Ped Use & Digital Citizenship

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Freitagc
F
Freitagc
Community Contributor
Quizzes Created: 1 | Total Attempts: 220
| Attempts: 220
SettingsSettings
Please wait...
  • 1/60 Questions

    You must be aware of appropriateness of communications when using your PED. Inappropriate communication is prohibited:

    • In any public messages.
    • In any private messages.
    • In any material posted online by you.
    • All of the above.
Please wait...
Technology Use Quizzes & Trivia
About This Quiz

Thousand Islands High School

Directions: Multiple Choice: Choose the answer that best completes each statement or question.
After you have completed th presentation, follow the link to the quiz. You must receive an 85% or greater to register your PED.
Once you have completed the quiz print the certificate that has your name and grade and turn this into Mrs. Balk to register your device.


Quiz Preview

  • 2. 

    If you are asked to put your PED away during school: 

    • You must put it away immediately.

    • Ask why you need to put it away.

    • Ignore the question.

    • Say "I can't hear you with my earbuds in".

    Correct Answer
    A. You must put it away immediately.
    Explanation
    The correct answer is "You must put it away immediately." This is the appropriate response because it shows compliance with the instruction given by the school. It demonstrates respect for the rules and authority, prioritizing the academic environment over personal distractions.

    Rate this question:

  • 3. 

    Never agree to physically meet someone you met online:

    • Without parental permission.

    • Without teacher permission.

    • Without money in your pocket.

    • Without lunch.

    Correct Answer
    A. Without parental permission.
    Explanation
    Meeting someone you met online can be risky, especially for children and teenagers. Without parental permission, it is important to prioritize safety and avoid meeting strangers in person. Parents are responsible for ensuring the well-being of their children and granting permission allows them to assess the situation and take necessary precautions. Meeting someone without parental permission can expose individuals to potential dangers and compromising situations, making it crucial to involve parents in such decisions.

    Rate this question:

  • 4. 

    When dealing with people online, giving personal information is: 

    • Okay as long as these people live far away.

    • Never a good idea, no matter the reason.

    • Fine as long as the people are nice.

    • Nothing to worry about.

    Correct Answer
    A. Never a good idea, no matter the reason.
    Explanation
    Giving personal information online is never a good idea, regardless of the reason. This is because personal information can be easily misused or exploited by malicious individuals for various purposes such as identity theft, fraud, or harassment. It is important to prioritize privacy and security when interacting with people online to protect oneself from potential risks and maintain personal safety.

    Rate this question:

  • 5. 

    When should you give your password to another person: 

    • When your best friend has forgotten his and needs to log on to the computer to finish school work.

    • When your best friend asks you for your password.

    • When someone threatens you.

    • Never.

    Correct Answer
    A. Never.
    Explanation
    You should never give your password to another person because it compromises the security of your personal information. Sharing your password can lead to unauthorized access to your accounts, potential misuse of your data, and increase the risk of identity theft or cyber attacks. It is important to keep your password confidential and only use it for yourself to protect your online privacy and security.

    Rate this question:

  • 6. 

    The difference between safety and security is:

    • Safety is about making sure you don't get hurt or injured using technology and security is about protecting your identity.

    • Safety is about making sure people don't know who you are online and security is about making sure your computer doesn't get a virus.

    • Safety is about protecting your identity and Security is about logging off from your computer when it's not being used.

    Correct Answer
    A. Safety is about making sure you don't get hurt or injured using technology and security is about protecting your identity.
  • 7. 

    When dealing with strangers, online users should: 

    • Give personal information freely.

    • Be cautious about giving information.

    • Provide passwords and credit information if asked.

    • Not tell anyone about people they meet online.

    Correct Answer
    A. Be cautious about giving information.
    Explanation
    When dealing with strangers online, it is important for users to be cautious about giving out personal information. This is because sharing personal information freely can lead to privacy breaches, identity theft, and other cybercrimes. It is crucial to protect one's personal information and only share it with trusted sources. Therefore, being cautious about giving information is the safest approach when interacting with strangers online.

    Rate this question:

  • 8. 

    Physical injuries related to technology use: 

    • Are not a big deal and not a major problem.

    • Will not happen for many years, so should not be a priority.

    • Can have dramatic and painful effect on your body.

    • Are not a concern for school students.

