Appropriate Online Behavior - Exam 8.2 Retake 9/30

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Angiebas
A
Angiebas
Community Contributor
Quizzes Created: 7 | Total Attempts: 591
Questions: 20 | Attempts: 55

SettingsSettingsSettings
Appropriate Online Behavior - Exam 8.2 Retake 9/30 - Quiz

Please, take your time. Read each question thoroughly. We've went over this in class multiple times that I know you know all of the answers.


Questions and Answers
  • 1. 

    In reality, anyone that you meet online is a ___________.

    • A.

      Guest

    • B.

      Friend

    • C.

      Stranger

    • D.

      Squatter

    Correct Answer
    C. Stranger
    Explanation
    The term "stranger" refers to someone who is not known or familiar to the person. In the context of meeting someone online, it implies that the person is not someone the individual has met or has a personal relationship with. Therefore, the correct answer is "stranger."

    Rate this question:

  • 2. 

    There are many out there who would like to know more for various reasons

    • A.

      They could want to harm you.

    • B.

      They may want to become your best friend.

    • C.

      They could use information to conduct their own business - either selling your info or using it in an illegal manner.

    • D.

      They could want money.

    Correct Answer(s)
    A. They could want to harm you.
    C. They could use information to conduct their own business - either selling your info or using it in an illegal manner.
    D. They could want money.
    Explanation
    The given answer suggests that there are several potential reasons why someone would want to know more about you. These reasons include wanting to harm you, using your information for their own business (such as selling it or using it illegally), or wanting money.

    Rate this question:

  • 3. 

    What is the BEST example of a good screen name/ user id?

    • A.

      Senators15DEBBall

    • B.

      Skater4Life

    • C.

      SexyDime25

    • D.

      SkaterGrl2016

    Correct Answer
    B. Skater4Life
    Explanation
    Skater4Life is the best example of a good screen name/user ID because it is simple, easy to remember, and reflects the user's interest in skating. It does not contain any personal or inappropriate information, making it suitable for use in various online platforms.

    Rate this question:

  • 4. 

    Some people lie about who they are and what they want on the Internet for various reasons. Sometimes it is to steal an identity or to bully. Other times it is to meet children and teens to form an inappropriate relationship. These people are known as online predators. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given statement is true. The explanation for this is that there are indeed individuals who lie about their identity and intentions on the Internet for various malicious purposes. This includes stealing identities, engaging in bullying, and forming inappropriate relationships with children and teenagers. These individuals are commonly referred to as online predators.

    Rate this question:

  • 5. 

    A predator is 

    • A.

      Someone who is easily harmed or affected in a bad way by someone or something.

    • B.

      Someone who follows and tries to catch or capture (someone or something) for usually a long distance or time.

    • C.

      A person who kills someone (such as a famous or important person) usually for political reasons or for money.

    • D.

      One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.

    Correct Answer
    D. One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.
    Explanation
    A predator is someone who stalks or uses lies, secrecy, or stealth to get close to another person with the intention of easily hurting or harming them. This definition implies that a predator is someone who preys on others by employing deceptive tactics and taking advantage of their vulnerability.

    Rate this question:

  • 6. 

    What types of information should you keep private?

    • A.

      Social Security Number (SSN)

    • B.

      Hair & Eye Color

    • C.

      First & Last Name

    • D.

      Date of Birth & Age

    • E.

      Favorite Movie

    Correct Answer(s)
    A. Social Security Number (SSN)
    C. First & Last Name
    D. Date of Birth & Age
    Explanation
    The types of information that should be kept private are the Social Security Number (SSN), First & Last Name, and Date of Birth & Age. These pieces of information are considered personally identifiable information (PII) and can be used for identity theft or fraud if in the wrong hands. Hair & Eye Color and Favorite Movie are not typically considered sensitive information and do not pose the same risks as the other mentioned details.

    Rate this question:

  • 7. 

    Three Online Risks are Cyber Bullying, Identity Theft, and Online Prey.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because the question states that there are three online risks, namely cyber bullying, identity theft, and online prey. However, this is not accurate as there are numerous other online risks such as phishing scams, malware attacks, online fraud, and social media stalking, among others. Therefore, the given statement is incorrect.

