Ped Use & Digital Citizenship

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Freitagc
F
Freitagc
Community Contributor
Quizzes Created: 1 | Total Attempts: 220
| Attempts: 220 | Questions: 60
Please wait...
Question 1 / 60
0 %
0/100
Score 0/100
1. You must be aware of appropriateness of communications when using your PED. Inappropriate communication is prohibited:

Explanation

The correct answer is "All of the above." This means that inappropriate communication is prohibited in any public messages, any private messages, and any material posted online by you. This implies that regardless of the platform or medium, it is important to be mindful of the appropriateness of your communications when using your PED (Personal Electronic Device).

Submit
Please wait...
About This Quiz
Technology Use Quizzes & Trivia

Thousand Islands High School

Directions: Multiple Choice: Choose the answer that best completes each statement or question.
After you have completed th presentation, follow the link to... see morethe quiz. You must receive an 85% or greater to register your PED.
Once you have completed the quiz print the certificate that has your name and grade and turn this into Mrs. Balk to register your device. see less

2. If you are asked to put your PED away during school: 

Explanation

The correct answer is "You must put it away immediately." This is the appropriate response because it shows compliance with the instruction given by the school. It demonstrates respect for the rules and authority, prioritizing the academic environment over personal distractions.

Submit
3. Never agree to physically meet someone you met online:

Explanation

Meeting someone you met online can be risky, especially for children and teenagers. Without parental permission, it is important to prioritize safety and avoid meeting strangers in person. Parents are responsible for ensuring the well-being of their children and granting permission allows them to assess the situation and take necessary precautions. Meeting someone without parental permission can expose individuals to potential dangers and compromising situations, making it crucial to involve parents in such decisions.

Submit
4. When should you give your password to another person: 

Explanation

You should never give your password to another person because it compromises the security of your personal information. Sharing your password can lead to unauthorized access to your accounts, potential misuse of your data, and increase the risk of identity theft or cyber attacks. It is important to keep your password confidential and only use it for yourself to protect your online privacy and security.

Submit
5. When dealing with people online, giving personal information is: 

Explanation

Giving personal information online is never a good idea, regardless of the reason. This is because personal information can be easily misused or exploited by malicious individuals for various purposes such as identity theft, fraud, or harassment. It is important to prioritize privacy and security when interacting with people online to protect oneself from potential risks and maintain personal safety.

Submit
6. The difference between safety and security is:

Explanation

not-available-via-ai

Submit
7. When dealing with strangers, online users should: 

Explanation

When dealing with strangers online, it is important for users to be cautious about giving out personal information. This is because sharing personal information freely can lead to privacy breaches, identity theft, and other cybercrimes. It is crucial to protect one's personal information and only share it with trusted sources. Therefore, being cautious about giving information is the safest approach when interacting with strangers online.

Submit
8. Physical injuries related to technology use: 

Explanation

Physical injuries related to technology use can have dramatic and painful effects on the body. This means that if someone uses technology in a way that is not ergonomically correct or if they spend excessive amounts of time using technology, they may experience physical pain and discomfort. It is important to be aware of the potential risks and take steps to prevent or minimize these injuries.

Submit
9. What is Digital Citizenship:

Explanation

Digital citizenship refers to the responsible and ethical behavior of individuals in the online world. It involves understanding and practicing good online etiquette, respecting the rights and privacy of others, and being aware of the potential risks and consequences of online actions. Having a good reputation in the digital world is an important aspect of being a responsible digital citizen as it reflects one's integrity, credibility, and trustworthiness in the online community.

Submit
10. Your friend tells you about a website where you can download all of the latest songs that you hear on the radio for free. If you use this website for this purpose, you will be violating which of the following: 

Explanation

Using a website to download songs for free that are protected by copyright would be a violation of copyright law. Copyright grants exclusive rights to the creators of original works, such as songs, and allows them to control the distribution and reproduction of their work. Downloading copyrighted songs without permission or payment infringes upon the rights of the artists and the owners of the songs.

Submit
11. What are the potential consequences of sexting:

Explanation

The potential consequences of sexting include damaged reputations, prosecution for possessing, sending, and/or receiving child pornography, and damaged relationships. Sexting can lead to negative consequences such as public humiliation, legal consequences, and the breakdown of trust in personal relationships. Therefore, all of the options mentioned above are potential outcomes of engaging in sexting.

