Digital Citizenship Final Exam

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Billerica.k12.ma
B
Billerica.k12.ma
Community Contributor
Quizzes Created: 5 | Total Attempts: 9,425
| Attempts: 1,283 | Questions: 37
Please wait...
Question 1 / 37
0 %
0/100
Score 0/100
1. What kind of personal information is it okay to reveal online?

Explanation

It is okay to reveal your favorite actor online because it is a personal preference and does not disclose any sensitive or private information. Sharing this information can help in connecting with others who have similar interests and can be a topic of conversation or discussion.

Submit
Please wait...
About This Quiz
Digital Citizenship Quizzes & Trivia

With the increased use of the internet and technology, so have the rate of cybercrime escalated. Below, we gauge our knowledge on cyber bullying issues. How good are... see moreyou and how much are you doing to protect yourself. Find out. see less

2. Which word best describes how you should proceed with a new online friend?

Explanation

When proceeding with a new online friend, it is important to be cautious. This means being careful and vigilant in order to protect oneself from potential risks or harm. It is crucial to exercise caution when interacting with someone online, as their true intentions may not always be clear. Being cautious involves taking steps to verify the person's identity, setting boundaries, and being mindful of sharing personal information. It is important to proceed with a new online friend cautiously to ensure one's safety and well-being.

Submit
3. Which of the following text messages would most likely be an example of cyberbullying?

Explanation

The text message "Don't tell Rita about Tim's party" would most likely be an example of cyberbullying because it involves excluding someone from an event intentionally. This exclusion can be seen as a form of bullying, as it may cause the person to feel left out or isolated.

Submit
4. If you're confronted by a difficult situation online, and you don't know exactly how to handle it, what should you do?

Explanation

In difficult situations online, it is important to seek guidance from a trusted adult. This is because adults have more experience and knowledge to handle such situations effectively. They can provide valuable advice, support, and help in resolving the issue safely. Turning off the computer or making an educated guess may not be the best approach as it does not address the problem directly. Asking an online friend for help may not be reliable as they may not have the necessary expertise or may not always have the best intentions.

Submit
5. Which would make the best password?

Explanation

The password "c4liforn14" would make the best password out of the given options because it is a combination of uppercase and lowercase letters, as well as numbers. This makes it more secure and harder to guess compared to the other options. Additionally, it is not a common word or a simple number, further increasing its strength as a password.

Submit
6. What do cyberbullies have in common with regular bullies?

Explanation

Cyberbullies and regular bullies have the commonality of both ending up hurting people. This means that regardless of the medium they use to bully others, whether it be online or in person, both types of bullies cause harm and distress to their victims. It is important to address and combat bullying in all its forms to create a safe and inclusive environment for everyone.

Submit
7. When is it  okay to submit your personal information to a website?

Explanation

It is okay to submit your personal information to a website when your parents say it's okay. This is because parents usually have a better understanding of online safety and can assess the trustworthiness of a website. They can guide you in making informed decisions about sharing personal information online and ensure that you are protected from potential risks or scams. It is important to seek their approval and follow their advice to maintain your online security.

Submit
8. You receive the following text from a number you don't recognize      Meet me near the library water fountain What's the best response ?

Explanation

The best response is to not respond and tell your parents because receiving a text from an unknown number and being asked to meet someone near a specific location can be potentially dangerous. It is important to prioritize personal safety and involve trusted adults, such as parents, who can help assess the situation and take appropriate action if necessary.

Submit
9. Cyberbullying generally doesn't involve physical violence. What does physical mean  in this case?

Explanation

In this case, "physical" refers to actions or behaviors that involve the body. Cyberbullying typically involves harmful and aggressive actions that are carried out online or through digital means, such as sending threatening messages or sharing embarrassing photos. These actions do not involve physical violence, such as hitting or physically harming someone. Therefore, "body-related" is the most appropriate explanation for the term "physical" in the context of cyberbullying.

Submit
10. What's the best way to prove that you've been a victim of cyberbullying?

Explanation

The best way to prove that you've been a victim of cyberbullying is by saving screenshots of instances where you've been harassed. This evidence can be used to show the nature and extent of the bullying, making it easier to report and take action against the cyberbully. By having concrete proof, it becomes more difficult for the bully to deny their actions, and it provides a clear record of the harassment that can be shown to authorities or trusted adults for support and intervention.