    Rate this question:

  • 8. 

    What type of grooming tatic is this: Unsafe contacts will try to build a friendship with you and earn your trust. At first, they will say things to you that make you feel special and important. Sometimes they will pretend to be of the same age. On the other hand, some unsafe contacts may reveal their real age, gender and even their first name. 

    • A.

      Indirect Solicitation of Information

    • B.

      Flattery

    • C.

      Sympathy

    • D.

      Inappropriate Conversation

    Correct Answer
    B. Flattery
    Explanation
    This type of grooming tactic is characterized by the unsafe contact trying to build a friendship with the individual and earn their trust by saying things that make them feel special and important. This tactic involves using flattery to manipulate the individual into feeling a sense of closeness and trust with the unsafe contact.

    Rate this question:

  • 9. 

    What is the BEST example of a good Screen Name/User ID?

    • A.

      September21Bby

    • B.

      74MainStreet

    • C.

      SaintsPCA12

    • D.

      Luv4MickeyMouse

    Correct Answer
    D. Luv4MickeyMouse
    Explanation
    The screen name "Luv4MickeyMouse" is the best example of a good screen name because it is unique, easy to remember, and reflects the user's interests or personality. It also avoids using personal information such as a birthdate or address, which can help protect the user's privacy and security.

    Rate this question:

  • 10. 

    Which one is NOT a good Screen Name/User ID?

    • A.

      Skater4Life

    • B.

      JohnDoe302

    • C.

      Daily33Dolphin

    • D.

      Mighty7Munchkin

    Correct Answer
    B. JohnDoe302
    Explanation
    The screen name "JohnDoe302" is not a good choice because it includes personal information (John Doe) and a number (302) which can make it easier for someone to identify or track the user. It is generally recommended to choose a screen name that does not reveal personal information and is not easily associated with the user's real identity.

    Rate this question:

  • 11. 

    Which is the BEST example of a good password?

    • A.

      ReW

    • B.

      122333444!

    • C.

      123456789

    • D.

      $t@r74ShIpS

    Correct Answer
    D. $t@r74ShIpS
    Explanation
    The password "$t@r74ShIpS" is the best example of a good password because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This makes it more difficult for hackers to guess or crack the password, increasing its security. Additionally, the password is longer than the other options, which also adds to its strength.

    Rate this question:

  • 12. 

    Brody's phone falls out of his pocket during the passing period between classes. Two other students find the phone. They enter 1111 for the password. To their suprise, the phone unlocks, giving them access to all of Brody's cell phone contacts, email account, social networking profiles, images and text messages. Amused, the two students send offensive text messages to Brody's friends and family. Then, the two students open Brody's social media accounts and proceed to share photos and videos that Brody never intended to make public. To make matters worse, they use Brody's email address to create accounts on inappropriate sites. Brody's email inbox is flooded with obscene content and SPAM. Which of the 3 Online Risks is represented here?

    • A.

      Identity Theft

    • B.

      Cyberbullying

    • C.

      Cyber Stalker/Predator

    Correct Answer
    B. Cyberbullying
    Explanation
    The given scenario represents cyberbullying. Cyberbullying refers to the act of using technology, such as phones or social media, to harass, intimidate, or harm others. In this case, the two students gain unauthorized access to Brody's phone and proceed to send offensive text messages to his friends and family, as well as share private photos and videos without his consent. This behavior falls under the category of cyberbullying as it involves using technology to harm and embarrass someone.

    Rate this question:

  • 13. 

    Brody used a safe password.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement says that Brody used a safe password, but the correct answer is False. This implies that Brody did not use a safe password.

    Rate this question:

  • 14. 

    Personal Information that you should NOT use in a User Name is 

    • A.

      Location

    • B.

      Zip Code

    • C.

      First & Last Name

    • D.

      All of the Above

    Correct Answer
    D. All of the Above
    Explanation
    Using personal information such as location, zip code, and first and last name in a user name can pose a security risk. Including these details in a user name makes it easier for hackers or identity thieves to gather personal information about the user. It is important to choose a unique and unrelated user name to protect one's privacy and security online.

    Rate this question:

  • 15. 

    What is a good tip for Password Security

    • A.

