?
Correct Answer
A. Make as many copies of the poster as you want
Explanation
As the owner of the copyright to a poster with a giraffe design, you have the right to make as many copies of the poster as you want. Copyright grants the owner exclusive rights to reproduce and distribute their original work. Therefore, you have the authority to duplicate and distribute your poster without any limitations. However, this does not give you the right to sue anyone who makes a poster with a giraffe on it, glue your poster to the backs of all the seats on a school bus, or copyright the idea of a giraffe poster.
27.
If you use a copyrighted work without permission, it's called copyright infringement. What's another word for "infringement?"
Correct Answer
D. Breach
Explanation
The correct answer is "Breach". In the context of copyright, "infringement" refers to the act of violating someone's rights by using their copyrighted work without permission. "Breach" is another word that can be used to describe this violation or unauthorized use.
28.
To demonstrate the concept of gravity, a science teacher shows her class a two-minute clip from a popular movie. The use of this work is most likely an example of:
Correct Answer
B. Fair use
Explanation
The use of a two-minute clip from a popular movie by a science teacher to demonstrate the concept of gravity is most likely an example of fair use. Fair use allows for the limited use of copyrighted material without permission from the copyright owner for purposes such as education, criticism, or commentary. In this case, the science teacher is using the clip for educational purposes, which falls under fair use.
29.
When something enters the public domain, it becomes like:
Correct Answer
A. A free-for-all giveaway
Explanation
When something enters the public domain, it becomes a free-for-all giveaway. This means that it is available to everyone without any restrictions or limitations. It is no longer owned or controlled by any individual or organization, allowing anyone to use, distribute, or modify it as they please. This concept is often applied to creative works, such as books, music, or artwork, that have expired copyrights or are intentionally released for public use.
30.
Why is it a good idea to get the author's permission to use a creative work, even if you think it may be fair use?
Correct Answer
D. Fair use law is open to interpretation
Explanation
It is a good idea to get the author's permission to use a creative work, even if you think it may be fair use, because fair use law is open to interpretation. This means that what one person may consider fair use, another person may disagree and see it as copyright infringement. By obtaining the author's permission, you can avoid any potential legal issues and ensure that you are using the work in a way that is acceptable to the original creator.
31.
If you find a great website as a source for your English project, which of the following is true?
Correct Answer
C. You can use information on the site as long as you cite it properly
Explanation
If you find a great website as a source for your English project, you can use the information on the site as long as you cite it properly. This means that you can include the information in your report, but you must give credit to the original source by citing it. This is important to avoid plagiarism and to acknowledge the work of others.
32.
How is a search engine similar to the engine in a car?
Correct Answer
C. It allows you to navigate an online highway
Explanation
A search engine is similar to the engine in a car because it allows you to navigate an online highway. Just like a car engine helps you navigate the physical roads, a search engine helps you navigate the vast amount of information available on the internet by providing search results and allowing you to find specific websites, articles, or other online content. It acts as a tool to help you navigate and find what you are looking for on the internet, similar to how a car engine helps you navigate and reach your desired destination on the road.
33.
How does the search term "Fred Rogers" compare with the search term Fred Rogers, without the quotes?
Correct Answer
B. Fred Rogers (without quotes) would return more hits
Explanation
When searching for "Fred Rogers" with quotes, it indicates that the search term should be treated as an exact phrase. This means that the search results will only include instances where the words "Fred" and "Rogers" appear together and in that specific order. On the other hand, searching for Fred Rogers without quotes allows for more flexibility. It will return results where the words "Fred" and "Rogers" appear separately or together, regardless of the order. Therefore, it is likely that searching for Fred Rogers without quotes would yield a higher number of hits compared to searching with quotes.
34.
If you want to narrow down the results of an internet search, what's your best course of action?
Correct Answer
A. Add more relevant words to your search
Explanation
Adding more relevant words to your search is the best course of action to narrow down the results of an internet search. By including specific keywords or phrases related to the topic you are searching for, you can refine the search results and find more specific information that is relevant to your needs. This helps to filter out irrelevant or unrelated results and increases the chances of finding the desired information quickly and efficiently.
35.
If you wanted to learn aabout George W. Bush's term as governor of Texas--but not his term as U.S. Prsident--what would be the best phrase to search under?
Correct Answer
C. "George W. Bush" + Texas - President
Explanation
The phrase "George W. Bush" + Texas - President would be the best phrase to search under because it includes the name of the person of interest (George W. Bush) and the specific context (Texas) that is relevant to their term as governor. The addition of the "+" symbol ensures that both "George W. Bush" and Texas are included in the search results, while the "-" symbol excludes the term "President" from the search, eliminating any information related to his term as U.S. President.
36.
If you want to conduct the best internet search possible, what should you do before you begon?
Correct Answer
D. Learn a bit about the topic you're searching for
Explanation
Before conducting the best internet search possible, it is important to learn a bit about the topic you're searching for. This will help you have a better understanding of the subject matter and enable you to refine your search queries effectively. By having some background knowledge, you can identify relevant keywords, filter through search results, and evaluate the credibility of sources more efficiently, leading to a more successful and productive internet search.
37.
"Internet Math" uses which two basic math operations?
Correct Answer
B. Addition and subtraction
Explanation
"Internet Math" utilizes addition and subtraction as the two basic math operations. This means that when solving mathematical problems or equations related to Internet Math, one would primarily use addition and subtraction to perform calculations and arrive at the correct answers.