    Correct Answer
    A. Can have dramatic and painful effect on your body.
    Explanation
    Physical injuries related to technology use can have dramatic and painful effects on the body. This means that if someone uses technology in a way that is not ergonomically correct or if they spend excessive amounts of time using technology, they may experience physical pain and discomfort. It is important to be aware of the potential risks and take steps to prevent or minimize these injuries.

    Rate this question:

  • 9. 

    What is Digital Citizenship:

    • To be part of an internet group.

    • To be a good person.

    • To have a good reputation on the digital world.

    • To play online games.

    Correct Answer
    A. To have a good reputation on the digital world.
    Explanation
    Digital citizenship refers to the responsible and ethical behavior of individuals in the online world. It involves understanding and practicing good online etiquette, respecting the rights and privacy of others, and being aware of the potential risks and consequences of online actions. Having a good reputation in the digital world is an important aspect of being a responsible digital citizen as it reflects one's integrity, credibility, and trustworthiness in the online community.

    Rate this question:

  • 10. 

    What are the potential consequences of sexting:

    • Damaged reputations.

    • Prosecution for possessing, sending, and/or receiving child pornography.

    • Damaged relationships.

    • All of the above.

    Correct Answer
    A. All of the above.
    Explanation
    The potential consequences of sexting include damaged reputations, prosecution for possessing, sending, and/or receiving child pornography, and damaged relationships. Sexting can lead to negative consequences such as public humiliation, legal consequences, and the breakdown of trust in personal relationships. Therefore, all of the options mentioned above are potential outcomes of engaging in sexting.

    Rate this question:

  • 11. 

    Your friend tells you about a website where you can download all of the latest songs that you hear on the radio for free. If you use this website for this purpose, you will be violating which of the following: 

    • Fair use.

    • Right to privacy.

    • Copyright.

    • Freedom of Information.

    Correct Answer
    A. Copyright.
    Explanation
    Using a website to download songs for free that are protected by copyright would be a violation of copyright law. Copyright grants exclusive rights to the creators of original works, such as songs, and allows them to control the distribution and reproduction of their work. Downloading copyrighted songs without permission or payment infringes upon the rights of the artists and the owners of the songs.

    Rate this question:

  • 12. 

    What is the benefit of being able to buy goods online:

    • Being lazy.

    • Less expensive and you do not need to use cash.

    • There are no benefits.

    • Not having to go to the store, and being able to look at the whole store collection of goods.

    Correct Answer
    A. Not having to go to the store, and being able to look at the whole store collection of goods.
    Explanation
    The benefit of being able to buy goods online is not having to go to the store and being able to look at the whole store collection of goods. This allows individuals to shop conveniently from the comfort of their own homes without the need to physically travel to a store. Additionally, online shopping provides the advantage of being able to browse through a wide range of products and compare prices easily, leading to a greater selection and potentially finding better deals.

    Rate this question:

  • 13. 

    Anti-Virus software relates to which element of Digital Citizenship: 

    • Digital Security.

    • Digital Rights and Responsibilities.

    • Digital Communication.

    • Digital Access.

    Correct Answer
    A. Digital Security.
    Explanation
    Anti-virus software is a tool designed to protect digital devices from malware, viruses, and other security threats. It plays a crucial role in ensuring the security and safety of digital systems. Digital Security is a key element of Digital Citizenship that emphasizes the importance of protecting oneself and others in the digital world. By using anti-virus software, individuals can actively practice digital security and fulfill their responsibilities towards maintaining a safe digital environment.

    Rate this question:

  • 14. 

    Sitting up straight and tall when in front of a computer is an example of: 

    • Digital Literacy.

    • Digital Health and Wellness.

    • Digital Etiquette.

    • Digital Communication.

    Correct Answer
    A. Digital Health and Wellness.
    Explanation
    Sitting up straight and tall when in front of a computer is an example of digital health and wellness. This practice promotes good posture and prevents the development of musculoskeletal problems that can arise from prolonged computer use. Digital health and wellness encompasses practices that prioritize physical and mental well-being while using digital devices. It includes activities such as taking breaks, practicing ergonomics, and maintaining a healthy balance between screen time and other activities.

    Rate this question:

  • 15. 

    What does "think before you post" mean:

    • Information you share online can be widely distributed.

