Safety And Ethics Test

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Paula_Wright
P
Paula_Wright
Community Contributor
Quizzes Created: 1 | Total Attempts: 2,362
| Attempts: 2,362 | Questions: 42
Please wait...
Question 1 / 42
0 %
0/100
Score 0/100
1. This is an example of respect: Telling your mother to, "Go to hell!"

Explanation

This statement is an example of disrespect, not respect. Telling someone to "go to hell" is a rude and offensive remark, showing a lack of consideration and regard for the other person. Respect involves treating others with kindness, politeness, and consideration, which is not demonstrated in this statement. Therefore, the correct answer is false.

Submit
Please wait...
About This Quiz
Safety And Ethics Test - Quiz

The 'Safety and Ethics Test' assesses understanding of computer ethics, cyberbullying prevention, and copyright issues. It highlights ethical practices online and helps learners identify and address unethical behaviors effectively.

Personalize your quiz and earn a certificate with your name on it!
2. You will be able to use team skills throughout your life.

Explanation

Team skills are essential in various aspects of life, such as school, work, and personal relationships. Being able to effectively work with others, communicate, collaborate, and problem-solve as a team member is a valuable skill set that can be utilized in different situations and contexts. Whether it's participating in group projects, being part of a sports team, or working in a professional setting, the ability to work well with others and contribute to a team's success is a lifelong skill that can be applied in numerous scenarios.

Submit
3. This is an example of respect: Yelling or talking back to your elder.

Explanation

Yelling or talking back to your elder is not an example of respect. Respect involves treating others with politeness, consideration, and deference, especially towards those who are older or in a position of authority. Yelling or talking back shows a lack of respect and disregard for the feelings and opinions of the elder. Therefore, the correct answer is False.

Submit
4. This is an example of respect: Saying, "Yes ma'am, no sir."

Explanation

This statement demonstrates respect because it shows the use of polite and formal language when addressing someone. By saying "Yes ma'am, no sir," the person is acknowledging the authority and showing deference to the person they are speaking to. This behavior is often considered respectful in many cultures and societies.

Submit
5. What is Netiquette?

Explanation

Netiquette refers to the proper use of manners and etiquette on the Internet. It involves following guidelines and rules of behavior while interacting with others online. This includes being respectful, courteous, and considerate in online communication, avoiding offensive language or behavior, and respecting others' privacy and boundaries. Netiquette helps to create a positive and respectful online environment for everyone to interact and communicate effectively.

Submit
6. You should never give out which of the following on the Internet?

Explanation

Giving out personal information such as name, age, and address on the internet can be risky as it can be accessed by anyone, including potential scammers or identity thieves. Sharing this information can lead to privacy breaches and increase the chances of becoming a victim of cybercrime. Therefore, it is important to never give out any of this information online to protect one's personal safety and security.

Submit
7. What do you do if you feel you are being cyber-bullied?

Explanation

If you feel you are being cyber-bullied, it is important to reach out to a trusted adult like a parent or teacher for help and support. They can provide guidance on how to handle the situation, offer emotional support, and take necessary actions to address the cyber-bullying. Keeping it to yourself or just deleting online content may not effectively resolve the issue or prevent further harm. In severe cases, involving the police may be necessary, but seeking assistance from a trusted adult should be the first step.

Submit
8. Stairs are the most common place for falls that result in a serious injury, Always keep these areas well lit

Explanation

Stairs are indeed a common place for falls that can lead to serious injuries. This is because people often lose their balance or trip while navigating stairs, especially if they are poorly lit. By keeping these areas well lit, the visibility is improved, reducing the risk of accidents and injuries. Therefore, the statement "Always keep these areas well lit" is true and important for preventing falls and promoting safety.

Submit
9. Keeping shoe laces tied or Velcro fastened is a way to prevent falls

Explanation

Keeping shoe laces tied or Velcro fastened can help prevent falls because loose or untied shoelaces can easily become tangled or caught on objects, causing the person to trip and fall. By ensuring that shoe laces are securely tied or using Velcro fasteners, the risk of tripping and falling is reduced, thereby preventing potential injuries.

