To indent paragraphs you use...
A: the space bar
B: the tab key
C: the esc key
B. the tab key
What's the best way to prove that you've been a victim of Cyberbullying?
A: Talk about it on the phone with a parent
B: Tell a friend
C: Save screenshots of the encounter
C: Save screenshots of the encounter
What is one difference between online and face-to face communication?
A: People tend to be more honest online.
B. Miscommunications happen face-to face
C. Online, you can't tell tone of voice.
C. Online, you can't tell tone of voice.
What should Liz do before posting a photo of Tyler online?
A: Ask Tyler for permission to post.
B: Send the photo to Tyler.
C: Tag Tyler in the photo.
A: Ask Tyler for permission to post.
Your desktop gets cluttered with pop-up windows whenever you launch a browser. Your device is infected with:
A: Spyware
B: Ransomware
C: Adware
C: Adware
What does AUP stand for?
Acceptable Use Policy
When capitalizing a single letter you should use...
A: the shift key
B: the CapsLock key
C: The Ctrl key
A: The shift key
Why should you never send emails or texts when you're angry or upset?
A: You may not have the best of judgement when emotions are running high.
B: It's harder to tell an emotion from a text.
C: You must type fast and make spelling errors.
A: You may not have the best of judgement when emotions are running high.
Internet Trolls aim to...
A: quietly observe.
B: start arguments.
C: lead discussions.
B: start arguments.
Most social media platforms make money by:
A: Charging people to sign up
B: Selling users' contact info to advertisers
C: Selling space to advertisers
C: Selling space to advertisers
A person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being bullied.
A: Bystander
B: Upstander
C: Protector
B: Upstander
Computers at school are here for your __________.
Education
What information about a source is most likely to appear in a bibliography?
A: Author's date of birth
B: Name of author
C: Quotation from the author
B: Name of author
Which of the following would be an example of cyberbullying?
A: Party at Tim's house 8pm tonight.
B: I disagree - I like math.
C: Don't tell Rita about Tim's party.
C: Don't tell Rita about Tim's party.
How is flaming (posting insults) similar to teasing?
A: Both happen only on the Internet
B: Both can hurt people's feelings
C: Both are examples of good Netiquette
B: Both can hurt people's feelings
How do social media platforms target users with ads?
A: Ads are placed on the most prominent parts of your screen
B: Content you post is used to match you to relevant ads
C: The more money you spend in online stores, the more ads you see
B: Content you post is used to match you to relevant ads
What does URL stand for?
A. Universal Reciprocating Location
B. Uniform Resource Locator
C. Under Recent Lines
B. Uniform Resource Locator
Computers at school are NOT here for your __________.
Entertainment.
A: You should cite both types of sources.
B: You only need to cite your book sources.
C: You only need to cite your online sources.
A: You should cite both types of sources.
Over a few days, you receive a series of insulting texts from someone at school. What action should you take after deleting the first text?
A: Delete any further texts.
B: Confront the bully.
C: Show any other texts to a trusted adult.
C: Show any other texts to a trusted adult
Which emotion is most likely to be triggered in a flamewar (both sides posting insults)?
A. feeling sick
B: feeling happy
C: feeling angry
C: feeling angry
Which of these is valuable data for a social media platform to share with advertisers?
A: The photos and comments you post
B: The ads that appear in your feed
C: Any users the platforms suggests you follow
A: The photos and comments you post
Usually underlined in blue, this will send you to a website.
hypertext link
Never type anything on a school computer you would not say out loud in front of ______________.
Your teacher or librarian.
When someone's work enters the public domain it becomes...
A: something anyone can use for free.
B: something you have to pay to use.
C: something you should avoid.
A: something you can use for free.
Why would an identity thief most likely want to steal your information?
A: To imitate you in chat rooms and message boards
B: To access your bank accounts, credit cards and other financial resources
C: To send viruses out from your email account
To access your bank accounts, credit cards and other financial resources
The best way to respond to trolls is to _____ them.
A: insult
B: ignore
C: threaten
B: ignore
What might motivate people to post on social media sites?
A: The more you post, the more content you're allowed to see.
B: The more you post, the fewer ads you see.
C: Posts get feedback, which people naturally crave.
C: Posts get feedback, which people naturally crave.
A group of computers that is networked together and used by hackers to steal information is called a...
A: Botnet
B: Operating System
C: DDos
A: Botnet
Everything on the Internet belongs to ___________.
The person who created it.
What is the main purpose of a copyright?
A: To protect the user of a creative work
B: To protect the buyer of a creative work
C: To protect the creator of a creative work
C: To protect the creator of a creative work
Tommy was in a school bathroom and Doug came in holding up his phone and laughing. Doug took a photo of Tommy and threatened to Snapchat it to his friends. Tommy should:
A: Laugh along with Doug
B: Ask Doug not to Snapchat it then tell a trusted adult
C: Take a photo of Doug and Snapchat it to his friends
B: Ask Doug not to Snapchat it then tell a trusted adult
What does the “https://” at the beginning of a URL denote, as opposed to "http://" (without the “s”)?
