1.
In reality, anyone that you meet online is a ___________.
Correct Answer
C. Stranger
Explanation
The correct answer is "stranger". This is because when meeting someone online, you do not have any prior knowledge or familiarity with them, making them a stranger to you.
2.
There are many out there who would like to know more for various reasons ( S E L E C T 3 )
Correct Answer(s)
A. They could want to harm you.
C. They could use information to conduct their own business - either selling your info or using it in an illegal manner.
D. They could want money.
Explanation
The correct answer choices suggest that there are multiple reasons why someone would want to know more about you. These reasons include wanting to harm you, using your information for their own business (which could involve selling your information or using it illegally), and wanting money. These motivations highlight the potential dangers of sharing personal information with others, emphasizing the need for caution and privacy.
3.
What is the BEST example of a good screen name/ user id?
Correct Answer
B. Skater4Life
Explanation
The screen name "Skater4Life" is the best example of a good screen name/user ID because it is simple, easy to remember, and reflects a specific interest or hobby. It does not contain any personal or inappropriate information, making it suitable for online platforms.
4.
Some people lie about who they are and what they want on the Internet for various reasons. Sometimes it is to steal an identity or to bully. Other times it is to meet children and teens to form an inappropriate relationship. These people are known as online predators.
Correct Answer
A. True
Explanation
The statement provided suggests that there are individuals on the internet who lie about their identity and intentions for various purposes, such as identity theft, bullying, or forming inappropriate relationships with children and teens. These individuals are commonly referred to as online predators. Therefore, the correct answer is "True" as it aligns with the information provided in the statement.
5.
A predator is
Correct Answer
D. One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.
Explanation
This answer accurately describes a predator as someone who stalks or uses lies, secrecy, or stealth to get close to another person and easily hurt or harm them. This definition emphasizes the predatory behavior of intentionally seeking out and exploiting others for personal gain or satisfaction.
6.
What types of information should you keep private?
Correct Answer(s)
A. Social Security Number (SSN)
C. First & Last Name
D. Date of Birth & Age
Explanation
Certain types of information should be kept private to protect oneself from identity theft and unauthorized access. These include the Social Security Number (SSN), which is a unique identifier that can be used to gain access to personal accounts and commit fraud. First and last names should also be kept private to prevent impersonation or unauthorized use of one's identity. Date of birth and age are also sensitive information that can be used for identity theft or fraudulent activities. It is important to safeguard these details to maintain personal privacy and security. Hair and eye color, as well as favorite movie, are not typically considered as sensitive information that needs to be kept private.
7.
Three Online Risks are Cyber Bullying, Identity Theft, and Online Prey.
Correct Answer
B. False
Explanation
The statement is false because the given answer is incorrect. The correct answer should be "True" as cyber bullying, identity theft, and online prey are indeed three online risks that individuals may encounter. Cyber bullying refers to the act of harassing, intimidating, or threatening someone online, while identity theft involves stealing someone's personal information for fraudulent purposes. Online prey refers to individuals who are vulnerable to online scams or predators. Therefore, the given answer is incorrect.
8.
What type of grooming tatic is this: Unsafe contacts will try to build a friendship with you and earn your trust. At first, they will say things to you that make you feel special and important. Sometimes they will pretend to be of the same age. On the other hand, some unsafe contacts may reveal their real age, gender and even their first name.
Correct Answer
B. Flattery
Explanation
This type of grooming tactic is known as flattery. Unsafe contacts will use flattery to make the person they are targeting feel special and important, in order to gain their trust. They may pretend to be of the same age or reveal personal information about themselves to create a sense of connection and manipulate the person into sharing personal information.
9.
What is the BEST example of a good Screen Name/User ID?
Correct Answer
D. Luv4MickeyMouse
Explanation
The screen name "Luv4MickeyMouse" is the best example of a good screen name/user ID because it is unique, easy to remember, and reflects the user's interests or personality. It combines the word "Luv" (love) with "MickeyMouse," indicating a fondness for the character. This screen name is likely to be memorable and personal to the user, making it a strong choice for an online identity.
10.
Which one is NOT a good Screen Name/User ID?
Correct Answer
B. JohnDoe302
Explanation
The screen names "Skater4Life," "Daily33Dolphin," and "Mighty7Munchkin" are all creative and unique, which makes them good choices for a screen name/user ID. However, "JohnDoe302" is not a good screen name because it is generic and lacks creativity. It does not stand out or provide any personal information or interests, making it less memorable and potentially confusing.
11.
Which is the BEST example of a good password?
Correct Answer
D. $t@r74ShIpS
Explanation
The password "$t@r74ShIpS" is the best example of a good password because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This combination makes it more difficult for hackers to guess or crack the password, increasing its security.