Submit
10. What are computer ethics?

Explanation

Computer ethics refers to the principles and guidelines that dictate appropriate behavior and conduct when using computers. It involves adhering to a set of moral values and standards while engaging in activities such as accessing the internet, using software, or handling sensitive information. It encompasses concepts such as respecting privacy, avoiding plagiarism, protecting intellectual property, and promoting responsible use of technology. By following computer ethics, individuals ensure that their actions are honest and morally upright in the digital realm.

Submit
11. Proper lighting in the home helps to prevent falls

Explanation

Proper lighting in the home helps to prevent falls because it improves visibility, making it easier to see potential hazards such as steps, uneven surfaces, or objects on the floor. Adequate lighting also helps to enhance depth perception and balance, reducing the risk of tripping or stumbling. Additionally, good lighting can help older adults with age-related vision changes, such as reduced visual acuity or contrast sensitivity, to navigate their surroundings safely.

Submit
12. If I rent a DVD I can copy it for later or repeat viewing.

Explanation

It is illegal to rent a Hollywood DVD and then make a copy so that you can watch it later. In fact, it is illegal to make a copy of a Hollywood DVD even if you own it. The Digital Millennium Copyright Act makes it a crime to circumvent anti-piracy measures built into your commercial DVDs (UCLA: 2001). This means that if you have to decode a DVD in order to make a copy of it, even for personal purposes, you are breaking the law. (Lohmann:2005) Although some “time-shifting” activities (like TiVo) are legal, burning rented DVD’s is not.

Submit
13. Collaboration means working with others for a common ______________.

Explanation

Collaboration means working with others for a common purpose or goal. It involves individuals or groups coming together to achieve a shared objective, whether it is completing a project, solving a problem, or reaching a desired outcome. Through collaboration, people can combine their skills, knowledge, and resources to enhance productivity, creativity, and effectiveness. By working towards a common purpose or goal, collaboration promotes teamwork, communication, and cooperation among individuals, leading to better results and mutual success.

Submit
14. Which of these is cyber-bullying?

Explanation

The correct answer is "All of the above." Cyber-bullying refers to any form of harassment or intimidation that takes place online. Flame mail and hate mail both involve sending abusive or threatening messages to someone electronically, while posting mean comments on a discussion board involves publicly humiliating or belittling someone online. Therefore, all of these actions fall under the category of cyber-bullying.

Submit
15. What is NOT an example of cyberbullying?

Explanation

Bullying someone in the hallway is not an example of cyberbullying because it does not involve the use of electronic devices or online platforms. Cyberbullying refers to the act of using technology to harass, intimidate, or harm others, such as sending mean texts, threatening someone in an instant message, or creating and sharing embarrassing content online. Bullying in the hallway, on the other hand, involves face-to-face interactions and does not involve the use of technology.

Submit
16. What is considered shouting over the Internet?

Explanation

Writing in all CAPS is considered shouting over the Internet because it is seen as aggressive and can be interpreted as yelling. Using all capital letters in online communication is often perceived as rude and disrespectful, as it can be difficult to read and is equivalent to raising one's voice in a conversation. It is important to use proper etiquette and considerate communication when interacting with others online.

Submit
17. The definition of RESPECT is:

Explanation

The correct answer is the definition of respect as "esteem for or a sense of the worth or excellence of a person, a personal quality or ability, or something considered as a manifestation of a personal quality or ability." This definition implies that respect involves valuing and appreciating someone or something for their positive qualities or abilities. It suggests that respect is not about treating someone with contempt or rudeness, nor is it about assigning blame or responsibility. Instead, respect is about recognizing and acknowledging the worth and excellence in others.

Submit
18. Check TWO ways to prevent or stop cyberbullying?