Submit
12. What is the benefit of being able to buy goods online:

Explanation

The benefit of being able to buy goods online is not having to go to the store and being able to look at the whole store collection of goods. This allows individuals to shop conveniently from the comfort of their own homes without the need to physically travel to a store. Additionally, online shopping provides the advantage of being able to browse through a wide range of products and compare prices easily, leading to a greater selection and potentially finding better deals.

Submit
13. Anti-Virus software relates to which element of Digital Citizenship: 

Explanation

Anti-virus software is a tool designed to protect digital devices from malware, viruses, and other security threats. It plays a crucial role in ensuring the security and safety of digital systems. Digital Security is a key element of Digital Citizenship that emphasizes the importance of protecting oneself and others in the digital world. By using anti-virus software, individuals can actively practice digital security and fulfill their responsibilities towards maintaining a safe digital environment.

Submit
14. Sitting up straight and tall when in front of a computer is an example of: 

Explanation

Sitting up straight and tall when in front of a computer is an example of digital health and wellness. This practice promotes good posture and prevents the development of musculoskeletal problems that can arise from prolonged computer use. Digital health and wellness encompasses practices that prioritize physical and mental well-being while using digital devices. It includes activities such as taking breaks, practicing ergonomics, and maintaining a healthy balance between screen time and other activities.

Submit
15. What does "think before you post" mean:

Explanation

"Think before you post" means that one should carefully consider the potential consequences of sharing information online. The answer "All of the above" is correct because it encompasses all the given statements. Sharing information online can have far-reaching effects as it can be widely distributed and difficult to remove from the web. Additionally, one should consider whether sharing certain information could harm their own reputation or that of someone else.

Submit
16. If someone puts copyrighted material on the internet and another person wants to use it, that person should:

Explanation

If someone puts copyrighted material on the internet and another person wants to use it, they should ask permission from the author or at least cite the source. This is because using copyrighted material without permission is a violation of the author's rights. Asking for permission shows respect for the author's work and protects against potential legal consequences. Citing the source is also important as it gives credit to the original creator and allows others to verify the information.

Submit
17. What does AUP stand for:

Explanation

The correct answer is "Acceptable use policy". An acceptable use policy (AUP) is a set of rules and guidelines that define the acceptable and appropriate use of computer systems, networks, and resources. It outlines the responsibilities and expectations of users regarding the use of technology and helps to ensure that users understand and adhere to the rules to maintain a secure and productive computing environment.

Submit
18. Why is it important to know your information is safe:

Explanation

Knowing that your information is safe is important to prevent people from stalking you or hacking into your computer. This ensures your privacy and security, protecting your personal and sensitive data from being exploited or misused. By keeping your information secure, you can maintain control over your online presence and avoid potential harm or unauthorized access to your personal information.

Submit
19. Who is responsible for following the Acceptable Use Policy

Explanation

Everyone is responsible for following the Acceptable Use Policy. This means that both students and teachers, as well as the principal, have a responsibility to adhere to the guidelines outlined in the policy. The policy is applicable to all individuals within the organization, emphasizing the importance of everyone's compliance to ensure a safe and appropriate use of resources.

Submit
20. Who is liable for the loss, damage, misuse, or theft of your PED during School: 

Explanation

You are liable for the loss, damage, misuse, or theft of your PED during school. This means that you are responsible for any harm or loss that occurs to your personal electronic device while you are at school. It is important to take care of your belongings and keep them safe to avoid any potential issues.

Submit
21. In order to have a registered PED with TICSD what are you required to sign:

Explanation

To have a registered PED with TICSD, you are required to sign the Acceptable Use Policy. This policy outlines the guidelines and rules for using the internet and technology provided by TICSD. By signing this policy, you agree to abide by the terms and conditions stated within it, ensuring responsible and appropriate use of the PED and its associated resources. The Student Handbook, Internet User Contract, and Internet Account Policy may contain other important information, but they are not specifically required for registering a PED with TICSD.

Submit
22. Sending text messages is an example of: 

Explanation

Sending text messages involves the use of digital devices and technology to transmit written messages. It is a form of communication that relies on digital platforms such as smartphones and computers. Digital communication refers to the exchange of information through electronic means, and sending text messages falls under this category. It allows individuals to communicate quickly and efficiently, making it a common method of communication in today's digital age.

Submit
23. E-mail messages should be:  

Explanation

E-mail messages should be short and to the point because lengthy and detailed emails can be overwhelming for the recipient and may result in important information being overlooked or misunderstood. A concise email ensures that the main message is clear and easily understood, saving time for both the sender and the recipient. Additionally, a brief email is more likely to hold the reader's attention and elicit a prompt response.

