1.
What is the definiion of cyberbullying?
Correct Answer
A. Using technologies to embarrass, humiliate, threaten, intimidate or harass another person
Explanation
Cyberbullying is using technology to embarrass, humiliate, threaten, intimidate or harass another. Unlike a bully who you can see and identify, a cyberbully can use text messages, emails, websites, Facebook and Myspace to bully you and you may not know where it is coming from.
2.
What is "private information?"
Correct Answer
E. All of the above
Explanation
Private Information that you should never share with anyone includes all of the above choices. You should never give out your age, last name, photo, address, telephone number, school name or address, social security numbers, passworks, parent's credit card numbers, parent's work hours, or any information that will help strangers locate you.
3.
Is it possible to be playing games, chatting or emailing someone using the Internet who is an adult who just got out of jail, but is pretending to be a kid?
Correct Answer
D. Yes, and this happens a lot and you should always remember this
Explanation
Yes, this could happen because noone is monitoring the Internet and you should alwasys remember this. You never know who you are actually talking to using technology.
4.
Do you trust everything that you see and read on the Internet?
Correct Answer
E. I don't trust anything just because it is on the Internet, because I know that anyone can make a webpage and noone monitors the Internet
Explanation
The correct answer explains that not everything on the internet can be trusted because anyone can create a webpage and there is no monitoring system in place. This highlights the importance of being critical and verifying information before believing or relying on it.
5.
Is it ever safe to meet someone in person who I met onlie?
Correct Answer
D. I can never be totally safe, but if my parent goes with me I am safest
Explanation
The correct answer states that meeting someone in person who was met online can never be completely safe. However, if a parent accompanies the person, it would provide an extra layer of safety. This suggests that even with precautions, there is always a level of risk involved when meeting someone in person from an online interaction.
6.
It is safe to share this information:
Correct Answer
D. All of the above answers
Explanation
The given answer, "All of the above answers," suggests that it is safe to share all the listed information, including the person's first name and favorite color, favorite sport and kind of car, and favorite kind of dog and food. This implies that none of the listed information poses any risk or harm if shared.
7.
When I create a username or email address, it is okay to include this information in it
Correct Answer
A. My favorite color
Explanation
Including "My favorite color" in a username or email address is generally acceptable because it does not reveal sensitive personal information. Unlike birthdate, age, last name, or phone number, favorite color is a relatively harmless piece of information that is unlikely to be used for identity theft or other malicious purposes.
8.
The safest passoword, that is hard for someone to figure out, should include...
Correct Answer
D. Both numbers and letters that are upper and lower case and at least 6 digits long
Explanation
The safest password should include both numbers and letters that are upper and lower case and be at least 6 digits long. This combination of upper and lower case letters, along with numbers, provides a higher level of complexity and makes it harder for someone to guess or crack the password. Additionally, having a minimum length of 6 digits ensures that the password is not too short and further enhances its security.
9.
It is only okay to share my passwords with
Correct Answer
A. My parents
Explanation
Sharing passwords should be done responsibly and only with trusted individuals. In this case, the correct answer is "My parents" because they are typically the individuals who are most responsible for a person's well-being and have a higher level of trust compared to friends or other family members. It is important to limit password sharing to a small, select group of individuals to maintain security and privacy.
10.
A computer virus
Correct Answer
E. All of the above
Explanation
The correct answer is "All of the above". A computer virus can stop your computer from working by corrupting or damaging the system files. It can delete your saved documents by infecting and deleting files on your computer. It can make your computer slower by consuming system resources and causing performance issues. Lastly, it can steal the documents saved on your computer and send them to a stranger by accessing and transmitting your personal data without your consent.
11.
If someone swears at me, calls me names, or threatens me online
Correct Answer
C. I should save a copy what they said, tell an adult and say nothing back to them
Explanation
The correct answer is to save a copy of what they said, tell an adult, and not respond back to them. This is the most appropriate course of action because it ensures that evidence of the online harassment is preserved, allowing for potential intervention or legal action if necessary. Additionally, involving a trusted adult helps to address the situation and seek guidance on how to handle it effectively. Not responding back to the harasser minimizes the chances of escalating the situation further.
12.
I can always delete a message or picture that I put online and no one will ever see it again
Correct Answer
B. Even after I delete it, and it looks like it is gone, it is never really gone.
Explanation
Deleting a message or picture from an online platform may give the impression that it is permanently removed. However, in reality, once something is uploaded online, it can be copied, saved, or shared by others before it is deleted. This means that even if the original content is removed, there is a possibility that someone else may have a copy of it. Therefore, it is essential to be cautious about what is shared online, as it may never truly disappear.
13.
If I am online and stranger asks how old I am, where I live, or asks me to send them a picture
Correct Answer
A. I should immediately stop talking to them and then block them from ever contacting me again
Explanation
The correct answer is to immediately stop talking to the stranger and then block them from ever contacting you again. This is the safest course of action to protect yourself from potential harm or exploitation. Sharing personal information such as your age, location, or pictures with a stranger online can be dangerous and may put you at risk. It is important to prioritize your safety and seek help from a trusted adult if someone asks you inappropriate questions online.
14.
When I get a cell phone with text messaging or an email account I will
Correct Answer
E. All of the above
Explanation
The correct answer is "All of the above" because each of the statements listed are important guidelines for responsible and safe use of cell phones with text messaging or email accounts. By following these guidelines, individuals can ensure that they are respectful in their communication, avoid engaging in cyberbullying or responding to it, protect their own privacy, and avoid asking others for private information.
15.
A Call Number is
Correct Answer
B. Letters and numbers printed on the spinelabel of a book
Explanation
The correct answer is "Letters and numbers printed on the spinelabel of a book." A call number is a unique combination of letters and numbers that is assigned to a book in a library. It helps in organizing and locating books on the shelves. The call number is usually printed on the spine label of the book, allowing library users to easily find the book they are looking for.