Appropriate Online Behavior - Exam 6.1 Retake 10/4

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Angiebas
A
Angiebas
Community Contributor
Quizzes Created: 6 | Total Attempts: 581
| Attempts: 79 | Questions: 20
Please wait...
Question 1 / 20
0 %
0/100
Score 0/100
1. In reality, anyone that you meet online is a ___________.

Explanation

When it comes to meeting people online, it is important to remember that you do not personally know them. Therefore, they are considered strangers. It is crucial to exercise caution and not trust someone blindly just because you have interacted with them online.

Submit
Please wait...
About This Quiz
Appropriate Online Behavior - Exam 6.1 Retake 10/4 - Quiz

Please, take your time. Read each question thoroughly. We've went over this in class multiple times that I know you know all of the answers.

2. What could happen if you share your password with someone else?

Explanation

If you share your password with someone else, possible identity theft could occur. Sharing your password increases the risk of unauthorized access to your personal information and accounts. The person you share the password with could misuse it to gain unauthorized access to your accounts, steal your sensitive data, or impersonate you online. This can lead to various consequences, such as financial loss, privacy invasion, and damage to your online reputation. It is important to keep your passwords confidential and not share them with anyone.

Submit
3. Some people lie about who they are and what they want on the Internet for various reasons. Sometimes it is to steal an identity or to bully. Other times it is to meet children and teens to form an inappropriate relationship. These people are known as online predators

Explanation

The given statement is true. Online predators are individuals who deceive others on the internet by pretending to be someone they are not, often with harmful intentions. They may lie about their identity and intentions to steal personal information, engage in cyberbullying, or groom children and teenagers for inappropriate relationships. These predators pose a significant risk to online users, particularly vulnerable individuals who may be unaware of their true intentions. It is important to be cautious and vigilant while interacting with others online to protect oneself from such individuals.

Submit
4. What is the BEST example of a good Screen Name/User ID?

Explanation

The screen name "Luv4MickeyMouse" is the best example of a good screen name/user ID because it is unique, easy to remember, and reflects the user's interests or personality. It combines a term of endearment ("Luv4") with a well-known character ("MickeyMouse"), making it catchy and memorable. Additionally, it does not include any personal information or numbers that could be easily guessed or linked to the user's identity.

Submit
5. Which one is NOT a good Screen Name/User ID?

Explanation

The screen name "JohnDoe302" is not a good choice because it includes personal information (John Doe) and a numerical sequence (302), which can make it easy for someone to identify or track the user. It is generally recommended to avoid using personal information or easily guessable patterns in screen names to protect one's privacy and security online.

Submit
6. Personal Information that you should NOT use in a User Name is 

Explanation

Personal information such as location, zip code, and first and last name should not be used in a user name. Using this information in a user name can compromise the user's privacy and security. Location and zip code can reveal the user's physical address, while first and last name can provide personal identification. By avoiding the use of this information in a user name, individuals can protect their personal information and reduce the risk of identity theft or unauthorized access to their accounts.

Submit
7. Which is the BEST example of a good password?

Explanation

The password "$t@r74ShIpS" is the best example of a good password because it includes a combination of upper and lowercase letters, numbers, and special characters. This makes it more complex and harder for hackers to guess or crack. Additionally, it is longer than the other options, which adds an extra layer of security.

Submit
8. Brody used a safe password.

Explanation

The statement says that Brody used a safe password, but the correct answer is false. This means that Brody did not use a safe password.

Submit
9. A predator is 

Explanation

A predator is someone who stalks or uses lies, secrecy, or stealth to get close to another person and easily hurt or harm them. This definition emphasizes the predatory behavior of intentionally seeking out and targeting individuals with the intention of causing harm.

Submit
10. Cyber Bullies are people who want to intentionally hurt or harass you. 

Explanation

Cyber bullies are individuals who intentionally aim to harm or harass others. They use digital platforms to carry out their malicious actions, such as sending threatening messages, spreading rumors, or sharing private information without consent. This behavior is often driven by a desire to exert power or control over their victims. The statement "Cyber Bullies are people who want to intentionally hurt or harass you" accurately describes the nature of cyber bullies, making the answer true.

Submit
11. What types of information should you keep private?

Explanation

You should keep your Social Security Number (SSN), First & Last Name, and Date of Birth & Age private. This information is sensitive and can be used for identity theft or fraud if it falls into the wrong hands. It is important to protect this personal information to ensure your privacy and security.

Submit
12. There are many out there who would like to know more for various reasons ( S E L E C T  3 )

Explanation

The correct answer options explain the various reasons why someone would want to know more about you. They could want to harm you by using the information against you. They could use the information to conduct their own business, either by selling your information or using it in an illegal manner. Lastly, they could want money, possibly by exploiting the information they gather about you.

