1.
An example of “cyberbullying” is:
Correct Answer
D. All of the above
Explanation
The correct answer is "All of the above" because all three examples given in the question describe different forms of cyberbullying. Constantly instant messaging rude comments, spreading rumors via email, and uploading embarrassing pictures without permission are all actions that can harm and harass individuals online, making them feel unwanted and not accepted.
2.
What is the best way to deal with abusive
messages?
Correct Answer
C. Tell an adult you know and trust
Explanation
The best way to deal with abusive messages is to tell an adult you know and trust. This is because they can provide guidance and support in handling the situation effectively. They can help you report the abuse to the appropriate authorities or take necessary actions to address the issue. Ignoring the messages may not resolve the problem, and replying and complaining might escalate the situation. Contacting your Internet Service Provider (ISP) can also be helpful, but involving a trusted adult ensures you have someone who can provide emotional support and guide you through the process.
3.
Which of these is a good way to keep from being bullied?
Correct Answer
A. Delete messages from people you don't know, or from those people who seem angry or mean
Explanation
Deleting messages from people you don't know or from those who seem angry or mean is a good way to keep from being bullied because it helps to avoid engaging with potential bullies and prevents them from having a platform to target and harass you. By deleting these messages, you are taking control of your online environment and protecting yourself from potentially harmful interactions.
4.
Which of these are things you could do if you
are cyberbullied?
Correct Answer
D. All of the above
Explanation
If you are cyberbullied, there are several things you could do. You should inform the local police and report the incident to your school if it is related to school. It is important to prioritize your safety and never agree to meet with the bully or anyone you meet online. Additionally, it is recommended to not erase the messages but instead keep them in a folder unread. By doing all of the above, you are taking proactive steps to address the cyberbullying situation and ensure your safety.
5.
There is someone in a chatroom, saying she is thirteen.
Would you automatically believe she’s a young girl?
Correct Answer
C. No
Explanation
The correct answer is No because it is not safe or wise to automatically believe someone's age or identity based solely on their statement in a chatroom. People can easily lie about their age online, and it is important to exercise caution and not trust strangers blindly. It is always advisable to verify information and be cautious when interacting with unknown individuals online.
6.
What do you think of when you hear the term "cyberbullying"?
Correct Answer
E. B, C, and D
Explanation
The term "cyberbullying" refers to various forms of online harassment and mistreatment. It can include being excluded from online groups intentionally, as well as the sending of rude, angry, or gossipy messages through text or online platforms. Cyberbullying is distinct from traditional bullying in that it can be tracked and leaves digital footprints, making it easier to identify and address. Therefore, options B, C, and D accurately capture different aspects of cyberbullying.
7.
Cyber threats involve only direct threats to harm someone else.
Correct Answer
B. False
Explanation
Cyber threats can be direct or indirect. The intentional suggestion of harm is the key.
8.
Because of First Amendment protections, schools do not have the legal ability to punish students for cyberbullying and cyber threats that occur on campus or through school technology.
Correct Answer
B. False
Explanation
False. Students have a limited expectation of privacy on the district's Internet system and routine maintenance and
monitoring should be expected. An individual search of computer and Internet use records can be conducted if there is a reasonable suspicion that the student has violated district policy, including policies against bullying. In addition, schools can place education-based restrictions on student speech that appears to be sponsored by the school or that is necessary to maintain an appropriate school climate. Although no current case law exists, the standard probably applies to student speech through the district Internet system or via cell phones used at school
(Nancy Willard, "An Educator's Guide to Cyberbullying and Cyber threats" Eugene: Center for Safe and Responsible
Internet Use, 2005), www.cyberbully.org/docs/cbceducator.pdf).
9.
Recipients of an e-mail or IM from a cyberbully should not response and should immediately delete the message.
Correct Answer
B. False
Explanation
False. Recipients should NOT respond - engaging in conversation with the perpetrator of a cyberbullying
incident or retaliating can make the situation worse. However, students SHOULD save the IMs or e-mails as a record of the cyberbullying behavior and tell an adult about what has occurred.
10.
I am completely safe when I’m surfing the Internet because:
Correct Answer
E. None of the above
Explanation
You can be cyberbullied anywhere, through phone, IM, e-mails, Web sites, Chat rooms. Your good name can be damaged. The old adage "Sticks and stones my break my bones but words can never hurt me" is NOT true -- Words can hurt.
