Career Prep Web Ethics & Safety Assessments Questions Mrs. Christie

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

According to the Cyberbullying Research Center, how many students ages 11 to 18 admitted they have bullied others through the Internet?

20.1 percent

According to a recent study by the Cyberbullying Research Center, how many students ages 11 to 18 have been cyberbullied?

21.2 percent

According to a recent survey conducted by The National Campaign, how many teenagers reported they have received nude or semi-nude pictures?

48 percent

According to the segment, approximately how many sex offenders are there in the United States?

645,000

Which of the following terms describes "collection of computers controlled by users other than their owners to perform automated tasks over the Internet"? A) Botnet B) Virtual Private Network C) Social Engineering D) Intrusion Detection System

A) Botnet

Which of the following situations CANNOT cause a computer to become infected? A) Copying a file from a computer to a flash drive B) Copying a file from a flash drive to a computer C) Visiting an unknown website D) Clicking a link through an unknown e-mail

A) Copying a file from a computer to a flash drive

Which of the following statements defines sexting? A) Creation, distribution or forwarding of a message which includes sexually explicit materials through a computer, cell phone or other electronic devices B) Fraud which involves stealing personal information for financial gain through e-mail C) Use of computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet D) Use of computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet

A) Creation, distribution or forwarding of a message which includes sexually explicit materials through a computer, cell phone or other electronic devices

Which of the following did Greg Bazar use as an analogy to describe a router? A) Dock B) Island C) Traffic light D) Street

A) Dock

Which of the following is NOT a network security device? A) Router B) Ethernet cable C) Firewall D) Switch

B) Ethernet cable

According to Greg Bazar, which of the following is NOT an example of individual loss caused by viruses? A) Stolen identity B) Blacklisted by credit bureau C) More fraud fees D) More late fees

D) More late fees

According to Stephanie Winters, how many students ages 13 to 19 are engaging in sexting?

One-fifth

To avoid online predators, which of the following should you NEVER do under any circumstance?

Meet with a stranger from the Internet

Which of the following terms describes a "granted legal right which gives the creator of an original work exclusive rights to reproduce, publish, sell or distribute his or her production"? A) Intellectual Property B) Trademark C) Copyright D) Patent

C) Copyright

Which of the following statements defines an Intrusion Detection System? A) Computer device which forwards data packets from one network to another B) Software designed to protect computers from viruses C) Device which monitors network activities for malicious attacks and produces reports to a management station D) Network controller which connects network devices and allows effective communication between these devices

C) Device which monitors network activities for malicious attacks and produces reports to a management station

Which of the following is NOT a discussed prevention method from identity theft? A) Avoid e-mail scams B) Protect personal information C) Install anti-virus software D) Set up strong passwords

C) Install anti-virus software

Which of the following did Greg Bazar use as an analogy to describe a switch? A) Dock B) Island C) Traffic light D) Street

C) Traffic light

Which of the following statements defines cyberbullying? A) Creation, distribution or forwarding of a message which includes sexually explicit materials through a computer, cell phone or other electronic devices B) Fraud which involves stealing personal information for financial gain through e-mail C) Use of computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet D) Use of other people's words, thoughts or ideas without crediting the source

C) Use of computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet

Which of the following methods is appropriate to use to prevent predators from finding you online? A) Keep private information private B) Accept strangers as friends on Facebook® C) Avoid talking about predators D) Arrange a meeting with a stranger from the Internet

A) Keep private information private

Which of the following is the correct reaction when someone you do not know asks you to add him or her as a friend on Facebook®? A) Politely reject the request B) Accept this person as a friend C) Ask how this person knows you D) Ask your friends whether any of them know this person

A) Politely reject the request

Which of the following actions is NOT a parent's responsibility to prevent their children from being victims of online predators? A) Educate children about online predators B) Ask for police protection C) Limit children's online activity D) Be a good role model

B) Ask for police protection

Which of the following statements defines a computer virus? A) Security component which encrypts data and keeps it private within a public network B) Computer program which replicates and spreads itself from one computer to another C) Device which forwards data packets from one network to another D) Device which monitors network activities for malicious attacks and produces reports to a management station