      It is sometimes okay to tell a friend your password.

    • B.

      If you think you can not remember your password to a certain account, write it down and keep it in a safe place at home.

    • C.

      If you have trouble remembering your password, tell a trusted best friend.

    • D.

      If you think your friend knows your password, change it.

    Correct Answer
    D. If you think your friend knows your password, change it.
    Explanation
    If you suspect that your friend knows your password, it is important to change it. This is because sharing passwords, even with friends, can compromise the security of your accounts. By changing your password, you can ensure that your account remains secure and that unauthorized access is prevented. It is always recommended to keep your passwords confidential and not share them with anyone, even trusted friends.

    Rate this question:

  • 16. 

    Last year, Kendra received the title of Junior Miss Montana. She is actively involved in community service and hopes to someday become Miss Teen USA. She sent a few racy photos to a significant other on ClickChat - a disappearing photo app. Kendra's password is "pageant." One day, Kendra receives an email from an unknown sender. The message reads, Thank you for using such and easy password. Here's what will happen unless you do what I ask of you. Send me a REALLY good picture of video on ClickChat, or video call me and do whatever I tell you to do for 5 minutes, or I am going to spread the racy photos I have of you all over the Internet. Your reputation will be ruined. How do you think your parents will feel about that? The choice is yours." Which one of the 3 Online Risks is represented here?

    • A.

      Cyber Stalker/Predator

    • B.

      Identity Theft

    • C.

      Cyber Bullying

    Correct Answer
    A. Cyber Stalker/Predator
    Explanation
    The correct answer is Cyber Stalker/Predator. In this scenario, Kendra is being targeted by an unknown sender who is threatening to spread her racy photos online unless she complies with their demands. This individual is using fear and intimidation to manipulate Kendra into doing what they want, which is a characteristic behavior of a cyber stalker or predator.

    Rate this question:

  • 17. 

    What could happen if you share your password with someone else?

    • A.

      Nothing would happen.

    • B.

      Possible identity theft could occur.

    • C.

      They can help give you your password if you forget.

    • D.

      They will tell you their password.

    Correct Answer
    B. Possible identity theft could occur.
    Explanation
    If you share your password with someone else, possible identity theft could occur. This is because the person you share your password with can potentially misuse it to gain unauthorized access to your personal accounts and sensitive information. They could use this information for malicious purposes such as stealing your identity, accessing your financial accounts, or impersonating you online. It is always important to keep your passwords confidential and not share them with anyone to protect your personal security and privacy.

    Rate this question:

  • 18. 

    What are characteristics of a strong password?

    • A.

      Using Symbols

    • B.

      Using Numbers

    • C.

      None of the Above

    • D.

      All of the Above

    Correct Answer
    D. All of the Above
    Explanation
    A strong password should have a combination of different characters, including symbols and numbers, to increase its complexity and make it harder to guess or crack. By using symbols and numbers in addition to letters, the password becomes more secure and less susceptible to brute force attacks or dictionary-based hacking attempts. Therefore, "All of the Above" is the correct answer as it encompasses the characteristics of a strong password.

    Rate this question:

  • 19. 

    Cyber Bullies are people who want to intentionally hurt or harass you. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Cyber bullies are individuals who purposely aim to harm or harass others online. They engage in activities such as sending threatening messages, spreading rumors, or posting derogatory comments with the intention of causing emotional distress. Therefore, the statement "Cyber Bullies are people who want to intentionally hurt or harass you" is true, as it accurately describes the behavior and motives of cyber bullies.

    Rate this question:

  • 20. 

    ____________ a way of gathering information about a person without openly asking questions.

    • A.

      Grooming process

    • B.

      Indirect Solicitation of Information

    • C.

      None of the Above

    Correct Answer
    B. Indirect Solicitation of Information
    Explanation
    Indirect Solicitation of Information refers to the act of obtaining information about a person without directly asking them questions. It involves using subtle methods such as observation, listening, or gathering information from other sources to gather information about someone. This approach is often used to gather information discreetly or in situations where direct questioning may not be appropriate or effective. The term "grooming process" does not accurately describe this concept, and "None of the Above" is not a valid option as there is a correct answer.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.