Appropriate Online Behavior - Exam 6.2 Retake 9/30

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Angiebas
A
Angiebas
Community Contributor
Quizzes Created: 6 | Total Attempts: 542
Questions: 20 | Attempts: 55

SettingsSettingsSettings
Appropriate Online Behavior - Exam 6.2 Retake 9/30 - Quiz

Please, take your time. Read each question thoroughly. We've went over this in class multiple times that I know you know all of the answers.


Questions and Answers
  • 1. 

    In reality, anyone that you meet online is a ___________.

    • A.

      Guest

    • B.

      Friend

    • C.

      Stranger

    • D.

      Squatter

    Correct Answer
    C. Stranger
    Explanation
    When the question states "In reality, anyone that you meet online is a ________," it implies that the person you meet online is not someone you already know. Therefore, the correct answer is "stranger," as it refers to someone who is unknown or unfamiliar to you. This suggests that caution should be exercised when interacting with individuals online, as their true intentions and identity may not be known.

    Rate this question:

  • 2. 

    There are many out there who would like to know more for various reasons

    • A.

      They could want to harm you.

    • B.

      They may want to become your best friend.

    • C.

      They could use information to conduct their own business - either selling your info or using it in an illegal manner.

    • D.

      They could want money.

    Correct Answer(s)
    A. They could want to harm you.
    C. They could use information to conduct their own business - either selling your info or using it in an illegal manner.
    D. They could want money.
    Explanation
    The given correct answer suggests that there are multiple reasons why someone would want to know more about you. These reasons include wanting to harm you, using your information for their own business (such as selling it or using it illegally), and wanting money.

    Rate this question:

  • 3. 

    What is the BEST example of a good screen name/ user id?

    • A.

      Senators15DEBBall

    • B.

      Skater4Life

    • C.

      SexyDime25

    • D.

      SkaterGrl2016

    Correct Answer
    B. Skater4Life
    Explanation
    Skater4Life is the best example of a good screen name/user ID because it is simple, easy to remember, and reflects the user's interest in skating. It does not contain any personal or inappropriate information, making it suitable for online platforms. Additionally, the use of numbers adds a unique touch to the screen name.

    Rate this question:

  • 4. 

    Some people lie about who they are and what they want on the Internet for various reasons. Sometimes it is to steal an identity or to bully. Other times it is to meet children and teens to form an inappropriate relationship. These people are known as online predators. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement is true because there are indeed individuals who lie about their identity and intentions on the internet for various harmful reasons. These individuals, known as online predators, may engage in activities such as stealing identities, bullying others, or forming inappropriate relationships with children and teenagers. It is important to be cautious and aware of these dangers when interacting with others online.

    Rate this question:

  • 5. 

    A predator is 

    • A.

      Someone who is easily harmed or affected in a bad way by someone or something.

    • B.

      Someone who follows and tries to catch or capture (someone or something) for usually a long distance or time.

    • C.

      A person who kills someone (such as a famous or important person) usually for political reasons or for money.

    • D.

      One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.

    Correct Answer
    D. One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.
    Explanation
    The correct answer for this question is "one who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them." This answer accurately describes the behavior of a predator, who manipulates and deceives their victim in order to cause harm.

    Rate this question:

  • 6. 

    What types of information should you keep private?

    • A.

      Social Security Number (SSN)

    • B.

      Hair & Eye Color

    • C.

      First & Last Name

    • D.

      Date of Birth & Age

    • E.

      Favorite Movie

    Correct Answer(s)
    A. Social Security Number (SSN)
    C. First & Last Name
    D. Date of Birth & Age
    Explanation
    The types of information that should be kept private are the Social Security Number (SSN), First & Last Name, and Date of Birth & Age. These pieces of information are personally identifiable and can be used for identity theft or fraud if in the wrong hands. Hair & Eye Color and Favorite Movie, on the other hand, are not sensitive information and can be shared without much risk.

    Rate this question:

  • 7. 

    Three Online Risks are Cyber Bullying, Identity Theft, and Online Prey.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement "Three Online Risks are Cyber Bullying, Identity Theft, and Online Prey" is false. It suggests that these are the only three online risks, which is incorrect. There are several other online risks such as phishing scams, malware attacks, online harassment, and data breaches, among others. Therefore, the given statement is false.