Explanation

The correct answer is to tell a parent, teacher, or administrator and not to forward mean texts sent about a classmate. By informing a trusted adult about the cyberbullying, they can take appropriate action to address the situation and provide support. Refraining from forwarding mean texts helps to prevent the spread of harmful messages and reduces the impact on the victim.

Submit
19. Thou shalt not copy ___________________________ software or materials.

Explanation

The phrase "Thou shalt not copy copyrighted software or materials" means that it is prohibited to duplicate or reproduce any software or materials that are protected by copyright laws. Copyrighted materials are those that have been legally registered and granted exclusive rights to the original creator or owner, preventing others from copying, distributing, or using them without permission. Therefore, the correct answer is "copyrighted."

Submit
20. How are you judged in cyberspace?

Explanation

In cyberspace, you are judged by what you do on the Internet and how it looks, including your spelling, grammar, and netiquette. Even though no one can physically see you, your online actions and behavior reflect your character and can leave a lasting impression on others. Poor spelling and grammar can make you appear careless or uneducated, while good netiquette shows respect and consideration for others. Therefore, it is important to be mindful of your online presence and how you portray yourself in order to be judged positively in cyberspace.

Submit
21. Ergonomics is the science of designing the job to fit the worker, instead of forcing the worker to fit the job.

Explanation

Ergonomics is indeed the science of designing the job to fit the worker. This means that instead of expecting the worker to adapt to the job, the job is modified to suit the specific needs and capabilities of the worker. This approach aims to optimize efficiency, productivity, and overall well-being by ensuring that the work environment and tasks are comfortable, safe, and tailored to the individual.

Submit
22. I can legally burn back-up DVDs for my own home collection.

Explanation

It is illegal to copy your personal copyrighted DVD collection for the purpose of backing it up. The Digital Millennium Copyright Act makes it a crime to circumvent anti-piracy measures built into your commercial DVDs (UCLA: 2001). This means that if you have to decode a DVD in order to copy it, even for personal purposes, you are breaking the law. Proposals to count this action as exempt from the DMCA have been rejected by the Copyright Office. (Lohmann:2005)

Submit
23. I can legally share my Hollywood DVD collection with my friends by either uploading them to the internet or burning copies, as long as I don't sell them for profit.

Explanation

It doesn’t matter whether or not you are making any money off the deal; the government will still hold you as an infringer if you upload your copyrighted DVDs to the internet or burn copies for your friends to watch.
In 1997, congress enacted the “No Electronic Theft (NET) Act” to facilitate prosecution of copyright violation on the internet. “The NET Act makes it a federal crime to reproduce, distribute, or share copies of electronic copyrighted works such as songs, movies, games, or software programs, even if the person copying or distributing the material acts without commercial purpose and/or receives no private financial gain.” (IU: 2008)
As for making copies and distributing them to your friends, the DMCA makes it illegal for you make your commercial DVDs “burnable” by cracking the anti-piracy codes encrypted on them.

Submit
24. To avoid being cyber-bullied you should always...

Explanation

To avoid being cyber-bullied, it is important to observe proper netiquette rules. This means following guidelines for respectful and appropriate behavior online, such as being polite, refraining from posting offensive or hurtful comments, and treating others with kindness and empathy. By practicing good netiquette, individuals can create a positive online environment and reduce the risk of being targeted by cyber-bullies.

Submit
25. Electric cords or oxygen tubing on the floor is not a true tripping hazard for an elderly client

Explanation

The statement is false because electric cords or oxygen tubing on the floor can pose a significant tripping hazard for an elderly client. Elderly individuals may have reduced mobility, balance issues, or impaired vision, making them more susceptible to tripping and falling. Tripping over cords or tubing can lead to serious injuries such as fractures or head trauma. It is important to keep the environment clear and free of any potential hazards to ensure the safety of elderly clients.

Submit
26. Works that are not copyrighted and may be used without permission are called ____.

Explanation

However, you should still give credit to the source, even if your material is public domain.

Submit
27. If you get an embarrassing picture from someone you know you should NEVER...

