Safety And Ethics Test

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Paula_Wright
P
Paula_Wright
Community Contributor
Quizzes Created: 1 | Total Attempts: 2,268
Questions: 42 | Attempts: 2,272

SettingsSettingsSettings
Safety And Ethics Test - Quiz

Answer the following from the notes located on Edmodo.


Questions and Answers
  • 1. 

    What are computer ethics?

    • A.

      An honest, moral code that should be followed when on the computer

    • B.

      A computer program about honesty

    • C.

      A computer that fits on or under a desk

    • D.

      A list of commandments in the Bible

    Correct Answer
    A. An honest, moral code that should be followed when on the computer
    Explanation
    Computer ethics refers to the principles and guidelines that dictate appropriate behavior and conduct when using computers. It involves adhering to a set of moral values and standards while engaging in activities such as accessing the internet, using software, or handling sensitive information. It encompasses concepts such as respecting privacy, avoiding plagiarism, protecting intellectual property, and promoting responsible use of technology. By following computer ethics, individuals ensure that their actions are honest and morally upright in the digital realm.

    Rate this question:

  • 2. 

    What is NOT an example of cyberbullying?

    • A.

      Creating an embarassing picture of your classmate and forwarding it to your friend's email addresses

    • B.

      Sending someone a mean text

    • C.

      Bullying someone in the hallway

    • D.

      Threatening someone in an instant message

    Correct Answer
    C. Bullying someone in the hallway
    Explanation
    Bullying someone in the hallway is not an example of cyberbullying because it does not involve the use of electronic devices or online platforms. Cyberbullying refers to the act of using technology to harass, intimidate, or harm others, such as sending mean texts, threatening someone in an instant message, or creating and sharing embarrassing content online. Bullying in the hallway, on the other hand, involves face-to-face interactions and does not involve the use of technology.

    Rate this question:

  • 3. 

    Which is an example of plagiarism?

    • A.

      Reading a paragraph online and retyping it in your own words.

    • B.

      Copying and pasting someone else's work into your paper using qoutation marks and citing the author

    • C.

      Typing a paper in your own words

    • D.

      Copying and pasting a sentence from the Internet into your paper.

    Correct Answer
    D. Copying and pasting a sentence from the Internet into your paper.
    Explanation
    Copying and pasting a sentence from the Internet into your paper is an example of plagiarism because it involves directly using someone else's work without giving proper credit or citation. Plagiarism is the act of presenting someone else's ideas, words, or work as your own, and this action violates academic integrity and ethical standards. To avoid plagiarism, it is important to properly paraphrase, cite sources, and provide attribution when using information from external sources.

    Rate this question:

  • 4. 

    Which is NOT a consequence of copying or distributing copyrighted software?

    • A.

      Community Service

    • B.

      Inprisonment

    • C.

      Up to $10,000 in legal fees

    • D.

      Up to $50,000 in civil fees

    Correct Answer
    A. Community Service
    Explanation
    Copying or distributing copyrighted software without authorization can have serious legal consequences, including imprisonment, hefty fines, and potentially being held liable for civil fees. However, community service is not typically considered a consequence of copyright infringement. While it is possible that a court may order community service as part of a sentence for other related offenses, it is not directly linked to copying or distributing copyrighted software.

    Rate this question:

  • 5. 

    Which is not a type of cyberbully?

    • A.

      "Mean Girls"

    • B.

      Power Hungery or Revenge of the Nerds

    • C.

      Big, Bad Bully

    • D.

      The Vengeful Angel

    • E.

      The Inadvertent Cyberbully "Because I Can"

    Correct Answer
    C. Big, Bad Bully
    Explanation
    The correct answer is "Big, Bad Bully". This option does not align with the typical types of cyberbullies. "Mean Girls" refers to a group of girls who engage in cyberbullying, "Power Hungry or Revenge of the Nerds" suggests individuals seeking power or revenge through cyberbullying, "The Vengeful Angel" implies someone seeking revenge through cyberbullying, and "The Inadvertent Cyberbully 'Because I Can'" indicates unintentional cyberbullying. However, "Big, Bad Bully" does not fit into any of these categories and is therefore not a type of cyberbully.

