Appropriate Online Behavior - Exam 8.1 Retake 10/4

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Angiebas
A
Angiebas
Community Contributor
Quizzes Created: 6 | Total Attempts: 542
Questions: 20 | Attempts: 68

SettingsSettingsSettings
Appropriate Online Behavior - Exam 8.1 Retake 10/4 - Quiz

Please, take your time. Read each question thoroughly. We've went over this in class multiple times that I know you know all of the answers.


Questions and Answers
  • 1. 

    In reality, anyone that you meet online is a ___________.

    • A.

      Guest

    • B.

      Friend

    • C.

      Stranger

    • D.

      Squatter

    Correct Answer
    C. Stranger
    Explanation
    The correct answer is "stranger". This is because when meeting someone online, you do not have any prior knowledge or familiarity with them, making them a stranger to you.

    Rate this question:

  • 2. 

    There are many out there who would like to know more for various reasons ( S E L E C T  3 )

    • A.

      They could want to harm you.

    • B.

      They may want to become your best friend.

    • C.

      They could use information to conduct their own business - either selling your info or using it in an illegal manner.

    • D.

      They could want money.

    Correct Answer(s)
    A. They could want to harm you.
    C. They could use information to conduct their own business - either selling your info or using it in an illegal manner.
    D. They could want money.
    Explanation
    The correct answer choices suggest that there are multiple reasons why someone would want to know more about you. These reasons include wanting to harm you, using your information for their own business (which could involve selling your information or using it illegally), and wanting money. These motivations highlight the potential dangers of sharing personal information with others, emphasizing the need for caution and privacy.

    Rate this question:

  • 3. 

    What is the BEST example of a good screen name/ user id?

    • A.

      Senators15DEBBall

    • B.

      Skater4Life

    • C.

      SexyDime25

    • D.

      SkaterGrl2016

    Correct Answer
    B. Skater4Life
    Explanation
    The screen name "Skater4Life" is the best example of a good screen name/user ID because it is simple, easy to remember, and reflects a specific interest or hobby. It does not contain any personal or inappropriate information, making it suitable for online platforms.

    Rate this question:

  • 4. 

    Some people lie about who they are and what they want on the Internet for various reasons. Sometimes it is to steal an identity or to bully. Other times it is to meet children and teens to form an inappropriate relationship. These people are known as online predators. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement provided suggests that there are individuals on the internet who lie about their identity and intentions for various purposes, such as identity theft, bullying, or forming inappropriate relationships with children and teens. These individuals are commonly referred to as online predators. Therefore, the correct answer is "True" as it aligns with the information provided in the statement.

    Rate this question:

  • 5. 

    A predator is 

    • A.

      Someone who is easily harmed or affected in a bad way by someone or something.

    • B.

      Someone who follows and tries to catch or capture (someone or something) for usually a long distance or time.

    • C.

      A person who kills someone (such as a famous or important person) usually for political reasons or for money.

    • D.

      One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.

    Correct Answer
    D. One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.
    Explanation
    This answer accurately describes a predator as someone who stalks or uses lies, secrecy, or stealth to get close to another person and easily hurt or harm them. This definition emphasizes the predatory behavior of intentionally seeking out and exploiting others for personal gain or satisfaction.

    Rate this question:

  • 6. 

    What types of information should you keep private?

    • A.

      Social Security Number (SSN)

    • B.

      Hair & Eye Color

    • C.

      First & Last Name

    • D.

      Date of Birth & Age

    • E.

      Favorite Movie

    Correct Answer(s)
    A. Social Security Number (SSN)
    C. First & Last Name
    D. Date of Birth & Age
    Explanation
    Certain types of information should be kept private to protect oneself from identity theft and unauthorized access. These include the Social Security Number (SSN), which is a unique identifier that can be used to gain access to personal accounts and commit fraud. First and last names should also be kept private to prevent impersonation or unauthorized use of one's identity. Date of birth and age are also sensitive information that can be used for identity theft or fraudulent activities. It is important to safeguard these details to maintain personal privacy and security. Hair and eye color, as well as favorite movie, are not typically considered as sensitive information that needs to be kept private.

    Rate this question:

  • 7. 

