Career Prep Web Ethics & Safety Assessments Questions Mrs. Christie
According to the Cyberbullying Research Center, how many students ages 11 to 18 admitted they have bullied others through the Internet?
20.1 percent
According to a recent study by the Cyberbullying Research Center, how many students ages 11 to 18 have been cyberbullied?
21.2 percent
According to a recent survey conducted by The National Campaign, how many teenagers reported they have received nude or semi-nude pictures?
48 percent
According to the segment, approximately how many sex offenders are there in the United States?
645,000
Which of the following terms describes "collection of computers controlled by users other than their owners to perform automated tasks over the Internet"? A) Botnet B) Virtual Private Network C) Social Engineering D) Intrusion Detection System
A) Botnet
Which of the following situations CANNOT cause a computer to become infected? A) Copying a file from a computer to a flash drive B) Copying a file from a flash drive to a computer C) Visiting an unknown website D) Clicking a link through an unknown e-mail
A) Copying a file from a computer to a flash drive
Which of the following statements defines sexting? A) Creation, distribution or forwarding of a message which includes sexually explicit materials through a computer, cell phone or other electronic devices B) Fraud which involves stealing personal information for financial gain through e-mail C) Use of computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet D) Use of computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet
A) Creation, distribution or forwarding of a message which includes sexually explicit materials through a computer, cell phone or other electronic devices
Which of the following did Greg Bazar use as an analogy to describe a router? A) Dock B) Island C) Traffic light D) Street
A) Dock
Which of the following is NOT a network security device? A) Router B) Ethernet cable C) Firewall D) Switch
B) Ethernet cable
According to Greg Bazar, which of the following is NOT an example of individual loss caused by viruses? A) Stolen identity B) Blacklisted by credit bureau C) More fraud fees D) More late fees
D) More late fees
According to Stephanie Winters, how many students ages 13 to 19 are engaging in sexting?
One-fifth
To avoid online predators, which of the following should you NEVER do under any circumstance?
Meet with a stranger from the Internet
Which of the following terms describes a "granted legal right which gives the creator of an original work exclusive rights to reproduce, publish, sell or distribute his or her production"? A) Intellectual Property B) Trademark C) Copyright D) Patent
C) Copyright
Which of the following statements defines an Intrusion Detection System? A) Computer device which forwards data packets from one network to another B) Software designed to protect computers from viruses C) Device which monitors network activities for malicious attacks and produces reports to a management station D) Network controller which connects network devices and allows effective communication between these devices
C) Device which monitors network activities for malicious attacks and produces reports to a management station
Which of the following is NOT a discussed prevention method from identity theft? A) Avoid e-mail scams B) Protect personal information C) Install anti-virus software D) Set up strong passwords
C) Install anti-virus software
Which of the following did Greg Bazar use as an analogy to describe a switch? A) Dock B) Island C) Traffic light D) Street
C) Traffic light
Which of the following statements defines cyberbullying? A) Creation, distribution or forwarding of a message which includes sexually explicit materials through a computer, cell phone or other electronic devices B) Fraud which involves stealing personal information for financial gain through e-mail C) Use of computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet D) Use of other people's words, thoughts or ideas without crediting the source
C) Use of computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet
Which of the following methods is appropriate to use to prevent predators from finding you online? A) Keep private information private B) Accept strangers as friends on Facebook® C) Avoid talking about predators D) Arrange a meeting with a stranger from the Internet
A) Keep private information private
Which of the following is the correct reaction when someone you do not know asks you to add him or her as a friend on Facebook®? A) Politely reject the request B) Accept this person as a friend C) Ask how this person knows you D) Ask your friends whether any of them know this person
A) Politely reject the request
Which of the following actions is NOT a parent's responsibility to prevent their children from being victims of online predators? A) Educate children about online predators B) Ask for police protection C) Limit children's online activity D) Be a good role model