    • Information shared online can be almost impossible to remove from the web.

    • Will sharing this information damage my reputation or that of someone else?

    • All of the above.

    Correct Answer
    A. All of the above.
    Explanation
    "Think before you post" means that one should carefully consider the potential consequences of sharing information online. The answer "All of the above" is correct because it encompasses all the given statements. Sharing information online can have far-reaching effects as it can be widely distributed and difficult to remove from the web. Additionally, one should consider whether sharing certain information could harm their own reputation or that of someone else.

    Rate this question:

  • 16. 

    What does AUP stand for:

    • Apple use policy.

    • Acceptable use policy.

    • Appropriate use program.

    • Appropriate use policy.

    Correct Answer
    A. Acceptable use policy.
    Explanation
    The correct answer is "Acceptable use policy". An acceptable use policy (AUP) is a set of rules and guidelines that define the acceptable and appropriate use of computer systems, networks, and resources. It outlines the responsibilities and expectations of users regarding the use of technology and helps to ensure that users understand and adhere to the rules to maintain a secure and productive computing environment.

    Rate this question:

  • 17. 

    Why is it important to know your information is safe:

    • Because nobody should know it.

    • So people don't stalk you or hack into your computer.

    • So that you can make your website anonymous.

    • It doesn't matter if it is safe or not.

    Correct Answer
    A. So people don't stalk you or hack into your computer.
    Explanation
    Knowing that your information is safe is important to prevent people from stalking you or hacking into your computer. This ensures your privacy and security, protecting your personal and sensitive data from being exploited or misused. By keeping your information secure, you can maintain control over your online presence and avoid potential harm or unauthorized access to your personal information.

    Rate this question:

  • 18. 

    Who is responsible for following the Acceptable Use Policy: 

    • Students.

    • Teachers.

    • The principal.

    • Everyone.

    Correct Answer
    A. Everyone.
    Explanation
    Everyone is responsible for following the Acceptable Use Policy. This means that both students and teachers, as well as the principal, have a responsibility to adhere to the guidelines outlined in the policy. The policy is applicable to all individuals within the organization, emphasizing the importance of everyone's compliance to ensure a safe and appropriate use of resources.

    Rate this question:

  • 19. 

    If someone puts copyrighted material on the internet and another person wants to use it, that person should:

    • Use it, if it is for educational use.

    • Take it, and use it as they want.

    • Not use the information because it is too much trouble.

    • Ask permission from the author or at least cite the source.

    Correct Answer
    A. Ask permission from the author or at least cite the source.
    Explanation
    If someone puts copyrighted material on the internet and another person wants to use it, they should ask permission from the author or at least cite the source. This is because using copyrighted material without permission is a violation of the author's rights. Asking for permission shows respect for the author's work and protects against potential legal consequences. Citing the source is also important as it gives credit to the original creator and allows others to verify the information.

    Rate this question:

  • 20. 

    In order to have a registered PED with TICSD what are you required to sign:

    • The Student Handbook.

    • The Acceptable Use Policy.

    • The Internet User Contract.

    • The Internet Account Policy.

    Correct Answer
    A. The Acceptable Use Policy.
    Explanation
    To have a registered PED with TICSD, you are required to sign the Acceptable Use Policy. This policy outlines the guidelines and rules for using the internet and technology provided by TICSD. By signing this policy, you agree to abide by the terms and conditions stated within it, ensuring responsible and appropriate use of the PED and its associated resources. The Student Handbook, Internet User Contract, and Internet Account Policy may contain other important information, but they are not specifically required for registering a PED with TICSD.

    Rate this question:

  • 21. 

    E-mail messages should be:  

    • Long and full of details.

    • Made up of many ideas.

    • Short and to the point.

    • Sent without a subject line.

    Correct Answer
    A. Short and to the point.
    Explanation
    E-mail messages should be short and to the point because lengthy and detailed emails can be overwhelming for the recipient and may result in important information being overlooked or misunderstood. A concise email ensures that the main message is clear and easily understood, saving time for both the sender and the recipient. Additionally, a brief email is more likely to hold the reader's attention and elicit a prompt response.

    Rate this question:

  • 22. 

    Sending text messages is an example of: 

    • Digital Communication.

    • Digital Etiquette.

    • Digital Literacy.