Submit
24. What is the benefit of having Digital Access at school:

Explanation

The benefit of having Digital Access at school is to learn digitally, other than just pen and paper. This means that students can use digital resources such as online textbooks, educational websites, and multimedia tools to enhance their learning experience. Digital access allows for more interactive and engaging learning opportunities, as well as access to a wide range of information and resources that may not be available in traditional pen and paper formats.

Submit
25. What is the negative side of being able to have digital access:

Explanation

The negative side of having digital access is becoming addicted to the internet and losing social connections with family and friends. This addiction can lead to spending excessive amounts of time online, neglecting personal relationships and responsibilities. It can also result in isolation and a lack of real-life social interactions, which are important for overall well-being and mental health.

Submit
26. When using a PED, a user should:

Explanation

When using a PED (Personal Electronic Device), it is important for a user to ask teachers and parents about what can be done. This is because teachers and parents are responsible for setting guidelines and rules regarding the use of electronic devices. They can provide valuable information about appropriate and safe usage, as well as any restrictions or limitations that may be in place. Seeking guidance from trusted adults ensures that the user is using their PED responsibly and in accordance with the rules set by their educational institution or household.

Submit
27. What is the negative side of buying goods online:

Explanation

Buying goods online requires providing personal information and credit card details, which can be a negative aspect. This information can be at risk of being stolen or misused by hackers or fraudulent websites. Additionally, some people may feel uncomfortable sharing their personal information online, leading to concerns about privacy and security.

Submit
28. When can you use your PED device during class:

Explanation

The correct answer is "When you have permission from your teacher." This means that you can use your PED device during class only if your teacher allows it. It is important to seek permission from your teacher before using any electronic device in the classroom to ensure that it does not disrupt the learning environment or distract other students.

Submit
29. If you question if a certain activity violates the acceptable use policy you should: 

Explanation

When questioning if a certain activity violates the acceptable use policy, it is best to ask your teacher for clarification. They are the authority figure who can provide guidance and ensure that you are following the rules and guidelines set by the policy. Using your better judgement may not always be enough as there may be specific nuances or exceptions that only your teacher can explain. Asking a friend may not guarantee accurate information, and "just doing it" without seeking clarification can lead to potential violations and consequences.

Submit
30. What information should you never share online:

Explanation

The correct answer is "your address." Sharing personal information like your address online can pose a significant risk to your safety and privacy. It can make you vulnerable to identity theft, stalking, or even physical harm. While sharing your first name or favorite band may not have the same level of risk, it is still advisable to be cautious about sharing too much personal information online.

Submit
31. When is it OK to use your PED to record audio, video, or take pictures of any student or teacher: 

Explanation

The correct answer is "When permission is given by the teacher or student and it is for an educational project or activity." This means that it is acceptable to use your PED (Personal Electronic Device) to record audio, video, or take pictures of any student or teacher only when you have obtained permission from the person being recorded and it is for educational purposes. This ensures that privacy and consent are respected while allowing for educational opportunities.

Submit
32. If you click on a weblink and it takes you to a website that is inappropriate, what should you do: 

Explanation

If you come across an inappropriate website after clicking on a weblink, the best course of action would be to inform your teacher. They are responsible for maintaining a safe and appropriate learning environment, and they will be able to address the issue and take appropriate action. Showing the website to a friend or checking it out yourself may not be the most responsible or effective way to handle the situation, and it is important to involve a trusted adult who can handle the matter appropriately.

Submit
33. Where you sit or relax when you work with technology: 

Explanation

It is important to have proper seating when working with technology because improper seating can cause physical problems later. Sitting in a comfortable and ergonomic position helps to maintain good posture and reduces the risk of developing musculoskeletal issues such as back pain, neck strain, and repetitive strain injuries. Therefore, paying attention to seating arrangements is crucial for maintaining good health and preventing long-term physical problems.

Submit
34. What should you do if you are being cyberbullied:

Explanation

If you are being cyberbullied, it is important to tell someone and keep the evidence. Cyberbullying can have serious emotional and psychological effects, so it is crucial to seek support from a trusted adult or authority figure who can help address the situation. Keeping evidence of the cyberbullying can also be useful in providing proof of the harassment and assisting in any potential investigations or legal actions that may be taken. Ignoring the cyberbullying or retaliating with similar methods may not effectively address the issue and could potentially escalate the situation further.

