No student devices needed. Know more
43 questions
Which of the following statements defines cyberbullying?
Creation, distribution or forwarding of a message which includes sexually explicit materials through a computer, cell phone or other electronic devices
Fraud which involves stealing personal information for financial through e-mail
Use of computers, cell phones or other electronic devices to deliberately & repeatedly harm another person through the Internet
Use of other people's words, thoughts or ideas without crediting the source
According to the Cyberbullying Research Center, how many more times are cyberbullying victims likely to have attempted suicide than those who were not cyberbullied?
two times
three times
four times
five times
According to Sharron Davis, how long after losing a child can the parents start to find a new normal?
five years
seven years
eight years
ten years
According to a recent study by the Cyberbullying Research Center, how many students ages 11 to 18 have been cyberbullied?
20.1 percent
18.9 percent
22.3 percent
21.2 percent
According to the Cyberbullying Research Center, how many students ages 11 to 18 admitted they have bullied others through the Internet?
20.1 percent
18.9 percent
22.3 percent
21.2 percent
Which of the following is NOT an appropriate prevention from cyberbullying?
conducting research about cyberbullying
blocking access to bullies
calling the police
being careful about posting personal information
Which of the following is the correct reaction when someone you do not know asks you to add him or her as a friend on Facebook?
politely reject the request
accept this person as a friend
Ask how this person knows you
Ask your friends whether any of them know this person
Which of the following is the Golden Rule discussed in this segment?
The best thing to give to your enemy is forgiveness.
The only true wisdom is knowing you know nothing.
Honesty is the best policy.
Treat others how you would want to be treated.
Which of the following is NOT an appropriate response to cyberbullying?
Telling a trusted teacher you are being bullied.
Retaliating against the bully.
Collecting information and use it as evidence.
Asking the content provider to delete the malicious comments about you.
According to Sharron Davis, which of the following is a parent's responsibility to cyberbullying?
Educate children about the consequences of cyberbullying.
Contact the parents of the cyberbully.
Forbid children to use computers at home.
Install software on the home computer to monitor children's online behavior.
According to this segment, approximately how many sex offenders are there in the United States?
271,000
389,000
532,000
645,000
Which of the following methods is appropriate to use to prevent predators from finding you online?
keep private information private
accept strangers as friends on Facebook
avoid talking about predators
arrange a meeting with a stranger from the Internet
To avoid online predators, which of the following should you NEVER do under any circumstance?
add friends to your Facebook account
meet with a stranger from the Internet
post your political opinions online
post your friends' information online
Through which of the following channels do 82 percent of sex offenders gain information about their target?
victim's friend
text messages
social media sites
victims' schools
Which of the following actions is NOT a parent's responsibility to prevent their children from being victims of online predators?
educate children about online predators
ask for police protection
limit children's online activity
be a good role model
Which of the following statements defines sexting?
Creation, distribution or forwarding of a message which includes sexually explicit materials through a computer, cell phone or other electronic devices
Fraud which involves stealing personal information for financial gain through e-mail
Use of computers, cell phones or other electronic devices to deliberately & repeatedly harm another person through the Internet
Use of other people's words, thoughts or ideas without crediting the source
According to a recent survey conducted by The National Campaign, how many teenagers reported they have received nude or semi-nude pictures?
33 percent
25 percent
48 percent
52 percent
According to Stephanie Winters, how many students ages 13 to 19 are engaging in sexting?
one-sixth
one-fifth
one-fourth
one-third
Which of the following cases did Sharron Davis use to explain the harm of sexting?
Tonya Underwood's story
Ryan Halligan's story
Jessica Logan's story
Shirley Baker's story
According to Stephanie Winters, which of the following is true?
More boys than girls are sending sexts
Sexts cannot be distributed to other schools or other cities
Sexting can result in fines from you cell phone company
Most sexts are sent between boyfriends & girlfriends
Which of the following statements defines a computer virus?
Security component which encrypts data & keeps it private within a public network
Computer program which replicates & spreads itself from one computer to another
Computer device which forwards data packets from one network to another
Device which monitors network activities for malicious attacks & produces reports to a management station
Which of the following terms describes a "collection of computers controlled by users other than their owners to perform automated tasks over the Internet"?
