No student devices needed. Know more
25 questions
Josh has been sending malicious text messages to one of his classmates and writing negative comments on Facebook about this person. Which of the following describes Josh's behavior?
Sexting
Cyberbulling
Piracy
Plagiarism
David's friend told him she was cyberbullied. What should David NOT do?
Tell a trusted adult
Post mean comments to attack the bully
Offer help to his friend
Encourage his friend to defend herself
Allison has noticed her 16-year-old son, Jeffrey, has been spending a lot of time on the Internet recently. Which of the following should Allison NOT do in order to protect Jeffrey from potential Internet dangers?
Educate Jeffrey about Internet dangers
Use parental control software
Post her private information on social networking sites
Limit Jeffrey's online access
Victoria received a semi-nude picture of someone she knows through her cell phone. Which of the following is an appropriate reaction?
Post it on Facebook
Tell others about it
Forward it to other friends
Delete it immediately
Eric just purchased a new computer and would like to protect his computer form viruses. Which of the following actions should Eric take?
Install an anti-virus software
Open attachments through an unknown e-mail
Visit an unknown website
Start defragmentation on the computer
Sharron's computer was infected by viruses. Which of the following could be a possible cause?
Sharron scanned her computer for viruses
Sharron copied a file from her computer to an external hard drive
Sharron connected her computer to a printer
Sharron downloaded free movies from the Internet
Which of the following is NOT one of the possible results of inappropriate Internet use?
Your computer can be attacked by viruses
Your personal information can be used by hackers
your identity can be stolen
your computer can have hardware problems
Colby spent a lot of his free time in a local coffee shop where Internet access is free. However, the coffee shop owner has not set up a password for the Wi-Fi network. Which of the following online activities is safe for Colby to do at the coffee shop?
Buy textbooks using his credit card
check one of his social media sites
conduct academic research
check his online bank account
Which of the following can provide protections to Nike's slogan "Just Do It"?
copyright
trademark
patent
industry design right
Cathy is a high school science teacher and she would like to copy some online educational materials to distribute to her students. Which of the following materials can Cathy NOT make copies of?
The entire Astronomy Today book
An article from National Geographic magazine
A graph from the American Scientist Magazine
A chapter from the Cosmos book
Which of the following did Greg Bazar use as an analogy to describe a switch?
Dock
Island
Traffic Light
Street
Which of the following terms describes a "security component which encrypts data and keeps it private within a public network"?
Transport Layer Security
Point-to-point tunneling protocol
Intrusion Detection System
Virtual Private Network
Which of the following statements about hackers is NOT correct?
A hacker can refer to someone who is good at solving computer problems
There are white hat hackers and black hat hackers
A hacker can refer to someone who illegally accesses someone else's computer
All hackers are trying to break into others' computes for their financial benefit
Which of the following terms can be defined as "crime which occurs when someone's personal and financial information is stolen in order to impersonate him or her for financial gain?"
advanced fee scheme
identity theft
internet auction fraud
investment fraud
Which of the following is NOT a discussed prevention method from identity theft?
avoid e-mail scams
protect personal information
install anti-virus software
set up strong passwords
According to Greg Bazar, which of the following types of passwords can hackers breakthrough within one minute?
Passwords less than six characters in length
Passwords less than four characters in length
Passwords less than eight characters in length
Passwords less than ten characters in length
Which of the following terms describes a "collection of computers controlled by users other than their owners to perform automated tasks over the Internet?"?
Botnet
Virtual Private Network
Social Engineering
Intrusion Detection System
Which of the following situations CANNOT cause a computer to become infected?
Copying a file from a computer to a flash drive
Copying a file from a flash drive to a computer
Visiting an unknown website
Clicking link through an unknown e-mail?
According to a recent survey conducted by The National Campaign, how many teenagers reported they have received nude or semi-nude pictures?
33 percent
25 percent
48 percent
52 percent
According to Stephanie Winters, how many students ages 13 to 19 are engaging in sexting?
One-sixth
one-fifth
one-fourth
one-third
According to Stephanie Winters, which of of the following is true?
More boys than girls are sending sexts
Sexts cannot be distributed to other schools or other cities
Sexting can result in fines from your cell phone company
Most sexts are sent between boyfriends and girlfriends
Which of the following methods is appropriate to use to prevent predators for finding you online?
Keep private information private
Accept strangers as Facebook friends
Avoid talking about predators
arrange a meeting with a stranger from the Internet
To avoid online predators, which of the following should you NEVER do under any circumstance?
Add friends to your Facebook account
Meet with a stranger from the Internet
Post your political opinions online
Post your friends' information online
Through which of the following channels do 82% of sex offenders gain information about their target?
Victims' friends
Text messages
Social media sites
Victims' schools
Which of the following is the Golden Rule discussed in this segment?
The best thing to give to your enemy is forgiveness
The only true wisdom is knowing you know nothing
Honesty is the best policy
Treat others how you would want to be treated
Explore all questions with a free account