Submit
35. What are the benefits of Digital Communication:

Explanation

The correct answer is "To be able to see friends without meeting them face to face." This answer highlights one of the main benefits of digital communication, which is the ability to connect with friends and loved ones even when they are physically far away. Through various digital platforms such as video calls, social media, and messaging apps, people can maintain relationships and stay connected despite distance or other barriers.

Submit
36. When can you text message during the school day:

Explanation

The correct answer is "When you have permission from your teacher." This answer is the most appropriate because it implies that texting during the school day is generally not allowed unless a student receives explicit permission from their teacher. This suggests that there are specific circumstances in which texting may be permitted, but it is not a free-for-all and should be regulated by the teacher.

Submit
37. What helps prevent inappropriate use of your PED:

Explanation

Being connected through the TICSD filtering system helps prevent inappropriate use of your PED. The TICSD filtering system is designed to block access to websites and content that may be inappropriate or harmful. By connecting through this system, it ensures that your PED is filtered and restricted from accessing such content, thus promoting a safer and more secure online experience. Signing the AUP is also important, as it sets guidelines and rules for appropriate use, but being connected through the TICSD filtering system is specifically focused on preventing inappropriate use. Sharing your PED with a friend or texting are not effective measures in preventing inappropriate use.

Submit
38. What is the problem with opening an email from someone you don't recognize and with a strange Subject Line:

Explanation

Opening an email from someone you don't recognize and with a strange subject line might contain a computer virus. Computer viruses can be disguised as email attachments or embedded in links within the email. When the email is opened, the virus can infect the computer, causing harm to the system, stealing personal information, or spreading to other devices on the network. Therefore, it is important to be cautious and avoid opening emails from unknown sources to protect the computer and personal data from potential threats.

Submit
39. Who has to sign the AUP contract:

Explanation

The AUP (Acceptable Use Policy) contract is a document that outlines the guidelines and rules for using technology or accessing the internet. It is important for all parties involved, including parents, students, and teachers, to sign the AUP contract. This ensures that everyone is aware of and agrees to the terms and conditions set forth in the contract. By signing the contract, all parties take responsibility for their actions and commit to using technology in a safe and responsible manner.

Submit
40. During school hours the correct cell phone ringer setting is: 

Explanation

During school hours, it is important for students to minimize distractions and disruptions in the classroom. Having a cell phone on a low or off setting ensures that it does not ring or make any noise that could disturb the learning environment. Alternatively, having the phone on vibrate mode also prevents any audible disruptions while still allowing the user to receive notifications silently. Therefore, setting the cell phone ringer to vibrate or off is the correct choice during school hours.

Submit
41. The intended purpose for the use of your PED is for:

Explanation

The intended purpose for the use of your PED (Personal Electronic Device) is for educational purposes. This suggests that the device is primarily meant to be used for educational activities such as studying, research, accessing educational resources, and learning. It is not meant for texting with friends, keeping parents informed, or engaging in digital commerce.

Submit
42. If you use your PED improperly, which of these consequences might take place: 

Explanation

If you use your PED (Personal Electronic Device) improperly, such as violating rules or policies, all of the mentioned consequences might take place. You could lose permission to use your PED, face disciplinary action by the principal, and even be arrested and prosecuted depending on the severity of the misconduct.

Submit
43. All PED's must access the internet via:

Explanation

The correct answer is "The schools filtering system." This is because the question states that all PEDs (Portable Electronic Devices) must access the internet via a certain method. Out of the given options, only the schools filtering system is a valid method for accessing the internet. 3G and 4G are mobile network technologies and do not represent a method for accessing the internet. Therefore, the correct answer is the schools filtering system.

Submit
44. Why was the acceptable use policy implemented:

Explanation

The acceptable use policy was implemented to protect all internet users and ensure the integrity of the internet. By having this policy in place, it sets guidelines and rules for how the internet should be used, preventing any misuse or harm to users. It also helps in maintaining the integrity of the internet by promoting ethical and responsible use, preventing any unauthorized access or malicious activities. By selecting both options A and C, it acknowledges that the implementation of the policy serves the purpose of protecting users and maintaining the integrity of the internet simultaneously.