Botnet
Virtual Private Network
Social Engineering
Intrusion Detection System
Which of the following situations CANNOT cause a computer to become infected?
Copying a file from a computer to a flash drive
copying a file from a flash drive to a computer
visiting an unknown website
clicking a link through an unknown e-mail
According to Greg Bazar, which of the following is NOT an example of individual loss caused by viruses?
stolen identity
blacklisted by credit bureau
more fraud fees
more late fees
Which of the following is NOT a discussed safe computing practice?
installing anti-virus software
conducting defragmentation
updating anti-virus software
scanning your computer for viruses
Which of the following statements about hackers is NOT correct?
a hacker can refer to someone who is good at solving computer problems
there are white hat hackers & black hat hackers
a hacker can refer to someone who illegally accesses someone else's computer
all hackers are trying to break into others' computers for their financial benefit
According to the Federal Trade Commission, how many Americans have their identity stolen each year?
six million
seven million
eight million
nine million
Which of the following terms can be defined as "crime which occurs when someone's personal & financial information is stolen in order to impersonate him or her for financial gain?"
advanced fee scheme
identity theft
Internet auction fraud
investment fraud
Which of the following is NOT a discussion prevention method from identity theft?
avoid e-mail scams
protect personal information
install anti-virus software
set up strong passwords
According to Greg Bazar, which of the following types of passwords can hackers break through within one minute?
passwords less than six characters in length
passwords less than four characters in length
passwords less than eight characters in length
passwords less than ten characters in length
Which of the following is NOT a network security device?
router
ethernet cable
firewall
switch
Which of the following did Greg Bazar use as a analogy to describe a router?
dock
island
traffic light
street
Which of the following did Greg Bazar use as a analogy to describe a switch?
dock
island
traffic light
street
Which of the following statements defines an Intrusion Detection System?
Computer device which forwards data packets from one network to another
software designed to protect computers from viruses
device which monitors network activities for malicious attacks & produces reports to a management station
network controller which connects network devices & allows effective communication between these devices
Which of the following terms describes a "security component which encrypts data & keeps it private within a public network:?
transport layer security
point-to-point tunneling protocol
intrusion detection system
virtual private network
Josh has been sending malicious text messages to one of his classmates & writing negative comments on Facebook about this person. Which of the following describes Josh's behavior?
sexting
cyberbullying
piracy
plagiarism
David's friend told him she was cyberbullied. What should David NOT do?
tell a trusted adult
post mean comments to attack the bully
offer help to his friend
encourage his friend to defend herself
Allison has noticed her 16-year-old son, Jeffrey, has been spending a lot of time on the Internet recently. Which of the following should Allison NOT do in order to protect Jeffrey from potential Internet dangers?
educate Jeffrey about Internet dangers
use parental control software
post her private information on social networking sites
limit Jeffrey's online access
Victoria received a semi-nude picture of someone she knows through her cell phone. Which of the following is an appropriate reaction?
post it on Facebook
tell others about it
forward it to other friends
delete it immediately
Eric just purchased a new computer & would like to protect his computer from viruses. Which of the following actions should Eric take?
install an anti-virus software
open attachments through an unknown e-mail
visit an unknown website
start defragmentation on the computer
Sharron's computer was infected by viruses. Which of the following could be a possible cause?
Sharron scanned her computer for virus
Sharron copied a file from her computer to an external hard drive
Sharron connected her computer to a printer
Sharron downloaded free movie from the Internet
Which of the following is NOT one of the possible results of inappropriate Internet use?
Your computer can be attached by viruses
your personal information can be used by hackers
your identity can be stolen
your computer can have hardware problems
Colby spent a lot of his free time in a local coffee shop, where the Internet access is free. However, the coffee shop owner has not set up a password for the Wi-Fi network. Which of the following online activities is safe for Colby to do at the coffee shop?
buy textbooks using his credit card
check one of this social media sites
conduct academic research
check his online bank account
Explore all questions with a free account