B) Computer program which replicates and spreads itself from one computer to another

Which of the following is NOT a discussed safe computing practice? A) Installing anti-virus software B) Conducting defragmentation C) Updating anti-virus software D) Scanning your computer for virus

B) Conducting defragmentation

Which of the following terms can be defined as "crime which occurs when someone's personal and financial information is stolen in order to impersonate him or her for financial gain?" A) Advanced fee scheme B) Identity theft C) Internet auction fraud D) Internet auction fraud

B) Identity theft

Which of the following is NOT an appropriate response to cyberbullying? A) Telling a trusted teacher you are being bullied B) Retaliating against the bully C) Collecting information and use it as evidence D) Asking the content provider to delete the malicious comments about you

B) Retaliating against the bully

Which of the following statements defines plagiarism? A) Use of computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet B) Use of other people's words, thoughts or ideas without crediting the source C) Unauthorized reproduction or distribution of copyrighted materials D) Fraud which involves stealing personal information for financial gain through e-mail

B) Use of other people's words, thoughts or ideas without crediting the source

Which of the following is NOT an appropriate prevention from cyberbullying? A) Conducting research about cyberbullying B) Blocking access to bullies C) Calling the police D) Being careful about posting personal information

C) Calling the police

Through which of the following channels do 82 percent of sex offenders gain information about their target?

Social media sites

According to Sharron Davis, how long after losing a child can the parents start to find a new normal?

Ten years

Which of the following statements about hackers is NOT correct? A) A hacker can refer to someone who is good at solving computer problems B) There are white hat hackers and black hat hackers C) A hacker can refer to someone who illegally accesses someone else's computer D) All hackers are trying to break into others' computers for their financial benefit

D) All hackers are trying to break into others' computers for their financial benefit

Which of the following can be protected by copyright law? A) A title B) A name C) A slogan D) An e-mail

D) An e-mail

According to Stephanie Winters, which of the following is true? A) More boys than girls are sending sexts B) Sexts cannot be distributed to other schools or other cities C) Sexting can result in fines from your cell phone company D) Most sexts are sent between boyfriends and girlfriends

D) Most sexts are sent between boyfriends and girlfriends

Which of the following is NOT a possible result of plagiarism as discussed in the segment? A) Receiving a failing grade B) Being expelled from school C) Failing to learn knowledge D) Receiving a fine

D) Receiving a fine

Which of the following is the Golden Rule discussed in the segment? A) The best thing to give to your enemy is forgiveness. B) The only true wisdom is in knowing you know nothing C) Honesty is the best policy. D) Treat others how you would want to be treated.

D) Treat others how you would want to be treated.

Which of the following terms describes a "security component which encrypts data and keeps it private within a public network?" A) Transport Layer Security B) Point-to-point tunneling protocol C) Intrusion Detection System D) Virtual Private Network

D) Virtual Private Network

According to Sharron Davis, which of the following is a parent's responsibility to cyberbullying?

Educate children about the consequences of cyberbullying

Which of the following cases did Sharron Davis use to explain the harm of sexting? A) Tonya Underwood's story B) Ryan Halligan's story C) Jessica Logan's story D) Shirley Baker's story

Jessica Logan's story

According to the Federal Trade Commission, how many Americans have their identity stolen each year?

Nine million

According to Greg Bazar, which of the following types of passwords can hackers break through within one minute?

Passwords less than six characters in length

The maximum penalty for online piracy is which of the following?

Prison for up to ten years OR a fine of $250,000

According to the Cyberbullying Research Center, how many more times are cyberbullying victims likely to have attempted suicide than those who were not cyberbullied?

Two times


संबंधित स्टडी सेट्स

Columbus Police Phonetic alphabet

View Set

Intro to Computer Final Study Guide

View Set

Chapter 16: Labor and Delivery: PREPU

View Set

chem final (palazzo) chapters 6-9

View Set

Chapter 59 PrepU: Assessment and Management of Patients with Male Reproductive Orders

View Set

ISTC 1005-01 PowerPoint Study Guide

View Set

13 - Project Stakeholder Management

View Set