Managing Personal Data
Digital Reputation
Negative Behavior
Secure Content Sharing
Securing Devices
100

What is one example of personal data that should be kept private online?

Examples of personal data that should be kept private online include full name, address, phone number, social security number, and financial information.

100

How can oversharing personal information online impact your digital reputation?

Oversharing personal information online can impact your digital reputation by making you vulnerable to identity theft, cyberstalking, or other forms of online threats.

100

What should you do if you encounter cyberbullying online?

If you encounter cyberbullying online, you should immediately report the behavior to the platform or a trusted adult, block the perpetrator, and seek support from friends or professionals.

100

What are some ways to verify the credibility of a website before sharing its content?

Ways to verify the credibility of a website before sharing its content include checking for HTTPS in the URL, looking for contact information, reading reviews, and verifying the source of the information.

100

Why is it important to keep software and applications updated on your devices?

Keeping software and applications updated on your devices is important to patch security vulnerabilities, fix bugs, and protect against malware that might exploit outdated software.

200

Why is it important to regularly update passwords for online accounts?

It is important to regularly update passwords for online accounts to reduce the risk of unauthorized access and maintain security.

200

What are the potential consequences of posting inappropriate content on social media?

Potential consequences of posting inappropriate content on social media include damage to your reputation, loss of opportunities, and legal repercussions.

200

Why is it important to think before sharing or commenting on someone else's content online?

It is important to think before sharing or commenting on someone else's content online to avoid spreading misinformation, contributing to cyberbullying, or damaging relationships.

200

Why should you be cautious when sharing personal information in online surveys or quizzes?

It is important to be cautious when sharing personal information in online surveys or quizzes to avoid potential scams, phishing attempts, or unauthorized use of your data.

200

How can using strong, unique passwords enhance the security of your devices?

Using strong, unique passwords enhances the security of your devices by making it harder for attackers to guess or crack your passwords and access your information.

300

Explain the concept of "data privacy" and why it is essential for individuals.

"Data privacy" refers to the protection of personal information and the right to control how data is collected, used, and shared. It is essential for individuals to safeguard their privacy and prevent misuse of their data.

300

How can positive online interactions contribute to building a strong digital reputation?

Positive online interactions, such as respectful communication, supporting others, and contributing valuable content, can help build a strong digital reputation based on trust and credibility.

300

How can you differentiate between constructive criticism and negative feedback online?

Constructive criticism is feedback that is provided with the intention of helping someone improve, while negative feedback is often hurtful, disrespectful, or aimed at causing harm.

300

Explain the importance of understanding privacy settings on social media platforms.

Understanding privacy settings on social media platforms is important because it allows you to control who can see your posts, manage your online visibility, and protect your personal information.

300

Explain the role of antivirus software in protecting devices from online threats.

Antivirus software plays a crucial role in protecting devices from online threats by detecting and removing malicious software, viruses, and other security risks.

400

How can individuals protect their personal data when using public Wi-Fi networks?

Individuals can protect their personal data when using public Wi-Fi networks by using a virtual private network (VPN) to encrypt their connection and avoid accessing sensitive information.

400

Explain the term "digital footprint" and its significance in the online world.

A "digital footprint" refers to the trail of data left behind by online activities. It is significant because it can impact how others perceive you, affect your online reputation, and be used by companies for targeted advertising.

400

Describe a situation where responding calmly to negative online behavior is the best course of action.

Responding calmly to negative online behavior is the best course of action in situations where de-escalation, setting boundaries, and seeking support can help resolve the issue without escalating conflicts. Answers may vary.

400

How can individuals ensure that the content they share online does not violate copyright laws?

Individuals can ensure that the content they share online does not violate copyright laws by obtaining permission from the original creator, using royalty-free or properly licensed content, and giving proper attribution when necessary.

400

What are the potential dangers of downloading attachments or clicking on links from unknown sources?

Potential dangers of downloading attachments or clicking on links from unknown sources include malware infections, phishing attacks, data breaches, and unauthorized access to your device.

500

Describe two-factor authentication and why it is a secure practice for account access.

Two-factor authentication is a security process that requires users to provide two different authentication factors to verify their identity. It is secure because it adds an extra layer of protection beyond just a password, such as a code sent to a mobile device.

500

Provide an example of how managing your digital reputation can benefit your future opportunities.

Managing your digital reputation can benefit your future opportunities by enhancing your credibility, increasing your chances of professional success, and building a positive online presence that reflects your values.

500

What are the potential consequences of engaging in online harassment or cyberbullying?

Potential consequences of engaging in online harassment or cyberbullying include legal action, damage to your reputation, loss of relationships, and negative impacts on mental health.

500

What are the risks associated with sharing location data on social media platforms?  

Risks associated with sharing location data on social media platforms include privacy invasion, physical security threats, stalking, and potential exploitation of personal information.

500

Describe two ways to secure your smartphone or tablet to prevent unauthorized access to your data.

Two ways to secure your smartphone or tablet to prevent unauthorized access to your data are enabling device encryption and using biometric authentication methods like fingerprint or face recognition.