    • Digital Rights and Responsibilities.

    Correct Answer
    A. Digital Communication.
    Explanation
    Sending text messages involves the use of digital devices and technology to transmit written messages. It is a form of communication that relies on digital platforms such as smartphones and computers. Digital communication refers to the exchange of information through electronic means, and sending text messages falls under this category. It allows individuals to communicate quickly and efficiently, making it a common method of communication in today's digital age.

    Rate this question:

  • 23. 

    Who is liable for the loss, damage, misuse, or theft of your PED during School: 

    • The school district.

    • Your teacher.

    • Your friend.

    • You.

    Correct Answer
    A. You.
    Explanation
    You are liable for the loss, damage, misuse, or theft of your PED during school. This means that you are responsible for any harm or loss that occurs to your personal electronic device while you are at school. It is important to take care of your belongings and keep them safe to avoid any potential issues.

    Rate this question:

  • 24. 

    What is the benefit of having Digital Access at school:

    • To go on facebook, myspace, and twitter.

    • To be able to check your personal e-mail.

    • To learn digitally, other than just pen and paper.

    • There are no benefits. Pen and paper is the best way to learn everything in this modern world.

    Correct Answer
    A. To learn digitally, other than just pen and paper.
    Explanation
    The benefit of having Digital Access at school is to learn digitally, other than just pen and paper. This means that students can use digital resources such as online textbooks, educational websites, and multimedia tools to enhance their learning experience. Digital access allows for more interactive and engaging learning opportunities, as well as access to a wide range of information and resources that may not be available in traditional pen and paper formats.

    Rate this question:

  • 25. 

    What is the negative side of being able to have digital access:

    • To have a lot of tools that you can use for school.

    • Facebook, myspace, and twitter.

    • There are no negative sides. Everything you want you can have digitally.

    • To become addicted to the internet, having no social life with family or friends.

    Correct Answer
    A. To become addicted to the internet, having no social life with family or friends.
    Explanation
    The negative side of having digital access is becoming addicted to the internet and losing social connections with family and friends. This addiction can lead to spending excessive amounts of time online, neglecting personal relationships and responsibilities. It can also result in isolation and a lack of real-life social interactions, which are important for overall well-being and mental health.

    Rate this question:

  • 26. 

    What is the negative side of buying goods online:

    • There are no negative sides. It's perfect. You don't need to move.

    • More expensive.

    • It requires your personal information and credit card number.

    • You have to look through many things to find what you want.

    Correct Answer
    A. It requires your personal information and credit card number.
    Explanation
    Buying goods online requires providing personal information and credit card details, which can be a negative aspect. This information can be at risk of being stolen or misused by hackers or fraudulent websites. Additionally, some people may feel uncomfortable sharing their personal information online, leading to concerns about privacy and security.

    Rate this question:

  • 27. 

    When using a PED, a user should:

    • Do whatever they want, no one ever checks.

    • Ask teachers and parents about what can be done.

    • Not ask parents and teachers because they never allow anything.

    • Ask their friends because they know about technology.

    Correct Answer
    A. Ask teachers and parents about what can be done.
    Explanation
    When using a PED (Personal Electronic Device), it is important for a user to ask teachers and parents about what can be done. This is because teachers and parents are responsible for setting guidelines and rules regarding the use of electronic devices. They can provide valuable information about appropriate and safe usage, as well as any restrictions or limitations that may be in place. Seeking guidance from trusted adults ensures that the user is using their PED responsibly and in accordance with the rules set by their educational institution or household.

    Rate this question:

  • 28. 

    When can you use your PED device during class:

    • Anytime.

    • When you have permission from your teacher.

    • When you have permission from your parent.

    • Never.

    Correct Answer
    A. When you have permission from your teacher.
    Explanation
    The correct answer is "When you have permission from your teacher." This means that you can use your PED device during class only if your teacher allows it. It is important to seek permission from your teacher before using any electronic device in the classroom to ensure that it does not disrupt the learning environment or distract other students.

    Rate this question:

  • 29. 

    If you question if a certain activity violates the acceptable use policy you should: 

    • Use your better judgement.

    • Just do it. Time is precious.

    • Ask a friend.

    • Ask your teacher.