    Rate this question:

  • 6. 

    Check TWO ways to prevent or stop cyberbullying?

    • A.

      Forward a mean message about a bully to your friends

    • B.

      Tell a parent, teacher, or administrator

    • C.

      Not forwarding mean texts sent you about a classmate

    • D.

      Use instant messanger to talk to your friends about someone's outfit you did not like that day at school

    Correct Answer(s)
    B. Tell a parent, teacher, or administrator
    C. Not forwarding mean texts sent you about a classmate
    Explanation
    The correct answer is to tell a parent, teacher, or administrator and not to forward mean texts sent about a classmate. By informing a trusted adult about the cyberbullying, they can take appropriate action to address the situation and provide support. Refraining from forwarding mean texts helps to prevent the spread of harmful messages and reduces the impact on the victim.

    Rate this question:

  • 7. 

    Which is NOT a consequence of plagiarism?

    • A.

      You can get kicked out of college.

    • B.

      You can make a zero on your assignment.

    • C.

      You can get fired from your job.

    • D.

      You could get a warning from your college professor.

    Correct Answer
    D. You could get a warning from your college professor.
    Explanation
    Plagiarism can have serious consequences such as getting kicked out of college, receiving a zero on an assignment, and getting fired from a job. However, receiving a warning from a college professor is not a consequence of plagiarism. While a warning may serve as a cautionary measure, it is not a direct consequence and does not carry the same weight as the other options listed.

    Rate this question:

  • 8. 

    Thou shalt not copy ___________________________ software or materials.

    • A.

      Public-domain

    • B.

      Copyrighted

    • C.

      Self created

    • D.

      Self published

    Correct Answer
    B. Copyrighted
    Explanation
    The phrase "Thou shalt not copy copyrighted software or materials" means that it is prohibited to duplicate or reproduce any software or materials that are protected by copyright laws. Copyrighted materials are those that have been legally registered and granted exclusive rights to the original creator or owner, preventing others from copying, distributing, or using them without permission. Therefore, the correct answer is "copyrighted."

    Rate this question:

  • 9. 

    What is Netiquette?

    • A.

      The proper use of manners and etiquette on the Internet.

    • B.

      Using a net to catch fish.

    • C.

      Being mean to other people on Facebook.

    • D.

      Using proper manners at the dinner table.

    Correct Answer
    A. The proper use of manners and etiquette on the Internet.
    Explanation
    Netiquette refers to the proper use of manners and etiquette on the Internet. It involves following guidelines and rules of behavior while interacting with others online. This includes being respectful, courteous, and considerate in online communication, avoiding offensive language or behavior, and respecting others' privacy and boundaries. Netiquette helps to create a positive and respectful online environment for everyone to interact and communicate effectively.

    Rate this question:

  • 10. 

    Which of these is cyber-bullying?

    • A.

      Flame mail.

    • B.

      Hate mail.

    • C.

      Posting mean comments on a discussion board.

    • D.

      All of the above.

    Correct Answer
    D. All of the above.
    Explanation
    The correct answer is "All of the above." Cyber-bullying refers to any form of harassment or intimidation that takes place online. Flame mail and hate mail both involve sending abusive or threatening messages to someone electronically, while posting mean comments on a discussion board involves publicly humiliating or belittling someone online. Therefore, all of these actions fall under the category of cyber-bullying.

    Rate this question:

  • 11. 

    What is considered shouting over the Internet?

    • A.

      Screaming at your computer.

    • B.

      Writing in all CAPS.

    • C.

      Putting a lot of exclamation marks at the end of a sentence.

    • D.

      Not answering a friend request on Facebook.

