1.
If you are in a gaming room and someone that you do not know asks you about personal information (same age as you-or close), what do you do?
Correct Answer
E.
Both B and D
Explanation
The correct answer is both B and D. This means that when someone you do not know asks you about personal information in a gaming room, you should not give out any personal information and not trust what people say on the internet because they could be different than they claim to be. It is important to prioritize your online safety and protect your personal information from potential risks and dangers.
2.
If you feel uncomfortable in any chat room, find something "a little weird" on Facbook/MySpace, or just think something is wrong you should...
Correct Answer
B. Tell your parents.
Explanation
If you feel uncomfortable in any chat room, find something "a little weird" on Facebook/MySpace, or just think something is wrong, telling your parents is the best course of action. They can provide guidance, support, and help ensure your safety. It is important to involve a trusted adult who can assist you in handling the situation appropriately.
3.
What should you eliminate from photos that you post online?
Correct Answer
E. All of the above
Explanation
When posting photos online, it is important to consider privacy and safety. Including recognizable landmarks can give away personal information about your location. Nudity is not appropriate for public platforms and can violate community guidelines. Faces of others in a photo should be respected and their consent obtained before sharing. Any illegal activities should never be promoted or shared online. Therefore, to ensure privacy, safety, and adhere to ethical standards, it is best to eliminate all of the above from photos posted online.
4.
Who is the first person you should talk to if someone keeps bothering you online?
Correct Answer
A. A trusted adult
Explanation
A trusted adult is the first person you should talk to if someone keeps bothering you online. This is because they can provide guidance, support, and help you deal with the situation effectively. They can also offer advice on how to stay safe online and may be able to intervene or report the issue if necessary. It is important to reach out to someone you trust and who can provide assistance in handling online harassment.
5.
A "boy/girl" contacts you through a chat board. He/she is exactly your age, likes the same things as you, likes the same music you do. After a few weeks of chatting, he/she asks you to meet him/her. What do you do?
Correct Answer
C. Don't trust anything anyone says on the internet. They could be lying about who they are.
Explanation
The correct answer is "Don't trust anything anyone says on the internet. They could be lying about who they are." This is because it is important to exercise caution when interacting with strangers online. While the person may claim to have similar interests and be the same age, it is impossible to verify their true identity. Meeting someone in person without proper verification can be risky and potentially dangerous. It is always better to prioritize personal safety and refrain from meeting strangers from the internet.
6.
Giving your password to a friend could result in the following incidents
Correct Answer
D. All of the above
Explanation
Giving your password to a friend could result in all of the mentioned incidents. When you share your password, your friend can access your email or personal sites and tamper with them. They can also steal your identity online by impersonating you and carrying out malicious activities. Additionally, they can tamper with your banking or shopping sites, potentially causing financial loss or unauthorized transactions. Therefore, all of the mentioned incidents are possible consequences of sharing your password with a friend.
7.
If someone creates a social networking page (such as Facebook or Instagram) in your name, you should:
Correct Answer
D. Tell your parents and report the fake account.
Explanation
Ignoring it may not address the issue, and creating one of your own may not be necessary if you don't want a presence on that particular social network. Reporting the fake account is a good step to protect your identity and privacy, and involving your parents can provide additional support in handling the situation.
8.
Which would make the best password?
Correct Answer
D. C4li0rn14
Explanation
The password "c4li0rn14" would make the best choice because it is a combination of uppercase letters, lowercase letters, and numbers. This makes it more complex and harder to guess or crack compared to the other options. It also has a sufficient length, which adds an additional layer of security.
9.
Which age group is the most vulnerable to Internet threats?
Correct Answer
B. Adolescents
Explanation
Adolescents are the most vulnerable age group to Internet threats because they are often more active online compared to other age groups. They may lack awareness about online dangers, be more prone to taking risks, and have limited experience in dealing with potential threats. Additionally, adolescents may engage in risky online behaviors such as sharing personal information, interacting with strangers, or participating in cyberbullying. Therefore, they are more likely to fall victim to various Internet threats such as cyberbullying, online predators, identity theft, and exposure to inappropriate content.
10.
When you post a photo of yourself, it stays online
Correct Answer
D. possibly forever ― people can re-post it, and deleting doesn’t always work if someone else has copied your picture
Explanation
When you post a photo of yourself online, there is a possibility that it will stay online forever. This is because people can re-post the photo, and even if you delete it, there is no guarantee that it will be completely removed, especially if someone else has already copied and saved the picture. Therefore, once a photo is uploaded, it can potentially remain accessible and circulating on the internet indefinitely.
11.
Online information can _________ quickly.
Correct Answer
spread
Explanation
Online information can spread quickly due to the interconnected nature of the internet. With just a few clicks, information can be shared and disseminated to a wide audience within seconds. Social media platforms, websites, and online news outlets all contribute to the rapid spread of information. Additionally, the ability to share and repost content allows for information to reach even more people, leading to a widespread dissemination of knowledge, news, and ideas.
12.
You have the right to say no to inappropriate requests.
Correct Answer
A. True
Explanation
The statement "You have the right to say no to inappropriate requests" is true. Every individual has the right to set their own boundaries and refuse any requests that they deem inappropriate or uncomfortable. This right is essential for personal autonomy and self-respect. It is important to establish and assert boundaries to maintain personal well-being and ensure that one's rights and dignity are respected.
13.
If you are being cyberbullied, it may feel like there's nothing you can do, but that isn't true. Some steps you can take are: (write complete words in the blank space)
1) Don't r________
2) B________ the bully
3) Set up new acc________
4) Tell a trusted ad________
Correct Answer
respond, espond
block, lock
accounts, ounts
adult, ult
Explanation
If you are being cyberbullied, it is important to respond to the situation by taking action. This can include blocking the bully to prevent further contact and harassment. It is also recommended to set up new accounts to avoid the bully having access to personal information. Lastly, it is crucial to confide in and seek help from a trusted adult who can provide guidance and support in dealing with the situation.
14.
A revealing image may:
Correct Answer
E. All of the above
Explanation
The given answer, "All of the above," is correct because each of the listed options is a possible consequence of sharing a revealing image. When such an image is shared, it can easily get lost or misplaced, possibly leading to unintended individuals seeing it. Additionally, the image may be passed around without the person's permission, further spreading its reach. This can potentially result in bullying or harassment. Lastly, sharing a revealing image can get the person in trouble, as it may violate privacy laws or school/workplace policies.
15.
Sending mean messages, sharing inappropriate photos, talking about adult subjects, visiting adult sites are ALL behaviors that can put you at risk. True or False
Correct Answer
A. True
Explanation
Engaging in behaviors such as sending mean messages, sharing inappropriate photos, talking about adult subjects, and visiting adult sites can all potentially put a person at risk. These activities can lead to negative consequences such as cyberbullying, reputation damage, exposure to explicit content, and potential legal issues. Therefore, the statement that these behaviors can put you at risk is true.