Submit
11. If you find a great website as a source for your English project, which of the following is true?

Explanation

If you find a great website as a source for your English project, you can use the information on the site as long as you cite it properly. This means that you can include the information in your report, but you must give credit to the original source by citing it. This is important to avoid plagiarism and to acknowledge the work of others.

Submit
12. If you want to conduct the best internet search possible, what should you do before you begon?

Explanation

Before conducting the best internet search possible, it is important to learn a bit about the topic you're searching for. This will help you have a better understanding of the subject matter and enable you to refine your search queries effectively. By having some background knowledge, you can identify relevant keywords, filter through search results, and evaluate the credibility of sources more efficiently, leading to a more successful and productive internet search.

Submit
13. Why should you never send emails, texts, or IMs when you are angry or upset

Explanation

When you are angry or upset, your emotions can cloud your judgment and impair your ability to think rationally. This can lead to saying things you may regret later or making impulsive decisions. By sending emails, texts, or IMs in this state, you risk damaging relationships or creating unnecessary conflicts. It is important to wait until you have calmed down and regained control over your emotions before engaging in any form of communication. This allows you to approach the situation with a clear mind and make more rational decisions.

Submit
14. Olive is a 12-year-old girl living in Orlando, Florida. Which of the following screen names is the safest for her?

Explanation

The screen name "AstroCat" is the safest for Olive because it does not include any personal information such as her name or location. This reduces the risk of someone identifying and targeting her based on her screen name. Additionally, "AstroCat" does not include any age-related or potentially revealing terms, making it a more secure choice.

Submit
15. How might you classify copying and pasting a paragraph from a website into a school assignment? Choose the best answer,

Explanation

Copying and pasting a paragraph from a website into a school assignment can be classified as "stealing" because it involves taking someone else's work without giving proper credit or acknowledging the original source. This act is considered plagiarism and goes against academic integrity, as it implies claiming someone else's ideas or words as one's own.

Submit
16. If you're friendly to people you meet online, chances are that your behavior will be reciprocated. In other words:

Explanation

The answer suggests that if you are nice to people online, they will likely respond with kindness. This implies that being friendly online can lead to positive interactions and relationships with others.

Submit
17. If you want to narrow down the results of an internet search, what's your best course of action?

Explanation

Adding more relevant words to your search is the best course of action to narrow down the results of an internet search. By including specific keywords or phrases related to the topic you are searching for, you can refine the search results and find more specific information that is relevant to your needs. This helps to filter out irrelevant or unrelated results and increases the chances of finding the desired information quickly and efficiently.

Submit
18. Why do you need to be more cautious with friends you meet online than with  the friends you meet at school? 

Explanation

When interacting with friends online, it is more difficult to verify their true identity compared to friends met at school. Online, people can create fake personas or hide their true intentions, making it harder to trust them. In the real world, one can rely on physical cues, body language, and personal interactions to gauge a person's authenticity. However, online friendships lack these cues, making it necessary to exercise caution and be more skeptical about the true identity and intentions of individuals met on the internet.

Submit
19. "Internet Math" uses which two basic math operations?

Explanation

"Internet Math" utilizes addition and subtraction as the two basic math operations. This means that when solving mathematical problems or equations related to Internet Math, one would primarily use addition and subtraction to perform calculations and arrive at the correct answers.

Submit
20. What's the best way to quote online resources without plagiarizing?

Explanation

The best way to quote online resources without plagiarizing is by citing all your online resources with proper attribution. This means acknowledging the original source of the information and giving credit to the author or website. By doing so, you are showing respect for intellectual property and avoiding any accusations of plagiarism.

Submit
21. To demonstrate the concept of gravity, a science teacher shows her class a two-minute clip from a popular movie. The use of this work is most likely an example of:

Explanation

The use of a two-minute clip from a popular movie by a science teacher to demonstrate the concept of gravity is most likely an example of fair use. Fair use allows for the limited use of copyrighted material without permission from the copyright owner for purposes such as education, criticism, or commentary. In this case, the science teacher is using the clip for educational purposes, which falls under fair use.

Submit
22. When something enters the public domain, it becomes like:

Explanation

When something enters the public domain, it becomes a free-for-all giveaway. This means that it is available to everyone without any restrictions or limitations. It is no longer owned or controlled by any individual or organization, allowing anyone to use, distribute, or modify it as they please. This concept is often applied to creative works, such as books, music, or artwork, that have expired copyrights or are intentionally released for public use.