    Correct Answer
    B. Writing in all CAPS.
    Explanation
    Writing in all CAPS is considered shouting over the Internet because it is seen as aggressive and can be interpreted as yelling. Using all capital letters in online communication is often perceived as rude and disrespectful, as it can be difficult to read and is equivalent to raising one's voice in a conversation. It is important to use proper etiquette and considerate communication when interacting with others online.

    Rate this question:

  • 12. 

    Who can see the information you type in a chat room?

    • A.

      Only the person to whom you are chatting.

    • B.

      Anyone on the web at anytime.

    • C.

      Only the person with you at the computer.

    • D.

      Anyone in the chat room at the time.

    Correct Answer
    D. Anyone in the chat room at the time.
    Explanation
    The correct answer is that anyone in the chat room at the time can see the information you type. This means that the information you share in a chat room is visible to all the participants who are present in the chat room at that particular moment. It is important to be cautious and mindful of the information you share in a chat room as it can be seen by others.

    Rate this question:

  • 13. 

    If you receive a text or email from someone you don't know, what should you do?

    • A.

      Open it immediately and reply.

    • B.

      Call the police.

    • C.

      Delete it without opening it.

    • D.

      Leave it in your inbox until you figure out who it is.

    Correct Answer
    C. Delete it without opening it.
    Explanation
    When receiving a text or email from an unknown sender, it is advisable to delete it without opening it. This is because opening it may expose you to potential risks such as phishing scams, malware, or unwanted solicitations. It is always better to exercise caution and avoid engaging with unknown messages to protect your personal information and ensure online safety.

    Rate this question:

  • 14. 

    You should never give out which of the following on the Internet?

    • A.

      Your name.

    • B.

      Your age.

    • C.

      Your address.

    • D.

      All of the above.

    Correct Answer
    D. All of the above.
    Explanation
    Giving out personal information such as name, age, and address on the internet can be risky as it can be accessed by anyone, including potential scammers or identity thieves. Sharing this information can lead to privacy breaches and increase the chances of becoming a victim of cybercrime. Therefore, it is important to never give out any of this information online to protect one's personal safety and security.

    Rate this question:

  • 15. 

    To avoid being cyber-bullied you should always...

    • A.

      Give out personal information to anyone who asks.

    • B.

      Strike first - post mean things about other people on your Wall on Facebook.

    • C.

      Observe proper netiquette rules.

    • D.

      Ignore any requests from people to be your friend online.

    Correct Answer
    C. Observe proper netiquette rules.
    Explanation
    To avoid being cyber-bullied, it is important to observe proper netiquette rules. This means following guidelines for respectful and appropriate behavior online, such as being polite, refraining from posting offensive or hurtful comments, and treating others with kindness and empathy. By practicing good netiquette, individuals can create a positive online environment and reduce the risk of being targeted by cyber-bullies.

    Rate this question:

  • 16. 

    What do you do if you feel you are being cyber-bullied?

    • A.

      Tell a trusted adult like a parent or teacher.

    • B.

      Tell no one, it's embarrassing.

    • C.

      Just delete anything referring to you on the internet.

    • D.

      Call the police.

    Correct Answer
    A. Tell a trusted adult like a parent or teacher.
    Explanation
    If you feel you are being cyber-bullied, it is important to reach out to a trusted adult like a parent or teacher for help and support. They can provide guidance on how to handle the situation, offer emotional support, and take necessary actions to address the cyber-bullying. Keeping it to yourself or just deleting online content may not effectively resolve the issue or prevent further harm. In severe cases, involving the police may be necessary, but seeking assistance from a trusted adult should be the first step.

    Rate this question:

  • 17. 

    How are you judged in cyberspace?

    • A.

      No one can see you, so no one can judge you.

    • B.

      You are judged by what you do on the Internet and how it looks - by your spelling, grammar, and netiquette.

    • C.