    Three Online Risks are Cyber Bullying, Identity Theft, and Online Prey.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because the given answer is incorrect. The correct answer should be "True" as cyber bullying, identity theft, and online prey are indeed three online risks that individuals may encounter. Cyber bullying refers to the act of harassing, intimidating, or threatening someone online, while identity theft involves stealing someone's personal information for fraudulent purposes. Online prey refers to individuals who are vulnerable to online scams or predators. Therefore, the given answer is incorrect.

    Rate this question:

  • 8. 

    What type of grooming tatic is this: Unsafe contacts will try to build a friendship with you and earn your trust. At first, they will say things to you that make you feel special and important. Sometimes they will pretend to be of the same age. On the other hand, some unsafe contacts may reveal their real age, gender and even their first name. 

    • A.

      Indirect Solicitation of Information

    • B.

      Flattery

    • C.

      Sympathy

    • D.

      Inappropriate Conversation

    Correct Answer
    B. Flattery
    Explanation
    This type of grooming tactic is known as flattery. Unsafe contacts will use flattery to make the person they are targeting feel special and important, in order to gain their trust. They may pretend to be of the same age or reveal personal information about themselves to create a sense of connection and manipulate the person into sharing personal information.

    Rate this question:

  • 9. 

    What is the BEST example of a good Screen Name/User ID?

    • A.

      September21Bby

    • B.

      74MainStreet

    • C.

      SaintsPCA12

    • D.

      Luv4MickeyMouse

    Correct Answer
    D. Luv4MickeyMouse
    Explanation
    The screen name "Luv4MickeyMouse" is the best example of a good screen name/user ID because it is unique, easy to remember, and reflects the user's interests or personality. It combines the word "Luv" (love) with "MickeyMouse," indicating a fondness for the character. This screen name is likely to be memorable and personal to the user, making it a strong choice for an online identity.

    Rate this question:

  • 10. 

    Which one is NOT a good Screen Name/User ID?

    • A.

      Skater4Life

    • B.

      JohnDoe302

    • C.

      Daily33Dolphin

    • D.

      Mighty7Munchkin

    Correct Answer
    B. JohnDoe302
    Explanation
    The screen names "Skater4Life," "Daily33Dolphin," and "Mighty7Munchkin" are all creative and unique, which makes them good choices for a screen name/user ID. However, "JohnDoe302" is not a good screen name because it is generic and lacks creativity. It does not stand out or provide any personal information or interests, making it less memorable and potentially confusing.

    Rate this question:

  • 11. 

    Which is the BEST example of a good password?

    • A.

      ReW

    • B.

      122333444!

    • C.

      123456789

    • D.

      $t@r74ShIpS

    Correct Answer
    D. $t@r74ShIpS
    Explanation
    The password "$t@r74ShIpS" is the best example of a good password because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This combination makes it more difficult for hackers to guess or crack the password, increasing its security.

    Rate this question:

  • 12. 

    Brody's phone falls out of his pocket during the passing period between classes. Two other students find the phone. They enter 1111 for the password. To their suprise, the phone unlocks, giving them access to all of Brody's cell phone contacts, email account, social networking profiles, images and text messages. Amused, the two students send offensive text messages to Brody's friends and family. Then, the two students open Brody's social media accounts and proceed to share photos and videos that Brody never intended to make public. To make matters worse, they use Brody's email address to create accounts on inappropriate sites. Brody's email inbox is flooded with obscene content and SPAM. Which of the 3 Online Risks is represented here?

    • A.

      Identity Theft

    • B.

      Cyberbullying

    • C.

      Cyber Stalker/Predator

    Correct Answer
    B. Cyberbullying
    Explanation
    The correct answer is cyberbullying because in this scenario, the two students are using Brody's phone and personal information to send offensive text messages to his friends and family, as well as sharing embarrassing photos and videos without his consent. This behavior can be classified as cyberbullying, as it involves the use of technology to harass, intimidate, or embarrass someone.

    Rate this question:

  • 13. 

    Brody used a safe password.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement says that Brody used a safe password. The answer is false because the statement does not provide any information about whether Brody used a safe password or not. It is not possible to determine the safety of Brody's password based on the given statement.

    Rate this question:

  • 14. 

    Personal Information that you should NOT use in a User Name is 

    • A.

      Location

    • B.

      Zip Code

    • C.

      First & Last Name

    • D.

      All of the Above

    Correct Answer
    D. All of the Above
    Explanation
    Using personal information such as location, zip code, first and last name in a username is not recommended. Including such details can compromise the user's privacy and make it easier for others to identify and track them. It is important to create a username that does not reveal any personal information to ensure online safety and protect one's identity.