    Rate this question:

  • 8. 

    What type of grooming tatic is this: Unsafe contacts will try to build a friendship with you and earn your trust. At first, they will say things to you that make you feel special and important. Sometimes they will pretend to be of the same age. On the other hand, some unsafe contacts may reveal their real age, gender and even their first name. 

    • A.

      Indirect Solicitation of Information

    • B.

      Flattery

    • C.

      Sympathy

    • D.

      Inappropriate Conversation

    Correct Answer
    B. Flattery
    Explanation
    This type of grooming tactic is flattery. Unsafe contacts will use flattery to make the individual feel special and important, building a friendship and earning their trust. They may pretend to be of the same age or reveal personal information to create a sense of connection and manipulate the individual into divulging more information.

    Rate this question:

  • 9. 

    What is the BEST example of a good Screen Name/User ID?

    • A.

      September21Bby

    • B.

      74MainStreet

    • C.

      SaintsPCA12

    • D.

      Luv4MickeyMouse

    Correct Answer
    D. Luv4MickeyMouse
    Explanation
    The screen name "Luv4MickeyMouse" is the best example of a good screen name/user ID because it is unique, memorable, and reflects the user's interests or personality. It combines the word "love" with the popular character Mickey Mouse, indicating a positive and cheerful attitude. This screen name is likely to stand out and be easily recognized by others.

    Rate this question:

  • 10. 

    Which one is NOT a good Screen Name/User ID?

    • A.

      Skater4Life

    • B.

      JohnDoe302

    • C.

      Daily33Dolphin

    • D.

      Mighty7Munchkin

    Correct Answer
    B. JohnDoe302
    Explanation
    The screen name "JohnDoe302" is not a good choice because it includes personal information (the name "John Doe") and a number (302) that may not have any significance or meaning to the user. A good screen name should be unique, memorable, and not reveal any personal details. The other options ("Skater4Life," "Daily33Dolphin," and "Mighty7Munchkin") are more creative and do not include personal information.

    Rate this question:

  • 11. 

    Which is the BEST example of a good password?

    • A.

      ReW

    • B.

      122333444!

    • C.

      123456789

    • D.

      $t@r74ShIpS

    Correct Answer
    D. $t@r74ShIpS
    Explanation
    The password "$t@r74ShIpS" is the best example of a good password because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This combination makes it difficult for hackers to guess or crack the password, increasing the security of the account or system it is used for.

    Rate this question:

  • 12. 

    Brody's phone falls out of his pocket during the passing period between classes. Two other students find the phone. They enter 1111 for the password. To their suprise, the phone unlocks, giving them access to all of Brody's cell phone contacts, email account, social networking profiles, images and text messages. Amused, the two students send offensive text messages to Brody's friends and family. Then, the two students open Brody's social media accounts and proceed to share photos and videos that Brody never intended to make public. To make matters worse, they use Brody's email address to create accounts on inappropriate sites. Brody's email inbox is flooded with obscene content and SPAM. Which of the 3 Online Risks is represented here?

    • A.

      Identity Theft

    • B.

      Cyberbullying

    • C.

      Cyber Stalker/Predator

    Correct Answer
    B. Cyberbullying
    Explanation
    The given scenario represents cyberbullying. Cyberbullying refers to the act of using technology, such as phones or social media, to harass, intimidate, or humiliate someone. In this case, the two students not only accessed Brody's personal information without permission but also sent offensive text messages to his friends and family, shared private photos and videos, and used his email address for inappropriate purposes. This behavior falls under the category of cyberbullying as it involves the intentional and malicious targeting of Brody through online means.

    Rate this question:

  • 13. 

    Brody used a safe password.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    This statement suggests that Brody did not use a safe password.

    Rate this question:

  • 14. 

    Personal Information that you should NOT use in a User Name is 

    • A.

      Location

    • B.

      Zip Code

    • C.

      First & Last Name

    • D.

      All of the Above

    Correct Answer
    D. All of the Above
    Explanation
    Personal information such as location, zip code, and first & last name should not be used in a user name. Including these details in a user name can compromise one's privacy and make it easier for others to identify or locate them. Therefore, using any of the mentioned personal information in a user name is not recommended.

    Rate this question:

  • 15. 

    What is a good tip for Password Security

    • A.

      It is sometimes okay to tell a friend your password.

    • B.