      You are judged by your intent - if you didn't mean to hurt someone's feelings, then it's okay.

    • D.

      You are judged by how you look - your profile picture is important.

    Correct Answer
    B. You are judged by what you do on the Internet and how it looks - by your spelling, grammar, and netiquette.
    Explanation
    In cyberspace, you are judged by what you do on the Internet and how it looks, including your spelling, grammar, and netiquette. Even though no one can physically see you, your online actions and behavior reflect your character and can leave a lasting impression on others. Poor spelling and grammar can make you appear careless or uneducated, while good netiquette shows respect and consideration for others. Therefore, it is important to be mindful of your online presence and how you portray yourself in order to be judged positively in cyberspace.

    Rate this question:

  • 18. 

    If you get an embarrassing picture from someone you know you should NEVER...

    • A.

      Tell your parents or a teacher.

    • B.

      Talk to the person again.

    • C.

      Discourage the person from sending pictures like that.

    • D.

      Send it on to other friends.

    Correct Answer
    D. Send it on to other friends.
    Explanation
    Sending an embarrassing picture of someone to other friends is not the appropriate action to take. It is important to respect the privacy and feelings of others, even if they have sent the picture to you. Sharing the picture with others can lead to further embarrassment and potential harm to the person involved. It is advisable to handle such situations responsibly and considerate by not forwarding or sharing the picture with anyone else.

    Rate this question:

  • 19. 

    What is a worm? 

    • A.

      Malware that sneaks onto your computer; often through an email attachment, and then makes copies of itself.

    • B.

      Programs that, when installed on your computer, enable unauthorized people to access it and sometimes to send spam from it.

    • C.

      A program that reproduces itself over a network and can use up your computer's resources and possibly shut your system down.

    • D.

      Short for "malicious software;" includes viruses and spyware that steal personal information, send spam and commit fraud.

    Correct Answer
    C. A program that reproduces itself over a network and can use up your computer's resources and possibly shut your system down.
    Explanation
    A worm is a type of malware that is capable of reproducing itself over a network. Once it infects a computer, it can use up the computer's resources and potentially shut down the system. Unlike viruses, worms do not require a host program to spread and can independently replicate and spread across networks. This makes them particularly dangerous as they can quickly infect multiple computers and cause widespread damage.

    Rate this question:

  • 20. 

    What is a virus? 

    • A.

      Malware that sneaks onto your computer; often through an email attachment, and then makes copies of itself.

    • B.

      Programs that, when installed on your computer, enable unauthorized people to access it and sometimes to send spam from it.

    • C.

      A program that reproduces itself over a network and can use up your computer's resources and possibly shut your system down.

    • D.

      Short for "malicious software;" includes viruses and spyware that steal personal information, send spam and commit fraud.

    Correct Answer
    A. Malware that sneaks onto your computer; often through an email attachment, and then makes copies of itself.
    Explanation
    A virus is a type of malware that infiltrates a computer, typically through an email attachment, and then replicates itself. This malicious software can cause harm by consuming computer resources and potentially shutting down the system.

    Rate this question:

  • 21. 

    What is malware? 

    • A.

      Malware that sneaks onto your computer; often through an email attachment, and then makes copies of itself.

    • B.

      Programs that, when installed on your computer, enable unauthorized people to access it and sometimes to send spam from it.

    • C.

      A program that reproduces itself over a network and can use up your computer's resources and possibly shut your system down.

    • D.

      Short for "malicious software;" includes viruses and spyware that steal personal information, send spam and commit fraud.

    Correct Answer
    D. Short for "malicious software;" includes viruses and spyware that steal personal information, send spam and commit fraud.
    Explanation
    Malware refers to malicious software, such as viruses and spyware, that is designed to harm or exploit a computer system. It can steal personal information, send spam, and commit fraud. This type of software can enter a computer through various means, such as email attachments, and then replicate itself. It can also enable unauthorized individuals to access a computer and use its resources. The correct answer accurately describes malware and its harmful effects.