    Rate this question:

  • 15. 

    What is a good tip for Password Security

    • A.

      It is sometimes okay to tell a friend your password.

    • B.

      If you think you can not remember your password to a certain account, write it down and keep it in a safe place at home.

    • C.

      If you have trouble remembering your password, tell a trusted best friend.

    • D.

      If you think your friend knows your password, change it.

    Correct Answer
    D. If you think your friend knows your password, change it.
    Explanation
    It is important to change your password if you suspect that a friend knows it. Sharing passwords with others, even friends, can compromise the security of your accounts. Therefore, changing the password is a good tip for password security in this situation.

    Rate this question:

  • 16. 

    Last year, Kendra received the title of Junior Miss Montana. She is actively involved in community service and hopes to someday become Miss Teen USA. She sent a few racy photos to a significant other on ClickChat - a disappearing photo app. Kendra's password is "pageant." One day, Kendra receives an email from an unknown sender. The message reads, Thank you for using such and easy password. Here's what will happen unless you do what I ask of you. Send me a REALLY good picture of video on ClickChat, or video call me and do whatever I tell you to do for 5 minutes, or I am going to spread the racy photos I have of you all over the Internet. Your reputation will be ruined. How do you think your parents will feel about that? The choice is yours." Which one of the 3 Online Risks is represented here?

    • A.

      Cyber Stalker/Predator

    • B.

      Identity Theft

    • C.

      Cyber Bullying

    Correct Answer
    A. Cyber Stalker/Predator
    Explanation
    The correct answer is Cyber Stalker/Predator because the unknown sender is threatening to spread the racy photos of Kendra all over the internet unless she complies with their demands. This behavior demonstrates predatory and stalking tendencies, as they are attempting to manipulate and control Kendra through blackmail and intimidation.

    Rate this question:

  • 17. 

    What could happen if you share your password with someone else?

    • A.

      Nothing would happen.

    • B.

      Possible identity theft could occur.

    • C.

      They can help give you your password if you forget.

    • D.

      They will tell you their password.

    Correct Answer
    B. Possible identity theft could occur.
    Explanation
    Sharing your password with someone else can potentially lead to identity theft. This is because the person you shared your password with may misuse it to gain unauthorized access to your personal accounts and sensitive information. They could use this information for fraudulent activities or to impersonate you online. It is important to keep your passwords confidential and not share them with anyone to protect your identity and personal data.

    Rate this question:

  • 18. 

    What are characteristics of a strong password?

    • A.

      Using Symbols

    • B.

      Using Numbers

    • C.

      None of the Above

    • D.

      All of the Above

    Correct Answer
    D. All of the Above
    Explanation
    A strong password should have a combination of symbols, numbers, and other characters to make it more difficult to guess or crack. Using symbols adds complexity to the password, while using numbers increases the variety of possible combinations. Therefore, all of the options mentioned (Using Symbols, Using Numbers) contribute to the characteristics of a strong password.

    Rate this question:

  • 19. 

    Cyber Bullies are people who want to intentionally hurt or harass you. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Cyber bullies are individuals who deliberately aim to harm or harass others online. They engage in activities such as sending threatening messages, spreading rumors, or posting hurtful comments with the intention of causing emotional distress. This behavior is often fueled by a desire for power, control, or a need to feel superior. Cyber bullying can have severe consequences on the mental and emotional well-being of the victims, making it important to raise awareness and take measures to prevent and address such behavior.

    Rate this question:

  • 20. 

    ____________ a way of gathering information about a person without openly asking questions.

    • A.

      Grooming process

    • B.

      Indirect Solicitation of Information

    • C.

      None of the Above

    Correct Answer
    B. Indirect Solicitation of Information
    Explanation
    Indirect solicitation of information refers to a method of gathering information about a person without directly asking them questions. This can be done through various means such as observing their behavior, analyzing their social media profiles, or gathering information from third parties. It allows for a more discreet and subtle approach to obtaining information, which can be useful in situations where direct questioning may not be appropriate or effective. The grooming process, on the other hand, typically refers to the actions taken by an individual to build trust and manipulate someone for their own gain, and is not directly related to gathering information. Therefore, the correct answer is indirect solicitation of information.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 04, 2016
    Quiz Created by
    Angiebas
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.