Submit
45. What is one reason that it is important to be a good Digital Citizen:

Explanation

Being a good digital citizen is important because it can affect your chances of getting a good job. In today's digital age, employers often conduct online searches and review social media profiles of potential candidates. If someone has a negative online presence, such as engaging in cyberbullying or posting inappropriate content, it can create a negative impression on employers and impact their decision to hire. On the other hand, being a responsible digital citizen by maintaining a positive online presence, respecting others' privacy, and using technology ethically can enhance one's professional reputation and increase job prospects.

Submit
46. Which of the following devices is not allowed to be used in school:

Explanation

Playstation is not allowed to be used in school because it is primarily a gaming console and can be a distraction to students. Unlike cell phones, tablets, and e-readers, which can be used for educational purposes, a Playstation is solely for entertainment purposes and does not contribute to the learning environment in a school setting.

Submit
47. Hacking, pirated software, and identity theft are in violation of which of the elements of Digital Citizenship:

Explanation

Hacking, pirated software, and identity theft are all activities that are illegal and against the law in the digital world. They involve unauthorized access, distribution, and use of digital resources, which is a violation of digital laws and regulations. Digital Law encompasses the legal rights and responsibilities of individuals in the digital space, including issues related to privacy, copyright, and cybercrime. Therefore, these activities are in violation of the element of Digital Law in Digital Citizenship.

Submit
48. Where can you find a copy of the AUP:

Explanation

The AUP (Acceptable Use Policy) is a set of guidelines that outlines the proper use of technology resources in an educational setting. It is typically provided to students and staff to ensure responsible and appropriate use of computers and other devices. The student agenda book is a common place to find a copy of the AUP as it serves as a reference guide for students, containing important information such as school policies, rules, and guidelines.

Submit
49. Explaining to your mom how to send an email is an example of: 

Explanation

Explaining to your mom how to send an email falls under the category of digital literacy. Digital literacy refers to the ability to use and navigate digital technologies effectively and responsibly. In this scenario, you are helping your mom develop the necessary skills and knowledge to operate email, which is a fundamental aspect of digital literacy.

Submit
50. What is PED:

Explanation

PED stands for Personal Electronic Device. This term refers to any electronic device that an individual owns and uses for personal purposes. In the context of the given options, "All of the above" is the correct answer because it encompasses both the definitions provided. PED allows students to use their own personal technology at school to enhance their learning experience, and it also enables them to use a device they are already familiar with from outside the classroom.

Submit
51. Demonstrating good conduct and being a responsible user of your PED is an example of: 

Explanation

Demonstrating good conduct and being a responsible user of your PED (Personal Electronic Device) refers to following the appropriate behavior and guidelines while using digital technology. This includes respecting others' privacy, being mindful of the content shared online, and using technology in a respectful and responsible manner. This falls under the concept of Digital Etiquette, which encompasses the proper use of digital devices and platforms in a socially acceptable way.

Submit
52. Information on the Internet is: 

Explanation

The correct answer is that information on the Internet is copyrighted and should be treated as other's property. This means that the content found on the Internet, such as articles, images, videos, and music, is protected by copyright laws and cannot be used or reproduced without permission from the original creator. It is important to respect these rights and give credit to the rightful owners when using their work.

Submit
53. It's important to teach people how to use technology in a way that is safe and appropriate. People should learn to use technology in ways that help make tasks easier, quicker and less expensive. This is an example of:

Explanation

The given explanation suggests that teaching people how to use technology in a safe and appropriate manner, as well as using it to make tasks easier, quicker, and less expensive, is an example of digital literacy. Digital literacy refers to the ability to use digital technology effectively and responsibly. It involves understanding how to use technology to access, evaluate, and create information, as well as understanding the potential risks and benefits associated with technology use.

Submit
54. Your science teacher has assigned a report on animal adaption. You must include pictures. From which source can you use pictures in your report without including it in your bibliography: 

Explanation

You can use pictures from the zoo in your report without including them in your bibliography because they are your own personal pictures that you have taken. They are not external sources that need to be cited.

Submit
55. When there is a reasonable suspicion that a violation of the PED policy has occurred.  Who reserves the right to monitor, inspect, copy, and review your PED:

Explanation

The principal reserves the right to monitor, inspect, copy, and review your PED (Personal Electronic Device) when there is a reasonable suspicion of a violation of the PED policy. This means that if there is a belief or evidence that you have violated the policy, the principal has the authority to take these actions to investigate the situation. The teacher and guidance counselor may also play a role in enforcing the policy, but the ultimate responsibility lies with the principal.

