Library Media - Pre/Post Test

Approved & Edited by ProProfs Editorial Team
At ProProfs Quizzes, our dedicated in-house team of experts takes pride in their work. With a sharp eye for detail, they meticulously review each quiz. This ensures that every quiz, taken by over 100 million users, meets our standards of accuracy, clarity, and engagement.
Learn about Our Editorial Process
| Written by Lvalley
L
Lvalley
Community Contributor
Quizzes Created: 1 | Total Attempts: 42
Questions: 15 | Attempts: 42

SettingsSettingsSettings
Library Media - Pre/Post Test - Quiz


Pre-test to gage student knowledge and information literacy skills that can be used as a post-test later.


Questions and Answers
  • 1. 

    What is the definiion of cyberbullying?

    • A. 

      Using technologies to embarrass, humiliate, threaten, intimidate or harass another person

    • B. 

      Using cyberspace to report a bully

    • C. 

      Bullying done by girls, not boys

    Correct Answer
    A. Using technologies to embarrass, humiliate, threaten, intimidate or harass another person
    Explanation
    Cyberbullying is using technology to embarrass, humiliate, threaten, intimidate or harass another. Unlike a bully who you can see and identify, a cyberbully can use text messages, emails, websites, Facebook and Myspace to bully you and you may not know where it is coming from.

    Rate this question:

  • 2. 

    What is "private information?"

    • A. 

      My cell phone number, address, age and last name

    • B. 

      My school address, pictures of myself and age

    • C. 

      My parents credit card numbers and their work hours

    • D. 

      My social security number and passwords

    • E. 

      All of the above

    Correct Answer
    E. All of the above
    Explanation
    Private Information that you should never share with anyone includes all of the above choices. You should never give out your age, last name, photo, address, telephone number, school name or address, social security numbers, passworks, parent's credit card numbers, parent's work hours, or any information that will help strangers locate you.

    Rate this question:

  • 3. 

    Is it possible to be playing games, chatting or emailing someone using the Internet who is an adult who just got out of jail, but is pretending to be a kid?

    • A. 

      NO! This could never happen

    • B. 

      Yes, but this rarely happens so you should never worry about it

    • C. 

      No, there is someone monitoring the Internet

    • D. 

      Yes, and this happens a lot and you should always remember this

    • E. 

      No, why would an adult pretent to be a kid?

    Correct Answer
    D. Yes, and this happens a lot and you should always remember this
    Explanation
    Yes, this could happen because noone is monitoring the Internet and you should alwasys remember this. You never know who you are actually talking to using technology.

    Rate this question:

  • 4. 

    Do you trust everything that you see and read on the Internet?

    • A. 

      I trust all websites found on the Internet

    • B. 

      I trust website that look good because you have to be really smart to make a website

    • C. 

      Only adults can make a webpage so I trust them

    • D. 

      I don't trust all websites, but I trust all kid websites

    • E. 

      I don't trust anything just because it is on the Internet, because I know that anyone can make a webpage and noone monitors the Internet

    Correct Answer
    E. I don't trust anything just because it is on the Internet, because I know that anyone can make a webpage and noone monitors the Internet
    Explanation
    The correct answer explains that not everything on the internet can be trusted because anyone can create a webpage and there is no monitoring system in place. This highlights the importance of being critical and verifying information before believing or relying on it.

    Rate this question:

  • 5. 

    Is it ever safe to meet someone in person who I met onlie?

    • A. 

      Yes, as long as I take a friend with me

    • B. 

      Yes, as long as we have talked together online for a year

    • C. 

      Yes, as long as we have talked together online for 6 months

    • D. 

      I can never be totally safe, but if my parent goes with me I am safest

    Correct Answer
    D. I can never be totally safe, but if my parent goes with me I am safest
    Explanation
    The correct answer states that meeting someone in person who was met online can never be completely safe. However, if a parent accompanies the person, it would provide an extra layer of safety. This suggests that even with precautions, there is always a level of risk involved when meeting someone in person from an online interaction.

    Rate this question:

  • 6. 

    It is safe to share this information:

    • A. 

      My first name and favorite color

    • B. 

      My favorite sport and kind of car

    • C. 

      My favorite kind of dog and food

    • D. 

      All of the above answers

    • E. 

      Non of the above answers

    Correct Answer
    D. All of the above answers
    Explanation
    The given answer, "All of the above answers," suggests that it is safe to share all the listed information, including the person's first name and favorite color, favorite sport and kind of car, and favorite kind of dog and food. This implies that none of the listed information poses any risk or harm if shared.

    Rate this question:

  • 7. 

    When I create a username or email address, it is okay to include this information in it

    • A. 

      My favorite color

    • B. 

      My birthdate

    • C. 

      My age

    • D. 

      My last name

    • E. 

      My phone number

    Correct Answer
    A. My favorite color
    Explanation
    Including "My favorite color" in a username or email address is generally acceptable because it does not reveal sensitive personal information. Unlike birthdate, age, last name, or phone number, favorite color is a relatively harmless piece of information that is unlikely to be used for identity theft or other malicious purposes.

    Rate this question:

  • 8. 

    The safest passoword, that is hard for someone to figure out, should include...

    • A. 

      All letters because this is the hardest for anyone to figure out

    • B. 

      All numbers as long as they don't include my birthdate, age or phone numbers

    • C. 

      Numbers and letters that are all lower case and not too long so that I can remember it easily

    • D. 