Submit
13. Last year, Kendra received the title of Junior Miss Montana. She is actively involved in community service and hopes to someday become Miss Teen USA. She sent a few racy photos to a significant other on ClickChat - a disappearing photo app. Kendra's password is "pageant." One day, Kendra receives an email from an unknown sender. The message reads, Thank you for using such and easy password. Here's what will happen unless you do what I ask of you. Send me a REALLY good picture of video on ClickChat, or video call me and do whatever I tell you to do for 5 minutes, or I am going to spread the racy photos I have of you all over the Internet. Your reputation will be ruined. How do you think your parents will feel about that? The choice is yours." Which one of the 3 Online Risks is represented here?

Explanation

The correct answer is Cyber Stalker/Predator. In this scenario, Kendra is being targeted by an unknown sender who is threatening to spread her racy photos unless she complies with their demands. This person is exhibiting predatory behavior by attempting to manipulate and control Kendra through blackmail and coercion. Their actions can be classified as cyber stalking, as they are using technology to harass and intimidate her.

Submit
14. What is a good tip for Password Security

Explanation

If you suspect that your friend knows your password, it is important to change it. This is because sharing passwords, even with trusted friends, can pose a security risk. By changing your password, you can ensure that your account remains secure and that unauthorized access is prevented. It is always best to keep your passwords confidential and not share them with anyone, even close friends.

Submit
15. What are characteristics of a strong password?

Explanation

A strong password should have a combination of different characters and symbols to make it harder to guess or crack. Using symbols and numbers in a password increases its complexity and makes it more secure. Therefore, "Using Symbols" and "Using Numbers" are characteristics of a strong password. "All of the Above" is the correct answer as it includes both of these characteristics, while "None of the Above" is incorrect as it does not include any of the mentioned characteristics.

Submit
16. What is the BEST example of a good screen name/ user id?

Explanation

Skater4Life is the best example of a good screen name/user ID because it is simple, easy to remember, and reflects the user's interest in skating. It does not contain any personal or inappropriate information, making it suitable for a wide range of online platforms.

Submit
17. ____________ a way of gathering information about a person without openly asking questions.

Explanation

Indirect solicitation of information refers to a method of obtaining information about someone without directly asking them questions. This can be done through various means such as observation, listening to conversations, or gathering information from third parties. It is a subtle and discreet way of gathering information without arousing suspicion or making the person feel uncomfortable. This approach is often used in investigative or research settings where direct questioning may not be appropriate or effective.

Submit
18. What type of grooming tatic is this: Unsafe contacts will try to build a friendship with you and earn your trust. At first, they will say things to you that make you feel special and important. Sometimes they will pretend to be of the same age. On the other hand, some unsafe contacts may reveal their real age, gender and even their first name. 

Explanation

This type of grooming tactic is known as "Flattery". Unsafe contacts will try to build a friendship with you by saying things that make you feel special and important. They may even pretend to be of the same age or reveal personal information about themselves to gain your trust. Flattery is a common tactic used by predators to manipulate and exploit their victims.

Submit
19. Brody's phone falls out of his pocket during the passing period between classes. Two other students find the phone. They enter 1111 for the password. To their suprise, the phone unlocks, giving them access to all of Brody's cell phone contacts, email account, social networking profiles, images and text messages. Amused, the two students send offensive text messages to Brody's friends and family. Then, the two students open Brody's social media accounts and proceed to share photos and videos that Brody never intended to make public. To make matters worse, they use Brody's email address to create accounts on inappropriate sites. Brody's email inbox is flooded with obscene content and SPAM. Which of the 3 Online Risks is represented here?

Explanation

The given scenario represents cyberbullying. Cyberbullying involves using technology, such as a phone or social media, to harass, intimidate, or harm others. In this case, the two students gain unauthorized access to Brody's phone and use it to send offensive text messages, share private photos and videos, and create accounts on inappropriate sites, causing harm and distress to Brody and his contacts. This behavior aligns with the definition of cyberbullying, making it the correct answer.

Submit
20. Three Online Risks are Cyber Bullying, Identity Theft, and Online Prey.

Explanation

The statement is false because the given options do not accurately represent the three online risks. Cyber bullying, identity theft, and online prey are indeed online risks, but they are not the only risks. There are several other risks such as hacking, phishing, malware attacks, and online scams that are not mentioned in the options. Therefore, the correct answer is false.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 18, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 04, 2016
    Quiz Created by
    Angiebas
Cancel
  • All
    All (20)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
In reality, anyone that you meet online is a ___________.
What could happen if you share your password with someone else?
Some people lie about who they are and what they want on the Internet...
What is the BEST example of a good Screen Name/User ID?
Which one is NOT a good Screen Name/User ID?
Personal Information that you should NOT use in a User Name is 
Which is the BEST example of a good password?
Brody used a safe password.
A predator is 
Cyber Bullies are people who want to intentionally hurt or harass...
What types of information should you keep private?
There are many out there who would like to know more for various...
Last year, Kendra received the title of Junior Miss Montana. She is...
What is a good tip for Password Security
What are characteristics of a strong password?
What is the BEST example of a good screen name/ user id?
____________ a way of gathering information about a person without...
What type of grooming tatic is this: Unsafe contacts will try to build...
Brody's phone falls out of his pocket during the passing period...
Three Online Risks are Cyber Bullying, Identity Theft, and Online...
Alert!

Advertisement