    Rate this question:

  • 22. 

    What is a Trojan? 

    • A.

      Malware that sneaks onto your computer; often through an email attachment, and then makes copies of itself.

    • B.

      Programs that, when installed on your computer, enable unauthorized people to access it and sometimes to send spam from it.

    • C.

      A program that reproduces itself over a network and can use up your computer's resources and possibly shut your system down.

    • D.

      Short for "malicious software;" includes viruses and spyware that steal personal information, send spam and commit fraud.

    Correct Answer
    B. Programs that, when installed on your computer, enable unauthorized people to access it and sometimes to send spam from it.
    Explanation
    A Trojan is a type of malware that disguises itself as a legitimate program or file, tricking users into installing it. Once installed, it allows unauthorized individuals to gain access to the infected computer and potentially send spam from it. Unlike viruses or spyware, Trojans do not reproduce themselves over a network or use up computer resources to shut down the system.

    Rate this question:

  • 23. 

    The most common form of injury from a fall in a broken wrist

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement "The most common form of injury from a fall is a broken wrist" is false. While a broken wrist is a common injury from falls, it is not the most common form of injury. Falls can result in various injuries, including fractures in other parts of the body, head injuries, sprains, and bruises. The severity and type of injury can vary depending on factors such as the height of the fall, the surface landed on, and the individual's age and health condition.

    Rate this question:

  • 24. 

    Proper lighting in the home helps to prevent falls

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Proper lighting in the home helps to prevent falls because it improves visibility, making it easier to see potential hazards such as steps, uneven surfaces, or objects on the floor. Adequate lighting also helps to enhance depth perception and balance, reducing the risk of tripping or stumbling. Additionally, good lighting can help older adults with age-related vision changes, such as reduced visual acuity or contrast sensitivity, to navigate their surroundings safely.

    Rate this question:

  • 25. 

    Stairs are the most common place for falls that result in a serious injury, Always keep these areas well lit

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Stairs are indeed a common place for falls that can lead to serious injuries. This is because people often lose their balance or trip while navigating stairs, especially if they are poorly lit. By keeping these areas well lit, the visibility is improved, reducing the risk of accidents and injuries. Therefore, the statement "Always keep these areas well lit" is true and important for preventing falls and promoting safety.

    Rate this question:

  • 26. 

    Electric cords or oxygen tubing on the floor is not a true tripping hazard for an elderly client

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because electric cords or oxygen tubing on the floor can pose a significant tripping hazard for an elderly client. Elderly individuals may have reduced mobility, balance issues, or impaired vision, making them more susceptible to tripping and falling. Tripping over cords or tubing can lead to serious injuries such as fractures or head trauma. It is important to keep the environment clear and free of any potential hazards to ensure the safety of elderly clients.

    Rate this question:

  • 27. 

    Keeping shoe laces tied or Velcro fastened is a way to prevent falls

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Keeping shoe laces tied or Velcro fastened can help prevent falls because loose or untied shoelaces can easily become tangled or caught on objects, causing the person to trip and fall. By ensuring that shoe laces are securely tied or using Velcro fasteners, the risk of tripping and falling is reduced, thereby preventing potential injuries.

    Rate this question:

  • 28. 

    The #1 cause of office-related injuries are caused by?

    • A.

      Slips, Trips, and Falls

    • B.

      Misuse of equipment

    • C.

      Electrical hazards

    • D.

      Heat-generating equipment hazard

    Correct Answer
    A. Slips, Trips, and Falls
    Explanation
    Slips, trips, and falls are the number one cause of office-related injuries. These accidents can occur due to various reasons such as wet or slippery floors, uneven surfaces, cluttered walkways, or improper footwear. Employees may also trip over objects or cables, leading to injuries. Falls from heights, such as from ladders or stairs, can also result in severe injuries. It is crucial for employers to ensure a safe working environment by implementing measures like regular maintenance, proper signage, clear walkways, and employee training to prevent these accidents.