Submit
23. How is a search engine similar to the engine in a car?

Explanation

A search engine is similar to the engine in a car because it allows you to navigate an online highway. Just like a car engine helps you navigate the physical roads, a search engine helps you navigate the vast amount of information available on the internet by providing search results and allowing you to find specific websites, articles, or other online content. It acts as a tool to help you navigate and find what you are looking for on the internet, similar to how a car engine helps you navigate and reach your desired destination on the road.

Submit
24. It's often said that plagiarizing is like cheating yourself. Why is this?

Explanation

By plagiarizing, you are essentially taking someone else's work and presenting it as your own. This means that you are not putting in the effort to think critically and develop your own ideas. Writing is a skill that is developed through practice, and by plagiarizing, you are depriving yourself of the opportunity to improve your writing abilities. Additionally, critical thinking skills are essential for analyzing information, making connections, and forming original thoughts. By plagiarizing, you are cheating yourself out of the chance to enhance these important skills.

Submit
25. Keeping your personal information a secret online is a wise policy. In the preceding sentence, what does "policy" mean?

Explanation

In the given sentence, the word "policy" refers to a general plan. It implies that keeping personal information confidential while using the internet is a wise approach or strategy.

Submit
26. Which of the following is a factual statement about cyberbullying?

Explanation

The statement "Cyberbullying can make people feel bad" is a factual statement about cyberbullying because it acknowledges the emotional impact it can have on individuals. It does not make any subjective claims or opinions, but rather states a commonly recognized consequence of cyberbullying.

Submit
27. Over a few days, you receive a series of insulting IMs from someone at school.  Which sequence of actions is the best response?

Explanation

The best response in this situation is to ignore/delete the first insulting IM, but save/print any further IMs as evidence. It is important to involve a trusted adult, such as a parent or school counselor, who can provide support and guidance in dealing with the situation. Additionally, it may be necessary to report the issue to the IM host and seek their assistance in addressing the bullying behavior. By taking these actions, the victim can gather evidence, seek help, and potentially put an end to the insulting IMs.

Submit
28. Why is ignoring a mean email usually the first best response?

Explanation

Ignoring a mean email is usually the first best response because it frustrates cyberbullies' desire for an emotional response. Cyberbullies often send mean emails to provoke a reaction and derive satisfaction from the victim's emotional distress. By not responding, the victim denies the cyberbully the satisfaction they seek, potentially discouraging further bullying behavior. Additionally, responding to a mean email could escalate the situation or even lead to the victim being accused of cyberbullying as well.

Submit
29. What can you infer from the fact that people are more likely to say mean things online then in person?

Explanation

Being anonymous can make some people forget their manners. This means that when people are not identifiable online, they may feel less accountable for their actions and words, leading them to behave in a way that they wouldn't in person. Anonymity can provide a sense of detachment and freedom from consequences, which can result in individuals saying mean things online that they would not say face-to-face.

Submit
30. If you own the copyright to a poster with a giraffe design on it, which of the following actions can you take?

Explanation

As the owner of the copyright to a poster with a giraffe design, you have the right to make as many copies of the poster as you want. Copyright grants the owner exclusive rights to reproduce and distribute their original work. Therefore, you have the authority to duplicate and distribute your poster without any limitations. However, this does not give you the right to sue anyone who makes a poster with a giraffe on it, glue your poster to the backs of all the seats on a school bus, or copyright the idea of a giraffe poster.

Submit
31. If you use a copyrighted work without permission, it's called copyright infringement. What's another word for "infringement?"

Explanation

The correct answer is "Breach". In the context of copyright, "infringement" refers to the act of violating someone's rights by using their copyrighted work without permission. "Breach" is another word that can be used to describe this violation or unauthorized use.

Submit
32. On its own, which of the following is most likely an example of plagiarism ?

Explanation

Forgetting to include a bibliography at the end of your paper is most likely an example of plagiarism because it fails to give proper credit to the original sources used in the research. A bibliography is essential in academic writing as it allows readers to locate and verify the information presented in the paper. When a bibliography is omitted, it gives the impression that the ideas and information presented are the writer's original work, which is a form of plagiarism.