    Correct Answer
    A. Ask your teacher.
    Explanation
    When questioning if a certain activity violates the acceptable use policy, it is best to ask your teacher for clarification. They are the authority figure who can provide guidance and ensure that you are following the rules and guidelines set by the policy. Using your better judgement may not always be enough as there may be specific nuances or exceptions that only your teacher can explain. Asking a friend may not guarantee accurate information, and "just doing it" without seeking clarification can lead to potential violations and consequences.

    Rate this question:

  • 30. 

    What information should you never share online:

    • Your first name.

    • Your address.

    • Your favorite band.

    • All of the above.

    Correct Answer
    A. Your address.
    Explanation
    The correct answer is "your address." Sharing personal information like your address online can pose a significant risk to your safety and privacy. It can make you vulnerable to identity theft, stalking, or even physical harm. While sharing your first name or favorite band may not have the same level of risk, it is still advisable to be cautious about sharing too much personal information online.

    Rate this question:

  • 31. 

    When is it OK to use your PED to record audio, video, or take pictures of any student or teacher: 

    • Never.

    • When permission is given by the teacher or student and it is for an educational project or activity.

    • When the teacher or student is not aware that your are recording.

    • Always.

    Correct Answer
    A. When permission is given by the teacher or student and it is for an educational project or activity.
    Explanation
    The correct answer is "When permission is given by the teacher or student and it is for an educational project or activity." This means that it is acceptable to use your PED (Personal Electronic Device) to record audio, video, or take pictures of any student or teacher only when you have obtained permission from the person being recorded and it is for educational purposes. This ensures that privacy and consent are respected while allowing for educational opportunities.

    Rate this question:

  • 32. 

    If you click on a weblink and it takes you to a website that is inappropriate, what should you do: 

    • Show the friend that is sitting next to you.

    • Check the webpage out.

    • Tell your teacher.

    • Let students aware of this site.

    Correct Answer
    A. Tell your teacher.
    Explanation
    If you come across an inappropriate website after clicking on a weblink, the best course of action would be to inform your teacher. They are responsible for maintaining a safe and appropriate learning environment, and they will be able to address the issue and take appropriate action. Showing the website to a friend or checking it out yourself may not be the most responsible or effective way to handle the situation, and it is important to involve a trusted adult who can handle the matter appropriately.

    Rate this question:

  • 33. 

    What should you do if you are being cyberbullied:

    • Be mature and just ignore it.

    • Tell someone and keep the evidence.

    • Be strong and use similar methods in return.

    • All of the above.

    Correct Answer
    A. Tell someone and keep the evidence.
    Explanation
    If you are being cyberbullied, it is important to tell someone and keep the evidence. Cyberbullying can have serious emotional and psychological effects, so it is crucial to seek support from a trusted adult or authority figure who can help address the situation. Keeping evidence of the cyberbullying can also be useful in providing proof of the harassment and assisting in any potential investigations or legal actions that may be taken. Ignoring the cyberbullying or retaliating with similar methods may not effectively address the issue and could potentially escalate the situation further.

    Rate this question:

  • 34. 

    What are the benefits of Digital Communication:

    • To be able to see friends without meeting them face to face.

    • To meet strangers.

    • To share personal information with everyone.

    • There are no benefits.

    Correct Answer
    A. To be able to see friends without meeting them face to face.
    Explanation
    The correct answer is "To be able to see friends without meeting them face to face." This answer highlights one of the main benefits of digital communication, which is the ability to connect with friends and loved ones even when they are physically far away. Through various digital platforms such as video calls, social media, and messaging apps, people can maintain relationships and stay connected despite distance or other barriers.

    Rate this question:

  • 35. 

    When can you text message during the school day:

    • Never.

    • When you have permission from your teacher.

    • When noone is looking.

    • Anytime.

    Correct Answer
    A. When you have permission from your teacher.
    Explanation
    The correct answer is "When you have permission from your teacher." This answer is the most appropriate because it implies that texting during the school day is generally not allowed unless a student receives explicit permission from their teacher. This suggests that there are specific circumstances in which texting may be permitted, but it is not a free-for-all and should be regulated by the teacher.

    Rate this question:

  • 36. 

    Where you sit or relax when you work with technology: 

    • Doesn't matter as long as you are comfortable.

    • Depends on where you are.

    • Isn't something to worry about.