    Rate this question:

  • 29. 

    Ergonomics is the science of designing the job to fit the worker, instead of forcing the worker to fit the job.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Ergonomics is indeed the science of designing the job to fit the worker. This means that instead of expecting the worker to adapt to the job, the job is modified to suit the specific needs and capabilities of the worker. This approach aims to optimize efficiency, productivity, and overall well-being by ensuring that the work environment and tasks are comfortable, safe, and tailored to the individual.

    Rate this question:

  • 30. 

    Giving credit to the person who created the work, such as a photograph, sound recording, motion picture, or document is called ____

    • A.

      Fair use

    • B.

      Copyrighting

    • C.

      Attribution

    • D.

      Public domain

    Correct Answer
    C. Attribution
    Explanation
    Attribution is needed even if you get permission from the author.

    Rate this question:

  • 31. 

    Works that are not copyrighted and may be used without permission are called ____.

    • A.

      Public domain

    • B.

      Attritioned

    • C.

      Non profit

    • D.

      Property

    Correct Answer
    A. Public domain
    Explanation
    However, you should still give credit to the source, even if your material is public domain.

    Rate this question:

  • 32. 

    I can legally burn back-up DVDs for my own home collection.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    It is illegal to copy your personal copyrighted DVD collection for the purpose of backing it up. The Digital Millennium Copyright Act makes it a crime to circumvent anti-piracy measures built into your commercial DVDs (UCLA: 2001). This means that if you have to decode a DVD in order to copy it, even for personal purposes, you are breaking the law. Proposals to count this action as exempt from the DMCA have been rejected by the Copyright Office. (Lohmann:2005)

    Rate this question:

  • 33. 

    I can legally share my Hollywood DVD collection with my friends by either uploading them to the internet or burning copies, as long as I don’t sell them for profit.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    It doesn’t matter whether or not you are making any money off the deal; the government will still hold you as an infringer if you upload your copyrighted DVDs to the internet or burn copies for your friends to watch.
    In 1997, congress enacted the “No Electronic Theft (NET) Act” to facilitate prosecution of copyright violation on the internet. “The NET Act makes it a federal crime to reproduce, distribute, or share copies of electronic copyrighted works such as songs, movies, games, or software programs, even if the person copying or distributing the material acts without commercial purpose and/or receives no private financial gain.” (IU: 2008)
    As for making copies and distributing them to your friends, the DMCA makes it illegal for you make your commercial DVDs “burnable” by cracking the anti-piracy codes encrypted on them.

    Rate this question:

  • 34. 

    If I rent a DVD I can copy it for later or repeat viewing.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    It is illegal to rent a Hollywood DVD and then make a copy so that you can watch it later. In fact, it is illegal to make a copy of a Hollywood DVD even if you own it. The Digital Millennium Copyright Act makes it a crime to circumvent anti-piracy measures built into your commercial DVDs (UCLA: 2001). This means that if you have to decode a DVD in order to make a copy of it, even for personal purposes, you are breaking the law. (Lohmann:2005) Although some “time-shifting” activities (like TiVo) are legal, burning rented DVD’s is not.

    Rate this question:

  • 35. 

    What is copyright?  Check all that apply. 

    • A.

      A legal protection that guarantees that only the original creator of the work has the right to use it.

    • B.

      A legal protection against copying and using original work.

    • C.

      The legal protection that says that only the original writer or artist can derive profit from the original work.

    • D.

      A legal intellectual property protection that is in place for a certain amount of time.

    Correct Answer(s)
    A. A legal protection that guarantees that only the original creator of the work has the right to use it.
    B. A legal protection against copying and using original work.
    D. A legal intellectual property protection that is in place for a certain amount of time.
    Explanation
    The correct answer is a combination of the first, second, and fourth options. Copyright is a legal protection that guarantees that only the original creator of the work has the right to use it, and it also provides protection against copying and using original work. Additionally, copyright is a legal intellectual property protection that is in place for a certain amount of time.