A: The site is displayed in High Definition.
B: The information on the site is encrypted and secure.
C: The site is the newest version available.
B: The information on the site is encrypted and secure.
Posting which of the following is most likely an example of oversharing?
A: A review of a movie you saw
B: A selfie from your birthday party
C: A picture of your report card
C: A picture of your report card
You need to create a password for an app. What advice should you follow?
A: Use your email password.
B: Include your name so you will remember it.
C: Use numbers, letters and special characters.
C: Use numbers, letters and special characters.
Who has to follow the district's rules when using computers?
A. Anyone who is using the district wi-fi.
B. Students, but not adults.
C. Teachers but not parents or students.
A. Anyone who is using the district wi-fi.
When searching on the Internet, what does putting something in quotation marks ("") mean?
A: Ignore these words
B: I'm not sure of the spelling.
C: Search this exactly as written.
C: Search this exactly as written.
2 girls created a list of their soccer teammates then ranked them from best to worst. A 3rd girl went into their locker at lunch, took a photo of the list and sent it to all their friends on Snapchat & Instagram. A boy told the principal. Who is the bully in this situation?
A: The boy who told the principal
B: The 2 girls that created the list
C: All the girls
C: All the girls
You should get permission from ________ before signing up for anything, or posting personal information on the Internet.
your parents
What is true about a post after you delete it?
A: It's erased from the internet.
B: It appears in your feed, but no one else's.
C: It can still appear in other people's feed.
C: It can still appear in other people's feed
Which of the following might be part of a site's Privacy Policy?
A: A promise that the site won't sell your information to other people
B: Information about how to acquire important anti-virus software
C: A software program that protects against spam and malware
A: A promise that the site won't sell your information to other people
At Brigadoon, what games are you allowed to play?
A. Any that your parents let you play at home.
B. Only those linked to the library website.
C. Just ABCYA games.
B. Only those linked to the library website.
Which search term will return the most hits?
A: Fred Rogers
B: "Fred Rogers"
C: "Fred Rogers" + television
A: Fred Rogers
Tommy & Sarah were boyfriend and girlfriend. Tommy kept asking Sarah to send him inappropriate photos of her or he would break up with her. What should Sarah do?
A: Tommy is popular so she should send him photos.
B: Sarah should tell a trusted adult even though she has feelings for Tommy, and not send photos.
C: Sarah should send Tommy photos if he'll send her photos.
B: Sarah should tell a trusted adult even though she has feelings for Tommy and not send photos.
Apps that use Geolocation are safe for anyone to use.
A: Yes, my parents don't care where I am
B: Yes, All of my friends have geolocation on their phones enabled so it's fine.
C: No, it allows anyone to locate you which isn't safe.
C: No, it allows anyone to locate you which isn't safe.
Never post photos or information about your friends without their____________.
Permission
What do you call a scam designed to get your personal and private information?
A. malware
B: phishing
C: trolling
C: phishing
Copying something from the Internet and then turning it in as your own work is...
A. plagiarism
B. stealing
C. cheating
D. All of the above.
D. All of the above.
Web pages near the top of search results are generally the most...
A: relevant to your search.
B: likely to have advertising.
C: recently updated.
A: relevant to your search.
When is it ok to tell someone your password?
A: If you are best friends
B: if you are boyfriend or girlfriend
C: No one should have your password but you and your parents
C: No one should have your password but you and your parents
Your best friend today may not be your best friend tomorrow!
Apps that allow you to collaborate and chat promote a positive learning environment unless..
A: students use the feature during other classes to contact friends.
B: students create content they then sell
C: students use the feature at home.
A: Students use the feature during other classes to contact friends.
Which piece of personal information would be most valuable to a malware developer?
A: Your favorite social Media site
B: Your friend's email address
C: Your name
B: Your friend's email address
One of the main goals of malware is to:
A: Discover which websites you visit
B: Prevent you from visiting illegal websites
C: Make online shopping more convenient
A: Discover which websites you visit
You can use "Scratch" in the library only if you are...
A. viewing the projects others have created.
B. wearing headphones.
C. working on your own projects.
C. working on your own projects.
Which strategy is most likely to improve a search engine query?
A: Use a complete sentence.
B: Use proper punctuation.
C: Add more search terms.
C: Add more search terms.
_________of teens have reported being cyberbullied online.
A: 59%
B: 29%
C: 89%
A: 59%
According to WWW.PEWINTERNET.ORG
With GREAT Access, Comes _______________
A: Great Power
B: Great Responsibility
C: Great Respect
B: Great Responsibility
Do not post anything on the Internet unless....
A. You want the whole world to see it forever.
B. You think it's really funny.
C. You send it to your parents first.
B: You want the whole world to see it forever.
What is it called when someone repeatedly uses electronic devices to send, post, or share negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation.
Cyberbullying
Using "Clever" you can go to our keyboarding program which is...
A. Typing.com
B. Typing Agent
C. Typing Mouse
Typing Agent