Explanation

Sending an embarrassing picture of someone to other friends is not the appropriate action to take. It is important to respect the privacy and feelings of others, even if they have sent the picture to you. Sharing the picture with others can lead to further embarrassment and potential harm to the person involved. It is advisable to handle such situations responsibly and considerate by not forwarding or sharing the picture with anyone else.

Submit
28. The #1 cause of office-related injuries are caused by?

Explanation

Slips, trips, and falls are the number one cause of office-related injuries. These accidents can occur due to various reasons such as wet or slippery floors, uneven surfaces, cluttered walkways, or improper footwear. Employees may also trip over objects or cables, leading to injuries. Falls from heights, such as from ladders or stairs, can also result in severe injuries. It is crucial for employers to ensure a safe working environment by implementing measures like regular maintenance, proper signage, clear walkways, and employee training to prevent these accidents.

Submit
29. Who can see the information you type in a chat room?

Explanation

The correct answer is that anyone in the chat room at the time can see the information you type. This means that the information you share in a chat room is visible to all the participants who are present in the chat room at that particular moment. It is important to be cautious and mindful of the information you share in a chat room as it can be seen by others.

Submit
30. Which is NOT a consequence of copying or distributing copyrighted software?

Explanation

Copying or distributing copyrighted software without authorization can have serious legal consequences, including imprisonment, hefty fines, and potentially being held liable for civil fees. However, community service is not typically considered a consequence of copyright infringement. While it is possible that a court may order community service as part of a sentence for other related offenses, it is not directly linked to copying or distributing copyrighted software.

Submit
31. Which is NOT a consequence of plagiarism?

Explanation

Plagiarism can have serious consequences such as getting kicked out of college, receiving a zero on an assignment, and getting fired from a job. However, receiving a warning from a college professor is not a consequence of plagiarism. While a warning may serve as a cautionary measure, it is not a direct consequence and does not carry the same weight as the other options listed.

Submit
32. Which is an example of plagiarism?

Explanation

Copying and pasting a sentence from the Internet into your paper is an example of plagiarism because it involves directly using someone else's work without giving proper credit or citation. Plagiarism is the act of presenting someone else's ideas, words, or work as your own, and this action violates academic integrity and ethical standards. To avoid plagiarism, it is important to properly paraphrase, cite sources, and provide attribution when using information from external sources.

Submit
33. If you receive a text or email from someone you don't know, what should you do?

Explanation

When receiving a text or email from an unknown sender, it is advisable to delete it without opening it. This is because opening it may expose you to potential risks such as phishing scams, malware, or unwanted solicitations. It is always better to exercise caution and avoid engaging with unknown messages to protect your personal information and ensure online safety.

Submit
34. Effective communication includes passive and aggressive behaviors. 

Explanation

Effective communication does not include aggressive behaviors. Aggressive behaviors can be harmful, disrespectful, and can hinder effective communication. Effective communication focuses on active listening, clear and concise expression of thoughts and ideas, and respectful and empathetic communication. Aggressive behaviors such as yelling, interrupting, or attacking others' opinions can create a hostile environment and prevent effective communication from taking place. Therefore, the statement that effective communication includes aggressive behaviors is false.

Submit
35. What is malware? 

Explanation

Malware refers to malicious software, such as viruses and spyware, that is designed to harm or exploit a computer system. It can steal personal information, send spam, and commit fraud. This type of software can enter a computer through various means, such as email attachments, and then replicate itself. It can also enable unauthorized individuals to access a computer and use its resources. The correct answer accurately describes malware and its harmful effects.

Submit
36. Which is not a type of cyberbully?

Explanation

The correct answer is "Big, Bad Bully". This option does not align with the typical types of cyberbullies. "Mean Girls" refers to a group of girls who engage in cyberbullying, "Power Hungry or Revenge of the Nerds" suggests individuals seeking power or revenge through cyberbullying, "The Vengeful Angel" implies someone seeking revenge through cyberbullying, and "The Inadvertent Cyberbully 'Because I Can'" indicates unintentional cyberbullying. However, "Big, Bad Bully" does not fit into any of these categories and is therefore not a type of cyberbully.