      If you think you can not remember your password to a certain account, write it down and keep it in a safe place at home.

    • C.

      If you have trouble remembering your password, tell a trusted best friend.

    • D.

      If you think your friend knows your password, change it.

    Correct Answer
    D. If you think your friend knows your password, change it.
    Explanation
    It is important to change your password if you suspect that your friend knows it. This is because sharing your password with someone else, even if it is a friend, can compromise the security of your account. By changing your password, you ensure that only you have access to your account and protect your personal information from being accessed or misused by others.

    Rate this question:

  • 16. 

    Last year, Kendra received the title of Junior Miss Montana. She is actively involved in community service and hopes to someday become Miss Teen USA. She sent a few racy photos to a significant other on ClickChat - a disappearing photo app. Kendra's password is "pageant." One day, Kendra receives an email from an unknown sender. The message reads, Thank you for using such and easy password. Here's what will happen unless you do what I ask of you. Send me a REALLY good picture of video on ClickChat, or video call me and do whatever I tell you to do for 5 minutes, or I am going to spread the racy photos I have of you all over the Internet. Your reputation will be ruined. How do you think your parents will feel about that? The choice is yours." Which one of the 3 Online Risks is represented here?

    • A.

      Cyber Stalker/Predator

    • B.

      Identity Theft

    • C.

      Cyber Bullying

    Correct Answer
    A. Cyber Stalker/Predator
    Explanation
    The correct answer is Cyber Stalker/Predator. In this scenario, Kendra is being targeted by an unknown sender who is threatening to spread her racy photos unless she complies with their demands. This individual is using fear and coercion to manipulate Kendra into doing what they want, which is a characteristic behavior of a cyber stalker or predator. They are exploiting her vulnerability and attempting to control her actions through blackmail. This situation highlights the dangers of online interactions and the importance of being cautious with personal information and online activities.

    Rate this question:

  • 17. 

    What could happen if you share your password with someone else?

    • A.

      Nothing would happen.

    • B.

      Possible identity theft could occur.

    • C.

      They can help give you your password if you forget.

    • D.

      They will tell you their password.

    Correct Answer
    B. Possible identity theft could occur.
    Explanation
    Sharing your password with someone else can potentially lead to identity theft. When you share your password, you are giving someone else access to your personal accounts and sensitive information. This person could misuse your credentials to gain unauthorized access to your accounts, steal your personal data, make fraudulent transactions, or impersonate you online. It is important to keep your passwords confidential and not share them with anyone to protect your identity and prevent potential security breaches.

    Rate this question:

  • 18. 

    What are characteristics of a strong password?

    • A.

      Using Symbols

    • B.

      Using Numbers

    • C.

      None of the Above

    • D.

      All of the Above

    Correct Answer
    D. All of the Above
    Explanation
    A strong password should include a combination of symbols and numbers, as well as other characters like uppercase and lowercase letters. By using a variety of characters, the password becomes more complex and harder to guess or crack. Therefore, "All of the Above" is the correct answer as it encompasses the characteristics of a strong password.

    Rate this question:

  • 19. 

    Cyber Bullies are people who want to intentionally hurt or harass you. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Cyber bullies are individuals who purposely seek to inflict harm or harass others online. They engage in activities such as sending threatening messages, spreading rumors, or posting derogatory comments with the intention of causing emotional distress. This behavior is often done anonymously, making it easier for cyber bullies to target their victims without facing immediate consequences. Therefore, the statement "Cyber Bullies are people who want to intentionally hurt or harass you" is true, as it accurately describes the motivations and actions of cyber bullies.

    Rate this question:

  • 20. 

    ____________ a way of gathering information about a person without openly asking questions.

    • A.

      Grooming process

    • B.

      Indirect Solicitation of Information

    • C.

      None of the Above

    Correct Answer
    B. Indirect Solicitation of Information
    Explanation
    Indirect solicitation of information refers to the act of obtaining information about a person without directly asking them questions. This can be done through various means such as observing their behavior, analyzing their social media posts, or gathering information from their friends or acquaintances. It is a covert method of gathering information that allows the person conducting it to obtain insights about the individual without their knowledge or consent. This approach is often used in investigative or research settings where direct questioning may not be feasible or appropriate.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 17, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 30, 2016
    Quiz Created by
    Angiebas
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.