      Both numbers and letters that are upper and lower case and at least 6 digits long

    Correct Answer
    D. Both numbers and letters that are upper and lower case and at least 6 digits long
    Explanation
    The safest password should include both numbers and letters that are upper and lower case and be at least 6 digits long. This combination of upper and lower case letters, along with numbers, provides a higher level of complexity and makes it harder for someone to guess or crack the password. Additionally, having a minimum length of 6 digits ensures that the password is not too short and further enhances its security.

    Rate this question:

  • 9. 

    It is only okay to share my passwords with

    • A. 

      My parents

    • B. 

      My best friend

    • C. 

      Anyone who is in my family

    • D. 

      No one

    Correct Answer
    A. My parents
    Explanation
    Sharing passwords should be done responsibly and only with trusted individuals. In this case, the correct answer is "My parents" because they are typically the individuals who are most responsible for a person's well-being and have a higher level of trust compared to friends or other family members. It is important to limit password sharing to a small, select group of individuals to maintain security and privacy.

    Rate this question:

  • 10. 

    A computer virus

    • A. 

      Can stop your computer from working

    • B. 

      Can delete your saved documents

    • C. 

      Can make your computer slower

    • D. 

      Can steel the documents saved on your computer and send them to a stranger

    • E. 

      All of the above

    Correct Answer
    E. All of the above
    Explanation
    The correct answer is "All of the above". A computer virus can stop your computer from working by corrupting or damaging the system files. It can delete your saved documents by infecting and deleting files on your computer. It can make your computer slower by consuming system resources and causing performance issues. Lastly, it can steal the documents saved on your computer and send them to a stranger by accessing and transmitting your personal data without your consent.

    Rate this question:

  • 11. 

    If someone swears at me, calls me names, or threatens me online

    • A. 

      I should tell them to stop and keep it as our secret

    • B. 

      I should threaten them back so that they stop

    • C. 

      I should save a copy what they said, tell an adult and say nothing back to them

    • D. 

      It is not a big deal, I don't need to save a copy or tell anyone but I won't say anything back either

    • E. 

      I should show all my friends at school that way if something happens, they can tell someone

    Correct Answer
    C. I should save a copy what they said, tell an adult and say nothing back to them
    Explanation
    The correct answer is to save a copy of what they said, tell an adult, and not respond back to them. This is the most appropriate course of action because it ensures that evidence of the online harassment is preserved, allowing for potential intervention or legal action if necessary. Additionally, involving a trusted adult helps to address the situation and seek guidance on how to handle it effectively. Not responding back to the harasser minimizes the chances of escalating the situation further.

    Rate this question:

  • 12. 

    I can always delete a message or picture that I put online and no one will ever see it again

    • A. 

      After I delete it, it will be gone forever

    • B. 

      Even after I delete it, and it looks like it is gone, it is never really gone.

    • C. 

      If I delete it and then empty my "trash," it is gone forever

    Correct Answer
    B. Even after I delete it, and it looks like it is gone, it is never really gone.
    Explanation
    Deleting a message or picture from an online platform may give the impression that it is permanently removed. However, in reality, once something is uploaded online, it can be copied, saved, or shared by others before it is deleted. This means that even if the original content is removed, there is a possibility that someone else may have a copy of it. Therefore, it is essential to be cautious about what is shared online, as it may never truly disappear.

    Rate this question:

  • 13. 

    If I am online and stranger asks how old I am, where I live, or asks me to send them a picture

    • A. 

      I should immediately stop talking to them and then block them from ever contacting me again

    • B. 

      I can give them my picture, but that is it

    • C. 

      I should tell an adult any time someone asks me how old I am

    Correct Answer
    A. I should immediately stop talking to them and then block them from ever contacting me again
    Explanation
    The correct answer is to immediately stop talking to the stranger and then block them from ever contacting you again. This is the safest course of action to protect yourself from potential harm or exploitation. Sharing personal information such as your age, location, or pictures with a stranger online can be dangerous and may put you at risk. It is important to prioritize your safety and seek help from a trusted adult if someone asks you inappropriate questions online.

    Rate this question:

  • 14. 

    When I get a cell phone with text messaging or an email account I will

    • A. 

      Never be rude to anyone

    • B. 

      Never be a cyberbully

    • C. 

      Never respond to cyberbullying (Stop, Block and Tell)

    • D. 

      Never ask anyone for any private information

    • E. 

      All of the above

    Correct Answer
    E. All of the above
    Explanation
    The correct answer is "All of the above" because each of the statements listed are important guidelines for responsible and safe use of cell phones with text messaging or email accounts. By following these guidelines, individuals can ensure that they are respectful in their communication, avoid engaging in cyberbullying or responding to it, protect their own privacy, and avoid asking others for private information.

    Rate this question:

  • 15. 

    A Call Number is

    • A. 

      A cell phone number that you call

    • B. 

      Letters and numbers printed on the spinelabel of a book

    • C. 

      A number you call out to someone else

    Correct Answer
    B. Letters and numbers printed on the spinelabel of a book
    Explanation
    The correct answer is "Letters and numbers printed on the spinelabel of a book." A call number is a unique combination of letters and numbers that is assigned to a book in a library. It helps in organizing and locating books on the shelves. The call number is usually printed on the spine label of the book, allowing library users to easily find the book they are looking for.

    Rate this question:

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.