Submit
33. How does the search  term "Fred Rogers" compare with the search term Fred Rogers, without the quotes?

Explanation

When searching for "Fred Rogers" with quotes, it indicates that the search term should be treated as an exact phrase. This means that the search results will only include instances where the words "Fred" and "Rogers" appear together and in that specific order. On the other hand, searching for Fred Rogers without quotes allows for more flexibility. It will return results where the words "Fred" and "Rogers" appear separately or together, regardless of the order. Therefore, it is likely that searching for Fred Rogers without quotes would yield a higher number of hits compared to searching with quotes.

Submit
34. Why is it a good idea to get the author's permission to use a creative work, even if you think it may be fair use?  

Explanation

It is a good idea to get the author's permission to use a creative work, even if you think it may be fair use, because fair use law is open to interpretation. This means that what one person may consider fair use, another person may disagree and see it as copyright infringement. By obtaining the author's permission, you can avoid any potential legal issues and ensure that you are using the work in a way that is acceptable to the original creator.

Submit
35. If you wanted to learn aabout George W. Bush's term as governor of Texas--but not his term as U.S. Prsident--what would be the best phrase to search under?

Explanation

The phrase "George W. Bush" + Texas - President would be the best phrase to search under because it includes the name of the person of interest (George W. Bush) and the specific context (Texas) that is relevant to their term as governor. The addition of the "+" symbol ensures that both "George W. Bush" and Texas are included in the search results, while the "-" symbol excludes the term "President" from the search, eliminating any information related to his term as U.S. President.

Submit
36. Why is paraphrasing a good way to avoid plagiarizing a source?

Explanation

Paraphrasing is a good way to avoid plagiarizing a source because it demonstrates that you have a deep understanding of the subject matter. By rephrasing the original source in your own words, you are able to convey the information in a way that shows your comprehension and interpretation. This not only avoids copying someone else's work, but also showcases your ability to synthesize and articulate ideas. It is a way of demonstrating your knowledge and expertise on the topic to your readers.

Submit
37. Which of the following would be a creative work protected by copyright?

Explanation

A portrait of your family would be a creative work protected by copyright because it is an original artistic expression. Copyright protects original works of authorship, including visual arts such as paintings, drawings, and photographs. Since a portrait involves creativity and skill in capturing the likeness and emotions of individuals, it qualifies as a creative work eligible for copyright protection.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 10, 2013
    Quiz Created by
    Billerica.k12.ma
Cancel
  • All
    All (37)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What kind of personal information is it okay to reveal online?
Which word best describes how you should proceed with a new online...
Which of the following text messages would most likely be an example...
If you're confronted by a difficult situation online, and you...
Which would make the best password?
What do cyberbullies have in common with regular bullies?
When is it  okay to submit your personal information to a...
You receive the following text from a number you don't recognize ...
Cyberbullying generally doesn't involve physical violence. What...
What's the best way to prove that you've been a victim of...
If you find a great website as a source for your English project,...
If you want to conduct the best internet search possible, what should...
Why should you never send emails, texts, or IMs when you are angry or...
Olive is a 12-year-old girl living in Orlando, Florida. Which of the...
How might you classify copying and pasting a paragraph from a website...
If you're friendly to people you meet online, chances are that...
If you want to narrow down the results of an internet search,...
Why do you need to be more cautious with friends you meet online than...
"Internet Math" uses which two basic math operations?
What's the best way to quote online resources without...
To demonstrate the concept of gravity, a science teacher shows her...
When something enters the public domain, it becomes like:
How is a search engine similar to the engine in a car?
It's often said that plagiarizing is like cheating yourself. ...
Keeping your personal information a secret online is a wise policy. In...
Which of the following is a factual statement about cyberbullying?
Over a few days, you receive a series of insulting IMs from someone at...
Why is ignoring a mean email usually the first best response?
What can you infer from the fact that people are more likely to say...
If you own the copyright to a poster with a giraffe design on it,...
If you use a copyrighted work without permission, it's called...
On its own, which of the following is most likely an example of...
How does the search  term "Fred Rogers" compare with...
Why is it a good idea to get the author's permission to use a...
If you wanted to learn aabout George W. Bush's term as governor of...
Why is paraphrasing a good way to avoid plagiarizing a source?
Which of the following would be a creative work protected by...
Alert!

Advertisement