    Rate this question:

  • 36. 

    The definition of RESPECT is:

    • A.

      To regard or treat without respect; regard or treat with contempt or rudeness.

    • B.

      Esteem for or a sense of the worth or excellence of a person, a personal quality or ability, or something considered as a manifestation of a personal quality or ability

    • C.

      Chargeable with being the author, cause, or occasion of something

    • D.

      Not capable of or qualified for responsibility, as due to age, circumstances, or a mental deficiency.

    Correct Answer
    B. Esteem for or a sense of the worth or excellence of a person, a personal quality or ability, or something considered as a manifestation of a personal quality or ability
    Explanation
    The correct answer is the definition of respect as "esteem for or a sense of the worth or excellence of a person, a personal quality or ability, or something considered as a manifestation of a personal quality or ability." This definition implies that respect involves valuing and appreciating someone or something for their positive qualities or abilities. It suggests that respect is not about treating someone with contempt or rudeness, nor is it about assigning blame or responsibility. Instead, respect is about recognizing and acknowledging the worth and excellence in others.

    Rate this question:

  • 37. 

    This is an example of respect: Yelling or talking back to your elder.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Yelling or talking back to your elder is not an example of respect. Respect involves treating others with politeness, consideration, and deference, especially towards those who are older or in a position of authority. Yelling or talking back shows a lack of respect and disregard for the feelings and opinions of the elder. Therefore, the correct answer is False.

    Rate this question:

  • 38. 

    This is an example of respect: Telling your mother to, "Go to hell!"

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    This statement is an example of disrespect, not respect. Telling someone to "go to hell" is a rude and offensive remark, showing a lack of consideration and regard for the other person. Respect involves treating others with kindness, politeness, and consideration, which is not demonstrated in this statement. Therefore, the correct answer is false.

    Rate this question:

  • 39. 

    This is an example of respect: Saying, "Yes ma'am, no sir."

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    This statement demonstrates respect because it shows the use of polite and formal language when addressing someone. By saying "Yes ma'am, no sir," the person is acknowledging the authority and showing deference to the person they are speaking to. This behavior is often considered respectful in many cultures and societies.

    Rate this question:

  • 40. 

    You will be able to use team skills throughout your life.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Team skills are essential in various aspects of life, such as school, work, and personal relationships. Being able to effectively work with others, communicate, collaborate, and problem-solve as a team member is a valuable skill set that can be utilized in different situations and contexts. Whether it's participating in group projects, being part of a sports team, or working in a professional setting, the ability to work well with others and contribute to a team's success is a lifelong skill that can be applied in numerous scenarios.

    Rate this question:

  • 41. 

    Collaboration means working with others for a common ______________.

    Correct Answer
    Purpose
    Goal
    Explanation
    Collaboration means working with others for a common purpose or goal. It involves individuals or groups coming together to achieve a shared objective, whether it is completing a project, solving a problem, or reaching a desired outcome. Through collaboration, people can combine their skills, knowledge, and resources to enhance productivity, creativity, and effectiveness. By working towards a common purpose or goal, collaboration promotes teamwork, communication, and cooperation among individuals, leading to better results and mutual success.

    Rate this question:

  • 42. 

    Effective communication includes passive and aggressive behaviors. 

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Effective communication does not include aggressive behaviors. Aggressive behaviors can be harmful, disrespectful, and can hinder effective communication. Effective communication focuses on active listening, clear and concise expression of thoughts and ideas, and respectful and empathetic communication. Aggressive behaviors such as yelling, interrupting, or attacking others' opinions can create a hostile environment and prevent effective communication from taking place. Therefore, the statement that effective communication includes aggressive behaviors is false.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 19, 2014
    Quiz Created by
    Paula_Wright
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.