Digital Literacy
Cyberbullying
Internet Safety
Social Media
Vocabulary
AUP
100

To indent paragraphs you use...


A: the space bar

B: the tab key

C: the esc key

B. the tab key

100

What's the best way to prove that you've been a victim of Cyberbullying?

A: Talk about it on the phone with a parent

B: Tell a friend

C: Save screenshots of the encounter

C: Save screenshots of the encounter

100

What is one difference between online and face-to face communication?

A: People tend to be more honest online.

B. Miscommunications happen face-to face

C. Online, you can't tell tone of voice.

C. Online, you can't tell tone of voice.

100

 What should Liz do before posting a photo of Tyler online?

A: Ask Tyler for permission to post.

B: Send the photo to Tyler.

C: Tag Tyler in the photo.

A: Ask Tyler for permission to post.

100

Your desktop gets cluttered with pop-up windows whenever you launch a browser. Your device is infected with:

A: Spyware

B: Ransomware

C: Adware

C: Adware

100

What does AUP stand for?

   Acceptable Use Policy

200

When capitalizing a single letter you should use...

A: the shift key

B: the CapsLock key

C: The Ctrl key

A: The shift key

200

Why should you never send emails or texts when you're angry or upset?

A: You may not have the best of judgement when emotions are running high.

B: It's harder to tell an emotion from a text.

C: You must type fast and make spelling errors.

A: You may not have the best of judgement when emotions are running high.

200

Internet Trolls aim to...

A: quietly observe.

B: start arguments.

C: lead discussions.

B: start arguments.

200

Most social media platforms make money by:

A: Charging people to sign up

B: Selling users' contact info to advertisers

C: Selling space to advertisers

C: Selling space to advertisers

200

A person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being bullied.

A: Bystander

B: Upstander

C: Protector

B: Upstander

200

Computers at school are here for your __________.

                              

Education

300

What information about a source is most likely to appear in a bibliography?

A: Author's date of birth

B: Name of author

C: Quotation from the author

B: Name of author

300

Which of the following would be an example of cyberbullying?

A: Party at Tim's house 8pm tonight.

B: I disagree - I like math.

C: Don't tell Rita about Tim's party.

C: Don't tell Rita about Tim's party.

300

 How is flaming (posting insults) similar to teasing?

A: Both happen only on the Internet

B: Both can hurt people's feelings

C: Both are examples of good Netiquette

B: Both can hurt people's feelings

300

How do social media platforms target users with ads?

A: Ads are placed on the most prominent parts of your screen

B: Content you post is used to match you to relevant ads

C: The more money you spend in online stores, the more ads you see

B: Content you post is used to match you to relevant ads

300

What does URL stand for?

A. Universal Reciprocating Location

B. Uniform Resource Locator

C. Under Recent Lines

B. Uniform Resource Locator

300

Computers at school are NOT here for your __________.

Entertainment.  

400
When creating a bibliography and using both books and online sources...

A: You should cite both types of sources.

B: You only need to cite your book sources.

C: You only need to cite your online sources.

A: You should cite both types of sources.

400

Over a few days, you receive a series of insulting texts from someone at school. What action should you take after deleting the first text?

A: Delete any further texts.

B: Confront the bully.

C: Show any other texts to a trusted adult.

C: Show any other texts to a trusted adult

400

Which emotion is most likely to be triggered in a flamewar (both sides posting insults)?

A. feeling sick

B: feeling happy

C: feeling angry

C: feeling angry

400

Which of these is valuable data for a social media platform to share with advertisers?

A: The photos and comments you post

B: The ads that appear in your feed

C: Any users the platforms suggests you follow

A: The photos and comments you post

400

  Usually underlined in blue, this will send you to a website.

hypertext link

400

Never type anything on a school computer you would not say out loud in front of ______________.

Your teacher or librarian.

500

When someone's work enters the public domain it becomes...

A: something anyone can use for free.

B: something you have to pay to use.

C: something you should avoid.

A: something you can use for free.

500

Why would an identity thief most likely want to steal your information?

A: To imitate you in chat rooms and message boards

B: To access your bank accounts, credit cards and other financial resources

C: To send viruses out from your email account

 To access your bank accounts, credit cards and other financial resources

500

The best way to respond to trolls is to _____ them.

A: insult

B: ignore

C: threaten

B: ignore

500

 

What might motivate people to post on social media sites?

A: The more you post, the more content you're allowed to see.

B: The more you post, the fewer ads you see.

C: Posts get feedback, which people naturally crave.

C: Posts get feedback, which people naturally crave.

500

A group of computers that is networked together and used by hackers to steal information is called a...

A: Botnet

B: Operating System

C: DDos

A: Botnet

500

Everything on the Internet belongs to ___________.

The person who created it.

600

What is the main purpose of a copyright?

A: To protect the user of a creative work

B: To protect the buyer of a creative work

C: To protect the creator of a creative work

C: To protect the creator of a creative work

600

Tommy was in a school bathroom and Doug came in holding up his phone and laughing. Doug took a photo of Tommy and threatened to Snapchat it to his friends. Tommy should:

A: Laugh along with Doug

B: Ask Doug not to Snapchat it then tell a trusted adult

C: Take a photo of Doug and Snapchat it to his friends

B: Ask Doug not to Snapchat it then tell a trusted adult

600

What does the “https://” at the beginning of a URL denote, as opposed to "http://" (without the “s”)?