11.
If a friend you met on the Internet but never in person starts sending you gifts, you should:
Correct Answer
D. Do not open the box and go immediately to an adult in charge.
Explain what happened to the adult.
Explanation
If a friend you met on the Internet but never in person starts sending you gifts, it is important to prioritize your safety. Opening the box without adult supervision could potentially be dangerous, as you don't know the intentions of the sender. By going immediately to an adult in charge, you are seeking their guidance and protection. The adult can assess the situation, help determine the sender's intentions, and take appropriate action to ensure your safety. It is crucial to always prioritize your well-being and seek adult assistance in such situations.
12.
What shouldn’t you do if you are being bullied online?
Correct Answer
A. Respond
Explanation
You should never respond to a cyberbully. That only encourages them.
13.
When a person goes online and starts talking to you that you don't know, what shouldn't you do? (click all that apply)
Correct Answer(s)
B. Tell him/her your name.
C. Tell him/her why you are talking to them
D. Tell him/her when you will come back on line
Explanation
When a person goes online and starts talking to you that you don't know, you shouldn't tell him/her your name, why you are talking to them, or when you will come back online. This is because sharing personal information such as your name can be risky and may lead to potential harm. Additionally, disclosing the reason for talking to them or when you will be online can give them unnecessary information and potentially enable them to manipulate or exploit you. It is important to prioritize your safety and maintain privacy when interacting with strangers online.
14.
_________ is intentional bullying over e-mail, instant messages,
gaming Web sites, texting, phone messages, or through other digital
messaging.
Correct Answer(s)
cyberbullying
Cyber-bullying
Cyber bullying
Cyberbullying
Explanation
Cyberbullying is intentional bullying that takes place over various digital platforms such as email, instant messages, gaming websites, texting, phone messages, or other forms of digital messaging. It refers to the act of using technology to harass, intimidate, or harm others, often repeatedly and with malicious intent. The term can be spelled as "cyberbullying," "Cyber-bullying," "Cyber bullying," or "Cyberbullying," all of which are correct variations.
15.
Which of these answers below are NOT ways to avoid becoming a victim of cyberbullying?
Correct Answer
D. Witchcraft
Explanation
Witchcraft is not a way to avoid becoming a victim of cyberbullying. The other options listed are all valid ways to protect oneself from cyberbullying. Witchcraft is not a practical or effective method for preventing or dealing with cyberbullying incidents.
16.
As I travel through "Cyberspace," information
I should never give out to someone I meet online is:
Correct Answer
B. My real name, address, telepHone number, the school I attend, or my pHotograpH.
Explanation
When traveling through "Cyberspace," it is important to prioritize personal safety and privacy. Giving out personal information such as real name, address, telephone number, school attended, or photographs can pose a risk of identity theft, cyberstalking, or other forms of online harassment. Sharing the names of favorite books and movies or the name of a pet may be relatively harmless in comparison.
17.
What are the risks of putting your picture on
the Internet?
Correct Answer
D. A and C
Explanation
By putting your picture on the internet, you run the risk of being traced by someone who might wish you harm. This is because once your picture is online, it can potentially be accessed by anyone, including individuals with malicious intent. Additionally, there is a risk that the picture could be edited in an embarrassing way and sent to others or published on the web. This can lead to personal and reputational harm. Therefore, both options A and C highlight the potential risks associated with putting your picture on the internet.
18.
True or False: Cyberbullying doesn't really hurt anyone. People who complain are just being crybabies and wimps.
Correct Answer
B. False
Explanation
Cyberbullying can damage your reputation and ruin your chances for getting into college or getting a job. Hundreds of children have committed suicide in despair over being cyberbullied. Other have ended up needing psychological help. Words hurt.
19.
Cyberbullying is the same as bullying.
Correct Answer
B. False -- a cyberbully tries to hide who he/she is, while a bully is known
Explanation
Cyberbullying and traditional bullying are not the same because cyberbullies often try to conceal their identity while bullying online. In contrast, traditional bullies are typically known to their victims. This distinction highlights the unique characteristics and challenges associated with cyberbullying, such as anonymity and the ability to reach a wider audience.
20.
What can be done to a cyberbully?
Correct Answer
D. B and C
Explanation
Cyberbullies can face legal consequences through jail time and civil law suits. This is because cyberbullying is against the law, and victims have the option to take legal action against their bullies.