B) Ask for police protection
Which of the following statements defines a computer virus? A) Security component which encrypts data and keeps it private within a public network B) Computer program which replicates and spreads itself from one computer to another C) Device which forwards data packets from one network to another D) Device which monitors network activities for malicious attacks and produces reports to a management station
B) Computer program which replicates and spreads itself from one computer to another
Which of the following is NOT a discussed safe computing practice? A) Installing anti-virus software B) Conducting defragmentation C) Updating anti-virus software D) Scanning your computer for virus
B) Conducting defragmentation
Which of the following terms can be defined as "crime which occurs when someone's personal and financial information is stolen in order to impersonate him or her for financial gain?" A) Advanced fee scheme B) Identity theft C) Internet auction fraud D) Internet auction fraud
B) Identity theft
Which of the following is NOT an appropriate response to cyberbullying? A) Telling a trusted teacher you are being bullied B) Retaliating against the bully C) Collecting information and use it as evidence D) Asking the content provider to delete the malicious comments about you
B) Retaliating against the bully
Which of the following statements defines plagiarism? A) Use of computers, cell phones or other electronic devices to deliberately and repeatedly harm another person through the Internet B) Use of other people's words, thoughts or ideas without crediting the source C) Unauthorized reproduction or distribution of copyrighted materials D) Fraud which involves stealing personal information for financial gain through e-mail
B) Use of other people's words, thoughts or ideas without crediting the source
Which of the following is NOT an appropriate prevention from cyberbullying? A) Conducting research about cyberbullying B) Blocking access to bullies C) Calling the police D) Being careful about posting personal information
C) Calling the police
Through which of the following channels do 82 percent of sex offenders gain information about their target?
Social media sites
According to Sharron Davis, how long after losing a child can the parents start to find a new normal?
Ten years
Which of the following statements about hackers is NOT correct? A) A hacker can refer to someone who is good at solving computer problems B) There are white hat hackers and black hat hackers C) A hacker can refer to someone who illegally accesses someone else's computer D) All hackers are trying to break into others' computers for their financial benefit
D) All hackers are trying to break into others' computers for their financial benefit
Which of the following can be protected by copyright law? A) A title B) A name C) A slogan D) An e-mail
D) An e-mail
According to Stephanie Winters, which of the following is true? A) More boys than girls are sending sexts B) Sexts cannot be distributed to other schools or other cities C) Sexting can result in fines from your cell phone company D) Most sexts are sent between boyfriends and girlfriends
D) Most sexts are sent between boyfriends and girlfriends
Which of the following is NOT a possible result of plagiarism as discussed in the segment? A) Receiving a failing grade B) Being expelled from school C) Failing to learn knowledge D) Receiving a fine
D) Receiving a fine
Which of the following is the Golden Rule discussed in the segment? A) The best thing to give to your enemy is forgiveness. B) The only true wisdom is in knowing you know nothing C) Honesty is the best policy. D) Treat others how you would want to be treated.
D) Treat others how you would want to be treated.
Which of the following terms describes a "security component which encrypts data and keeps it private within a public network?" A) Transport Layer Security B) Point-to-point tunneling protocol C) Intrusion Detection System D) Virtual Private Network
D) Virtual Private Network
According to Sharron Davis, which of the following is a parent's responsibility to cyberbullying?
Educate children about the consequences of cyberbullying
Which of the following cases did Sharron Davis use to explain the harm of sexting? A) Tonya Underwood's story B) Ryan Halligan's story C) Jessica Logan's story D) Shirley Baker's story
Jessica Logan's story
According to the Federal Trade Commission, how many Americans have their identity stolen each year?
Nine million
According to Greg Bazar, which of the following types of passwords can hackers break through within one minute?
Passwords less than six characters in length
The maximum penalty for online piracy is which of the following?
Prison for up to ten years OR a fine of $250,000
According to the Cyberbullying Research Center, how many more times are cyberbullying victims likely to have attempted suicide than those who were not cyberbullied?
Two times