Submit
56. You need to take a form home to be signed. It will allow you to use the internet at school. What is the name of the form:

Explanation

The form that needs to be taken home to be signed in order to use the internet at school is called the "Acceptable Use Policy." This policy outlines the guidelines and rules for using the internet responsibly and safely within the school setting. By signing this form, the student and their parent or guardian agree to abide by these rules and understand the consequences of any misuse or violation of the policy.

Submit
57. What is the problem with meeting people for the first time online instead of meeting them in person:

Explanation

Meeting people for the first time online instead of in person can lead to various problems. Firstly, when you finally meet them in person, there is a possibility of feeling embarrassed if they don't match your expectations or if there are any awkward moments. Secondly, they might not want to continue being your friend after meeting in person, which can be disappointing. Lastly, online interactions may not always reflect the truth, and you can never be completely sure if the person is being honest or genuine. Therefore, all the mentioned options can be potential problems when meeting people for the first time online.

Submit
58. Following the rules and policies established by the school district for appropriate use of your PED is an example of:

Explanation

Following the rules and policies established by the school district for appropriate use of your PED is an example of etiquette. Etiquette refers to the accepted code of conduct or behavior in a particular setting or community. In this case, the school district has set guidelines for the appropriate use of personal electronic devices (PEDs), and adhering to these rules demonstrates good etiquette. It shows respect for the school's policies and ensures that PEDs are being used in a responsible and appropriate manner.

Submit
59. If you own a PED, when are you required to bring it to school:

Explanation

The correct answer is "Never." This means that if you own a PED (Portable Electronic Device), you are not required to bring it to school at any time. This suggests that the school does not have a policy or requirement for students to bring their PEDs to school. Therefore, bringing a PED to school is not necessary or mandatory.

Submit
60. What is the rule for using your PED in commom areas such as hallways, auditorium, and locker room:

Explanation

The rule for using your PED in common areas such as hallways, auditorium, and locker room is to text your teacher if you are going to be late for class.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 28, 2013
    Quiz Created by
    Freitagc
Cancel
  • All
    All (60)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
You must be aware of appropriateness of communications when using your...
If you are asked to put your PED away during school: 
Never agree to physically meet someone you met online:
When should you give your password to another person: 
When dealing with people online, giving personal information is: 
The difference between safety and security is:
When dealing with strangers, online users should: 
Physical injuries related to technology use: 
What is Digital Citizenship:
Your friend tells you about a website where you can download all of...
What are the potential consequences of sexting:
What is the benefit of being able to buy goods online:
Anti-Virus software relates to which element of Digital...
Sitting up straight and tall when in front of a computer is an example...
What does "think before you post" mean:
If someone puts copyrighted material on the internet and another...
What does AUP stand for:
Why is it important to know your information is safe:
Who is responsible for following the Acceptable Use Policy: 
Who is liable for the loss, damage, misuse, or theft of your...
In order to have a registered PED with TICSD what are you...
Sending text messages is an example of: 
E-mail messages should be:  
What is the benefit of having Digital Access at school:
What is the negative side of being able to have digital access:
When using a PED, a user should:
What is the negative side of buying goods online:
When can you use your PED device during class:
If you question if a certain activity violates the acceptable use...
What information should you never share online:
When is it OK to use your PED to record audio, video, or take pictures...
If you click on a weblink and it takes you to a website that is...
Where you sit or relax when you work with technology: 
What should you do if you are being cyberbullied:
What are the benefits of Digital Communication:
When can you text message during the school day:
What helps prevent inappropriate use of your PED:
What is the problem with opening an email from someone you don't...
Who has to sign the AUP contract:
During school hours the correct cell phone ringer setting is: 
The intended purpose for the use of your PED is for:
If you use your PED improperly, which of these consequences might take...
All PED's must access the internet via:
Why was the acceptable use policy implemented:
What is one reason that it is important to be a good Digital Citizen:
Which of the following devices is not allowed to be used in school:
Hacking, pirated software, and identity theft are in violation of...
Where can you find a copy of the AUP:
Explaining to your mom how to send an email is an example of: 
What is PED:
Demonstrating good conduct and being a responsible user of your...
Information on the Internet is: 
It's important to teach people how to use technology in a way that...
Your science teacher has assigned a report on animal adaption. You...
When there is a reasonable suspicion that a violation of the...
You need to take a form home to be signed. It will allow you to use...
What is the problem with meeting people for the first time online...
Following the rules and policies established by the school district...
If you own a PED, when are you required to bring it to...
What is the rule for using your PED in commom areas such as hallways,...
Alert!

Advertisement