Submit
37. What is a Trojan? 

Explanation

A Trojan is a type of malware that disguises itself as a legitimate program or file, tricking users into installing it. Once installed, it allows unauthorized individuals to gain access to the infected computer and potentially send spam from it. Unlike viruses or spyware, Trojans do not reproduce themselves over a network or use up computer resources to shut down the system.

Submit
38. Giving credit to the person who created the work, such as a photograph, sound recording, motion picture, or document is called ____

Explanation

Attribution is needed even if you get permission from the author.

Submit
39. The most common form of injury from a fall in a broken wrist

Explanation

The statement "The most common form of injury from a fall is a broken wrist" is false. While a broken wrist is a common injury from falls, it is not the most common form of injury. Falls can result in various injuries, including fractures in other parts of the body, head injuries, sprains, and bruises. The severity and type of injury can vary depending on factors such as the height of the fall, the surface landed on, and the individual's age and health condition.

Submit
40. What is a virus? 

Explanation

A virus is a type of malware that infiltrates a computer, typically through an email attachment, and then replicates itself. This malicious software can cause harm by consuming computer resources and potentially shutting down the system.

Submit
41. What is a worm? 

Explanation

A worm is a type of malware that is capable of reproducing itself over a network. Once it infects a computer, it can use up the computer's resources and potentially shut down the system. Unlike viruses, worms do not require a host program to spread and can independently replicate and spread across networks. This makes them particularly dangerous as they can quickly infect multiple computers and cause widespread damage.

Submit
42. What is copyright?  Check all that apply. 

Explanation

The correct answer is a combination of the first, second, and fourth options. Copyright is a legal protection that guarantees that only the original creator of the work has the right to use it, and it also provides protection against copying and using original work. Additionally, copyright is a legal intellectual property protection that is in place for a certain amount of time.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 19, 2014
    Quiz Created by
    Paula_Wright
Cancel
  • All
    All (42)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
This is an example of respect:...
You will be able to use team skills throughout your life.
This is an example of respect: Yelling or talking back to your elder.
This is an example of respect:...
What is Netiquette?
You should never give out which of the following on the Internet?
What do you do if you feel you are being cyber-bullied?
Stairs are the most common place for falls that result in a serious...
Keeping shoe laces tied or Velcro fastened is a way to prevent falls
What are computer ethics?
Proper lighting in the home helps to prevent falls
If I rent a DVD I can copy it for later or repeat viewing.
Collaboration means working with others for a common ______________.
Which of these is cyber-bullying?
What is NOT an example of cyberbullying?
What is considered shouting over the Internet?
The definition of RESPECT is:
Check TWO ways to prevent or stop cyberbullying?
Thou shalt not copy ___________________________ software or materials.
How are you judged in cyberspace?
Ergonomics is the science of designing the job to fit the worker,...
I can legally burn back-up DVDs for my own home collection.
I can legally share my Hollywood DVD collection with my friends by...
To avoid being cyber-bullied you should always...
Electric cords or oxygen tubing on the floor is not a true tripping...
Works that are not copyrighted and may be used without permission are...
If you get an embarrassing picture from someone you know you should...
The #1 cause of office-related injuries are caused by?
Who can see the information you type in a chat room?
Which is NOT a consequence of copying or distributing copyrighted...
Which is NOT a consequence of plagiarism?
Which is an example of plagiarism?
If you receive a text or email from someone you don't know, what...
Effective communication includes passive and...
What is malware? 
Which is not a type of cyberbully?
What is a Trojan? 
Giving credit to the person who created the work, such as a...
The most common form of injury from a fall in a broken wrist
What is a virus? 
What is a worm? 
What is copyright?  Check all that apply. 
Alert!

Advertisement