A: The site is displayed in High Definition.

B: The information on the site is encrypted and secure.

C: The site is the newest version available.

B: The information on the site is encrypted and secure.

600

Posting which of the following is most likely an example of oversharing?

A: A review of a movie you saw

B: A selfie from your birthday party

C: A picture of your report card

C: A picture of your report card

600

You need to create a password for an app. What advice should you follow?

A: Use your email password.

B: Include your name so you will remember it.

C: Use numbers, letters and special characters.



C: Use numbers, letters and special characters.

600

Who has to follow the district's rules when using computers?

A. Anyone who is using the district wi-fi.

B. Students, but not adults.

C. Teachers but not parents or students.

A. Anyone who is using the district wi-fi.

700

When searching on the Internet, what does putting something in quotation marks ("") mean?

A: Ignore these words

B: I'm not sure of the spelling.

C: Search this exactly as written.

C: Search this exactly as written.

700

2 girls created a list of their soccer teammates then ranked them from best to worst. A 3rd girl went into their locker at lunch, took a photo of the list and sent it to all their friends on Snapchat & Instagram.  A boy told the principal. Who is the bully in this situation?

A: The boy who told the principal

B: The 2 girls that created the list

C: All the girls

C: All the girls

700

You should get permission from ________ before signing up for anything, or posting personal information on the Internet.

      your parents

700

What is true about a post after you delete it?

A: It's erased from the internet.

B: It appears in your feed, but no one else's.

C: It can still appear in other people's feed.

C: It can still appear in other people's feed

700

Which of the following might be part of a site's Privacy Policy?

A: A promise that the site won't sell your information to other people

B: Information about how to acquire important anti-virus software

C: A software program that protects against spam and malware

A: A promise that the site won't sell your information to other people

700

At Brigadoon, what games are you allowed to play?

A. Any that your parents let you play at home.

B. Only those linked to the library website.

C. Just ABCYA games.


B. Only those linked to the library website.

800

Which search term will return the most hits?

A: Fred Rogers

B: "Fred Rogers"

C: "Fred Rogers" + television

A: Fred Rogers

800

Tommy & Sarah were boyfriend and girlfriend. Tommy kept asking Sarah to send him inappropriate photos of her or he would break up with her. What should Sarah do?

A: Tommy is popular so she should send him photos.

B: Sarah should tell a trusted adult even though she has feelings for Tommy, and not send photos.

C: Sarah should send Tommy photos if he'll send her photos.

B: Sarah should tell a trusted adult even though she has feelings for Tommy and not send photos.

800

Apps that use Geolocation are safe for anyone to use.

 A: Yes, my parents don't care where I am

B: Yes, All of my friends have geolocation on their phones enabled so it's fine.

C: No, it allows anyone to locate you which isn't safe.

C: No, it allows anyone to locate you which isn't safe.

800

Never post photos or information about your friends without their____________.

Permission

800

What do you call a scam designed to get your personal and private information?

A. malware

B: phishing

C: trolling

C: phishing

800

Copying something from the Internet and then turning it in as your own work is...

A. plagiarism

B. stealing

C. cheating

D. All of the above.


D. All of the above.

900

Web pages near the top of search results are generally the most...

A: relevant to your search.

B: likely to have advertising.

C: recently updated.

A: relevant to your search.

900

When is it ok to tell someone your password?

A: If you are best friends

B: if you are boyfriend or girlfriend

C: No one should have your password but you and your parents

C: No one should have your password but you and your parents

Your best friend today may not be your best friend tomorrow!

900

Apps that allow you to collaborate and chat promote a positive learning environment unless..

A: students use the feature during other classes to contact friends.

B: students create content they then sell

C: students use the feature at home.

A: Students use the feature during other classes to contact friends.

900

Which piece of personal information would be most valuable to a malware developer?

A: Your favorite social Media site

B: Your friend's email address

C: Your name

B: Your friend's email address

900

One of the main goals of malware is to:

A: Discover which websites you visit

B: Prevent you from visiting illegal websites

C: Make online shopping more convenient 

A: Discover which websites you visit

900

You can use "Scratch" in the library only if you are...

A. viewing the projects others have created.

B. wearing headphones.

C. working on your own projects.

 C. working on your own projects.

1000

Which strategy is most likely to improve a search engine query?

A: Use a complete sentence.

B: Use proper punctuation.

C: Add more search terms.

C: Add more search terms.

1000

_________of teens have reported being cyberbullied online.

A: 59%

B: 29%

C: 89%

A: 59% 

According to WWW.PEWINTERNET.ORG

1000

With GREAT Access, Comes _______________

A: Great Power

B: Great Responsibility

C: Great Respect

B: Great Responsibility

1000

Do not post anything on the Internet unless....

A. You want the whole world to see it forever.

B. You think it's really funny.

C. You send it to your parents first.

B: You want the whole world to see it forever.

1000

What is it called when someone repeatedly uses electronic devices to send, post, or share negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation.

Cyberbullying

1000

Using "Clever" you can go to our keyboarding program which is...

A. Typing.com

B. Typing Agent

C. Typing Mouse


Typing Agent




M
e
n
u