Decisions and Problems
Values and Goals
Online Safety
Socially Safe
Safety First
100

What is the specific, core problem I am trying to solve?

Clearly identifying the problem ensures you are not just treating symptoms. Separating facts from emotions helps, as seen in this discussion on critical thinking for decisions.

100

What was a moment in your life when you felt truly happy, alive, and authentic?

Analyzing this moment helps uncover your core values. For example, if the moment involved leading a team to victory, your values might include leadership, collaboration, or achievement.

100

You should never share this with anyone except a trusted parent or guardian.

Sharing personal information with anyone other than a trusted parent or guardian is unsafe because it can lead to severe real-world dangers, including physical harm, digital exploitation, and identity theft.

100

Someone you only know through a computer screen, even if they claim to be a kid, is called this.

A person you only know through a computer screen, even if they claim to be a kid, is generally known as an online stranger, Internet stranger, or online persona. If they are pretending to be someone else to deceive you, this is called catfishing

100

The first thing you should do if the smoke alarm goes off?

The absolute first thing you should do when a smoke alarm goes off is check for fire and smoke. If there is any sign of fire or smoke, immediately evacuate the building, ensuring everyone is safe, and call 9-1-1 from outside. Do not stop to gather belongings, as prompt escape is critical

200

Will this decision matter in 5 minutes, 5 months, or 5 years?

Using this 5-5-5 rule or a similar approach helps reduce overthinking small issues and focuses energy on long-term consequences.

200

If you had $50 million and no need to work, how would you spend your time?


    • This removes financial barriers, revealing what you genuinely care about. Answers often point to values like creativity  painting, service or knowledge traveling and learning.
200

Using your birthday or pet's name makes this very easy for hackers

Hackers use personal information like pet names, birthdays, and graduation years to crack passwords. If your password is based on details you share on social media, you could be at risk. Protect yourself with long, unique, random passwords for every account using a password manager

200

This setting on Instagram or TikTok keeps strangers from seeing your posts.

The primary setting to prevent strangers from seeing your posts on both Instagram and TikTok is to switch your profile to a Private Account. This requires you to approve followers, ensuring only approved users can view your posts, stories, and Reels.

200

If a stranger calls, you should never give them this.

If a stranger calls, you should never give them confirmation that you are a human, such as saying Yes to the question Can you hear me? This tactic is designed to record your voice to authorize fraudulent charges or to verify your phone number for future phishing scams. 

300

What are the potential 2nd and 3rd order consequences of this choice?


Look beyond the immediate result to consider what happens next, as discussed on this blog post regarding decision-making. This prevents creating new, larger problems down the road.

300

What is the "why" behind your current top goal?



    • This connects goals to values. If your goal is to get a promotion, your why might be to provide security for your family value security or to gain influence to make changes value impact

300

A strong password should have a combination of letters, numbers, and these

A strong password should have a combination of letters, numbers, and symbols or special characters. To maximize security, these passwords should be at least 12–16 characters long and include a mix of uppercase and lowercase letters

300

If a stranger online asks to meet you in person, you should do this immediately

If a stranger online asks to meet immediately, you should propose a video call first to verify their identity. If they refuse, that is a red flag indicating a potential scam. If you proceed, always choose a public location, inform someone, and arrange your own transportation.

300

These lights should be used when you pull over to the side of the road?

Hazard lights or emergency flashers should be used when you pull over to the side of the road to alert other drivers of your presence, especially during emergencies or breakdowns. Activating them immediately warns oncoming traffic to slow down or move over.

400

Am I allowing emotions to dictate this choice, or am I listening to my intuition?


While data is crucial, intuition—if balanced with facts—can provide necessary insights that might not be immediately obvious.

400

Are your daily habits contributing to your long-term success?

This checks alignment between actions and values. If you value health but skip exercise daily, your goals are not aligned with your daily, which requires a shift in habits.

400

This practice, which involves using a different secret code for every site, ensures that if one account is breached, the others stay safe.

This essential security practice is known as using unique passwords or maintaining password hygiene, specifically aimed at preventing credential stuffing attacks

400

A person who lies about their identity online to trick you into a relationship is known as this.

A person who lies about their identity online to trick you into a relationship is known as a catfish, and the act is called catfishing. They use fake photos and personas to create emotional bonds, often for financial gain, revenge, or emotional manipulation

400

The number to call in the United States for any emergency.

In the United States, the universal number to call for any emergency requiring police, fire, or emergency medical services is 911. It is a free, nationwide service, accessible from any phone, including mobile devices and payphones.

500

Have I received wise counsel, or am I acting in isolation?

 Consulting trusted advisors often uncovers blind spots. Pharaoh’s refusal to listen in the Bible exemplifies the danger of ignoring advice, a concept discussed in this article on better decision-making. 

500

What would you like to be remembered for at your 90th birthday?

This determines long-term legacy and priority. It helps distinguish between superficial goals and meaningful goals, ensuring your life’s direction aligns with your deepest values

500

True or False: It is okay to save your passwords on a public computer if you are in a rush.

False. Saving passwords on a public computer is never recommended, regardless of time constraints, as it puts your personal data at high risk. Anyone who uses the computer afterward can access your accounts, and many public computers may be compromised with malware designed to steal credentials. [1, 2, 3, 4]

500

People on the internet may use nicknames or a fake name so you can never be sure who they are.

Using a fake name is generally called a pseudonym or an alias. A pseudonym is a fictitious name adopted for a specific purpose, such as protecting privacy, acting, or writing. Specific types include pen names for authors, stage names for performers, and online usernames, all intended to conceal the individual's real identity. 

500

If you smell gas in your home, you should not turn on these

If you smell gas in your home, you should not turn on any electrical switches, lights, or appliances. Do not turn on or off any device, including computers or flashlights, as this can create a spark that may lead to an explosion.

M
e
n
u