    • Is important, because improper seating cause physical problems later.

    Correct Answer
    A. Is important, because improper seating cause physical problems later.
    Explanation
    It is important to have proper seating when working with technology because improper seating can cause physical problems later. Sitting in a comfortable and ergonomic position helps to maintain good posture and reduces the risk of developing musculoskeletal issues such as back pain, neck strain, and repetitive strain injuries. Therefore, paying attention to seating arrangements is crucial for maintaining good health and preventing long-term physical problems.

    Rate this question:

  • 37. 

    What helps prevent inappropriate use of your PED:

    • Signing the AUP.

    • Being connected through the TICSD filtering system.

    • Sharing your PED with a friend.

    • Texting.

    Correct Answer
    A. Being connected through the TICSD filtering system.
    Explanation
    Being connected through the TICSD filtering system helps prevent inappropriate use of your PED. The TICSD filtering system is designed to block access to websites and content that may be inappropriate or harmful. By connecting through this system, it ensures that your PED is filtered and restricted from accessing such content, thus promoting a safer and more secure online experience. Signing the AUP is also important, as it sets guidelines and rules for appropriate use, but being connected through the TICSD filtering system is specifically focused on preventing inappropriate use. Sharing your PED with a friend or texting are not effective measures in preventing inappropriate use.

    Rate this question:

  • 38. 

    What is the problem with opening an email from someone you don't recognize and with a strange Subject Line:

    • It wastes storage space on your hard drive.

    • It might contain a computer virus.

    • It wastes your valuable time.

    • All of the above.

    Correct Answer
    A. It might contain a computer virus.
    Explanation
    Opening an email from someone you don't recognize and with a strange subject line might contain a computer virus. Computer viruses can be disguised as email attachments or embedded in links within the email. When the email is opened, the virus can infect the computer, causing harm to the system, stealing personal information, or spreading to other devices on the network. Therefore, it is important to be cautious and avoid opening emails from unknown sources to protect the computer and personal data from potential threats.

    Rate this question:

  • 39. 

    Who has to sign the AUP contract:

    • Parents.

    • Students.

    • Teachers.

    • All of the above.

    Correct Answer
    A. All of the above.
    Explanation
    The AUP (Acceptable Use Policy) contract is a document that outlines the guidelines and rules for using technology or accessing the internet. It is important for all parties involved, including parents, students, and teachers, to sign the AUP contract. This ensures that everyone is aware of and agrees to the terms and conditions set forth in the contract. By signing the contract, all parties take responsibility for their actions and commit to using technology in a safe and responsible manner.

    Rate this question:

  • 40. 

    During school hours the correct cell phone ringer setting is: 

    • Low or off.

    • Vibrate or off.

    • Specialized ring tone.

    • High.

    Correct Answer
    A. Vibrate or off.
    Explanation
    During school hours, it is important for students to minimize distractions and disruptions in the classroom. Having a cell phone on a low or off setting ensures that it does not ring or make any noise that could disturb the learning environment. Alternatively, having the phone on vibrate mode also prevents any audible disruptions while still allowing the user to receive notifications silently. Therefore, setting the cell phone ringer to vibrate or off is the correct choice during school hours.

    Rate this question:

  • 41. 

    The intended purpose for the use of your PED is for:

    • Educational purposes.

    • Texting with your friends.

    • Keeping your parents informed of your activities throughout the day.

    • Digital Commerce.

    Correct Answer
    A. Educational purposes.
    Explanation
    The intended purpose for the use of your PED (Personal Electronic Device) is for educational purposes. This suggests that the device is primarily meant to be used for educational activities such as studying, research, accessing educational resources, and learning. It is not meant for texting with friends, keeping parents informed, or engaging in digital commerce.

    Rate this question:

  • 42. 

    If you use your PED improperly, which of these consequences might take place: 

    • Loose permission to use your PED.

    • Disciplinary action by the principal.

    • Arrest and prosecution.

    • All of the above.

    Correct Answer
    A. All of the above.
    Explanation
    If you use your PED (Personal Electronic Device) improperly, such as violating rules or policies, all of the mentioned consequences might take place. You could lose permission to use your PED, face disciplinary action by the principal, and even be arrested and prosecuted depending on the severity of the misconduct.

    Rate this question:

  • 43. 