12.
Brody's phone falls out of his pocket during the passing period between classes. Two other students find the phone. They enter 1111 for the password. To their suprise, the phone unlocks, giving them access to all of Brody's cell phone contacts, email account, social networking profiles, images and text messages. Amused, the two students send offensive text messages to Brody's friends and family. Then, the two students open Brody's social media accounts and proceed to share photos and videos that Brody never intended to make public. To make matters worse, they use Brody's email address to create accounts on inappropriate sites. Brody's email inbox is flooded with obscene content and SPAM. Which of the 3 Online Risks is represented here?
Correct Answer
B. Cyberbullying
Explanation
The correct answer is cyberbullying because in this scenario, the two students are using Brody's phone and personal information to send offensive text messages to his friends and family, as well as sharing embarrassing photos and videos without his consent. This behavior can be classified as cyberbullying, as it involves the use of technology to harass, intimidate, or embarrass someone.
13.
Brody used a safe password.
Correct Answer
B. False
Explanation
The statement says that Brody used a safe password. The answer is false because the statement does not provide any information about whether Brody used a safe password or not. It is not possible to determine the safety of Brody's password based on the given statement.
14.
Personal Information that you should NOT use in a User Name is
Correct Answer
D. All of the Above
Explanation
Using personal information such as location, zip code, first and last name in a username is not recommended. Including such details can compromise the user's privacy and make it easier for others to identify and track them. It is important to create a username that does not reveal any personal information to ensure online safety and protect one's identity.
15.
What is a good tip for Password Security
Correct Answer
D. If you think your friend knows your password, change it.
Explanation
It is important to change your password if you suspect that a friend knows it. Sharing passwords with others, even friends, can compromise the security of your accounts. Therefore, changing the password is a good tip for password security in this situation.
16.
Last year, Kendra received the title of Junior Miss Montana. She is actively involved in community service and hopes to someday become Miss Teen USA. She sent a few racy photos to a significant other on ClickChat - a disappearing photo app. Kendra's password is "pageant." One day, Kendra receives an email from an unknown sender. The message reads, Thank you for using such and easy password. Here's what will happen unless you do what I ask of you. Send me a REALLY good picture of video on ClickChat, or video call me and do whatever I tell you to do for 5 minutes, or I am going to spread the racy photos I have of you all over the Internet. Your reputation will be ruined. How do you think your parents will feel about that? The choice is yours." Which one of the 3 Online Risks is represented here?
Correct Answer
A. Cyber Stalker/Predator
Explanation
The correct answer is Cyber Stalker/Predator because the unknown sender is threatening to spread the racy photos of Kendra all over the internet unless she complies with their demands. This behavior demonstrates predatory and stalking tendencies, as they are attempting to manipulate and control Kendra through blackmail and intimidation.
17.
What could happen if you share your password with someone else?
Correct Answer
B. Possible identity theft could occur.
Explanation
Sharing your password with someone else can potentially lead to identity theft. This is because the person you shared your password with may misuse it to gain unauthorized access to your personal accounts and sensitive information. They could use this information for fraudulent activities or to impersonate you online. It is important to keep your passwords confidential and not share them with anyone to protect your identity and personal data.
18.
What are characteristics of a strong password?
Correct Answer
D. All of the Above
Explanation
A strong password should have a combination of symbols, numbers, and other characters to make it more difficult to guess or crack. Using symbols adds complexity to the password, while using numbers increases the variety of possible combinations. Therefore, all of the options mentioned (Using Symbols, Using Numbers) contribute to the characteristics of a strong password.
19.
Cyber Bullies are people who want to intentionally hurt or harass you.
Correct Answer
A. True
Explanation
Cyber bullies are individuals who deliberately aim to harm or harass others online. They engage in activities such as sending threatening messages, spreading rumors, or posting hurtful comments with the intention of causing emotional distress. This behavior is often fueled by a desire for power, control, or a need to feel superior. Cyber bullying can have severe consequences on the mental and emotional well-being of the victims, making it important to raise awareness and take measures to prevent and address such behavior.
20.
____________ a way of gathering information about a person without openly asking questions.
Correct Answer
B. Indirect Solicitation of Information
Explanation
Indirect solicitation of information refers to a method of gathering information about a person without directly asking them questions. This can be done through various means such as observing their behavior, analyzing their social media profiles, or gathering information from third parties. It allows for a more discreet and subtle approach to obtaining information, which can be useful in situations where direct questioning may not be appropriate or effective. The grooming process, on the other hand, typically refers to the actions taken by an individual to build trust and manipulate someone for their own gain, and is not directly related to gathering information. Therefore, the correct answer is indirect solicitation of information.