29 questions
Which of the following statements defines cyberbullying?
Creation, distribution or forwarding of a message which includes sexually explicit materials through a computer, cell phone or other electronic devices
Fraud which involves stealing personal information for financial gain through e-mail
Use of computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet
Use of other people’s words, thoughts or ideas without crediting the source
Which of the following is NOT an appropriate prevention from cyberbullying?
Conducting research about cyberbullying
Blocking access to bullies
Calling the police
Being careful about posting personal information
Which of the following is NOT an appropriate response to cyberbullying?
Telling a trusted teacher you are being bullied
Retaliating against the bully
Collecting information and use it as evidence
Asking the content provider to delete the malicious comments about you
Which of the following methods is appropriate to use to prevent predators from finding you online?
Keep private information private
Accept strangers as friends on Facebook®
Avoid talking about predators
Arrange a meeting with a stranger from the Internet
To avoid online predators, which of the following should you NEVER do under any circumstance?
Add friends to your Facebook® account
Meet with a stranger from the Internet
Post your political opinions online
Post your friends’ information online
Which of the following actions is NOT a parent’s responsibility to prevent their children from being victims of online predators?
Educate children about online predators
Ask for police protection
Limit children’s online activity
Be a good role model
Which of the following statements defines sexting?
Creation, distribution or forwarding of a message which includes sexually explicit materials through a computer, cell phone or other electronic devices
Fraud which involves stealing personal information for financial gain through e-mail
Use of computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet
Use of other people’s words, thoughts or ideas without crediting the source.
Which of the following statements defines a computer virus?
Security component which encrypts data and keeps it private within a public network
Computer program which replicates and spreads itself from one computer to another
Computer device which forwards data packets from one network to another
Device which monitors network activities for malicious attacks and produces reports to a management station
Which of the following terms describes a “collection of computers controlled by users other than their owners to perform automated tasks over the Internet”?
Botnet
Virtual Private Network
Social Engineering
Intrusion Detection System
Which of the following situations CANNOT cause a computer to become infected?
Copying a file from a computer to a flash drive
Copying a file from a flash drive to a computer
Visiting an unknown website
Clicking a link through an unknown e-mail
Which of the following is NOT a discussed safe computing practice?
Installing anti-virus software
Conducting defragmentation
Updating anti-virus software
Scanning your computer for viruses
Which of the following statements about hackers is NOT correct?
A hacker can refer to someone who is good at solving computer problems
There are white hat hackers and black hat hackers
A hacker can refer to someone who illegally accesses someone else’s computer
All hackers are trying to break into others’ computers for their financial benefit
Which of the following terms can be defined as “crime which occurs when someone's personal and financial information is stolen in order to impersonate him or her for financial gain?”
Advanced fee scheme
Identity theft
Internet auction fraud
Investment fraud
Which of the following is NOT a discussed prevention method from identity theft?
Avoid e-mail scams
Protect personal information
Install anti-virus software
Set up strong passwords
Which of the following is NOT a network security device?
Router
Ethernet cable
Firewall
Switch
Which of the following statements defines an Intrusion Detection System?
Computer device which forwards data packets from one network to another
Software designed to protect computers from viruses
Device which monitors network activities for malicious attacks and produces reports to a management station
Network controller which connects network devices and allows effective communication between these devices
Which of the following terms describes a “granted legal right which gives the creator of an original work exclusive rights to reproduce, publish, sell or distribute his or her production”?
Intellectual Property
Trademark
Copyright
Patent
Which of the following can be protected by copyright law?
A title
A name
A slogan
An original score of music
Which of the following statements defines plagiarism?
Use of computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet
Use of other people’s words, thoughts or ideas without crediting the source
Unauthorized reproduction or distribution of copyrighted materials
Fraud which involves stealing personal information for financial gain through e-mail
Josh has been sending malicious text messages to one of his classmates and writing negative comments on Facebook® about this person. Which of the following describes Josh’s behavior?
Sexting
Cyberbullying
Piracy
Plagiarism
David’s friend told him she was cyberbullied. What should David NOT do?
Tell a trusted adult
Post mean comments to attack the bully
Offer help to his friend
Encourage his friend to defend herself
Allison has noticed her 16-year-old son, Jeffrey, has been spending a lot of time on the Internet recently. Which of the following should Allison NOT do in order to protect Jeffrey from potential Internet dangers?
Educate Jeffrey about Internet dangers
Use parental control software
Post her private information on social networking sites
Limit Jeffrey’s online access
Victoria received a semi-nude picture of someone she knows through her cell phone. Which of the following is an appropriate reaction?
Post it on Facebook®
Tell others about it
Forward it to other friends
Delete it immediately
Eric just purchased a new computer and would like to protect his computer from viruses. Which of the following actions should Eric take?
Install an anti-virus software
Open attachments through an unknown e-mail
Visit an unknown website
Start defragmentation on the computer
Sharron’s computer was infected by viruses. Which of the following could be a possible cause?
Sharron scanned her computer for viruses.
Sharron copied a file from her computer to an external hard drive.
Sharron connected her computer to a printer.
Sharron downloaded free movies from the Internet.
Which of the following is NOT one of the possible results of inappropriate Internet use?
Your computer can be attacked by viruses.
Your personal information can be used by hackers.
Your identity can be stolen.
Your computer can have hardware problems.
Colby spent a lot of his free time in a local coffee shop, where the Internet access is free. However, the coffee shop owner has not set up a password for the Wi-Fi network. Which of the following online activities is safe for Colby to do at the coffee shop?
Buy textbooks using his credit card
Check one of his social media sites
Conduct academic research
Check his online bank account
Which of the following can provide protections to Nike®’s slogan “Just Do It”?
Copyright
Trademark
Patent
Industry design right
Cathy is a high school science teacher and she would like to copy some online educational materials to distribute to her students. Which of the following materials can Cathy NOT make copies of?
The entire Astronomy Today book
An article from the National Geographic magazine
A graph from the American Scientist magazine
A chapter from the Cosmos book