    All PED's must access the internet via:

    • 3G.

    • 4G.

    • The schools filtering system.

    • All of the above.

    Correct Answer
    A. The schools filtering system.
    Explanation
    The correct answer is "The schools filtering system." This is because the question states that all PEDs (Portable Electronic Devices) must access the internet via a certain method. Out of the given options, only the schools filtering system is a valid method for accessing the internet. 3G and 4G are mobile network technologies and do not represent a method for accessing the internet. Therefore, the correct answer is the schools filtering system.

    Rate this question:

  • 44. 

    Why was the acceptable use policy implemented:

    • To protect all internet users.

    • To monitor the internet.

    • To ensure integrity of internet.

    • Both A and C.

    Correct Answer
    A. Both A and C.
    Explanation
    The acceptable use policy was implemented to protect all internet users and ensure the integrity of the internet. By having this policy in place, it sets guidelines and rules for how the internet should be used, preventing any misuse or harm to users. It also helps in maintaining the integrity of the internet by promoting ethical and responsible use, preventing any unauthorized access or malicious activities. By selecting both options A and C, it acknowledges that the implementation of the policy serves the purpose of protecting users and maintaining the integrity of the internet simultaneously.

    Rate this question:

  • 45. 

    What is one reason that it is important to be a good Digital Citizen:

    • It can make you famous.

    • It can affect you from getting a good job.

    • It will make many people like you.

    • It's not important to be a good Digital Citizen.

    Correct Answer
    A. It can affect you from getting a good job.
    Explanation
    Being a good digital citizen is important because it can affect your chances of getting a good job. In today's digital age, employers often conduct online searches and review social media profiles of potential candidates. If someone has a negative online presence, such as engaging in cyberbullying or posting inappropriate content, it can create a negative impression on employers and impact their decision to hire. On the other hand, being a responsible digital citizen by maintaining a positive online presence, respecting others' privacy, and using technology ethically can enhance one's professional reputation and increase job prospects.

    Rate this question:

  • 46. 

    Which of the following devices is not allowed to be used in school:

    • Cell Phone.

    • Tablet.

    • E-Reader.

    • Playstation.

    Correct Answer
    A. Playstation.
    Explanation
    Playstation is not allowed to be used in school because it is primarily a gaming console and can be a distraction to students. Unlike cell phones, tablets, and e-readers, which can be used for educational purposes, a Playstation is solely for entertainment purposes and does not contribute to the learning environment in a school setting.

    Rate this question:

  • 47. 

    Hacking, pirated software, and identity theft are in violation of which of the elements of Digital Citizenship:

    • Digital Etiquette.

    • Digital Security.

    • Digital Access.

    • Digital Law.

    Correct Answer
    A. Digital Law.
    Explanation
    Hacking, pirated software, and identity theft are all activities that are illegal and against the law in the digital world. They involve unauthorized access, distribution, and use of digital resources, which is a violation of digital laws and regulations. Digital Law encompasses the legal rights and responsibilities of individuals in the digital space, including issues related to privacy, copyright, and cybercrime. Therefore, these activities are in violation of the element of Digital Law in Digital Citizenship.

    Rate this question:

  • 48. 

    Where can you find a copy of the AUP:

    • The student agenda book.

    • Computer class.

    • People Magazine.

    • Nurses Office.

    Correct Answer
    A. The student agenda book.
    Explanation
    The AUP (Acceptable Use Policy) is a set of guidelines that outlines the proper use of technology resources in an educational setting. It is typically provided to students and staff to ensure responsible and appropriate use of computers and other devices. The student agenda book is a common place to find a copy of the AUP as it serves as a reference guide for students, containing important information such as school policies, rules, and guidelines.

    Rate this question:

  • 49. 

    Explaining to your mom how to send an email is an example of: 

    • Digital Commerce.

    • Digital Literacy.

    • Digital Access.

    • Digital Security.

    Correct Answer
    A. Digital Literacy.
    Explanation
    Explaining to your mom how to send an email falls under the category of digital literacy. Digital literacy refers to the ability to use and navigate digital technologies effectively and responsibly. In this scenario, you are helping your mom develop the necessary skills and knowledge to operate email, which is a fundamental aspect of digital literacy.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 28, 2013
    Quiz Created by
    Freitagc
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.