Question
Question 1 (5 points)
Listen
Esther uses a program on her tablet to draw a picture of the sun setting over a lake near her home. The drawing is Esther's
Question 1 options:
A)
copyright infringement.
B)
physical property.
C)
creative commons license.
D)
intellectual property.
Question 2 (5 points)
Listen
A _______ is a type of bossware that keeps a record of everything that a user types, even if it's later deleted.
Question 2 options:
A)
browser extension
B)
VPN
C)
firewall
D)
keystroke logger
Question 3 (5 points)
Listen
Tamir works remotely and travels frequently. That means he often needs to do work in airports, hotels, and other places with public Wi-Fi connections. Which program would be most useful in keeping Tamir's private information, including his IP address, safe while he works?
Question 3 options:
A)
A firewall
B)
Monitoring software
C)
A web browser
D)
A VPN
Question 4 (5 points)
Listen
You can legally use material published under a Creative Commons attribution license as long as you
Question 4 options:
A)
pay the original author or source to use the work.
B)
claim that you're the author or source of the work.
C)
credit the original author or source of the work.
D)
make substantial changes to it or comment on the original work.
Question 5 (5 points)
Listen
Which worker is most likely to suffer from a repetitive strain injury?
Question 5 options:
A)
An accountant who sits at a computer for most of the workday
B)
A traveling salesperson who must meet many clients every day
C)
A locksmith who uses small tools to do their job
D)
A fast food employee who works at the drive-through
Question 6 (5 points)
Listen
Danielle got into an argument with another user on Reddit. That user became so angry that they found Danielle's Facebook page based on her username and then posted her personal information, including her real name and address, on Reddit. Danielle has become a victim of
Question 6 options:
A)
cyberbullying.
B)
catfishing.
C)
doxing.
D)
phishing.
Question 7 (5 points)
Listen
Which statement describes proper posture when sitting at a desk to use an electronic device?
Question 7 options:
A)
Desk kept at chest level
B)
Wrists arched when typing and flat when using the mouse
C)
Thighs and forearms parallel to the floor
D)
Screen kept below eye level to relax the back of the neck
Question 8 (5 points)
Listen
What's the best advice for staying safe while meeting someone from the internet in person?
Question 8 options:
A)
Only become suspicious if the person asks for money.
B)
Ask the person you're meeting to give you a ride to or from home.
C)
Ask for a video call before you meet in person.
D)
Meet at your home where you can feel safe.
Question 9 (5 points)
Listen
When you send a message with WhatsApp, the app scrambles the text of your message so that it looks like unreadable code. When the code reaches your friend's phone, their app unscrambles it so they can read it. WhatsApp is using a type of security technology called
Question 9 options:
A)
biometric identification.
B)
third-party security.
C)
two-factor authentication.
D)
encryption.
Question 10 (5 points)
Listen
Which statement about online data tracking is true?
Question 10 options:
A)
The government keeps a detailed record of everything you do on your digital devices.
B)
Advertisers can access your digital footprint, including search terms and phone contacts.
C)
The police don't need a warrant to get access to the record of your online behavior.
D)
Apps can track your location on your mobile device, but websites can't.
Question 11 (5 points)
Listen
What does a computer firewall do?
Question 11 options:
A)
It prevents things such as malware from getting through an internet connection to a device.
B)
It removes unwanted monitoring software from a digital device.
C)
It allows employers to monitor everything their employees do on company devices.
D)
It encrypts the information sent from a device over an internet connection.
Question 12 (5 points)
Listen
Margo has social media accounts on Instagram, Facebook, TikTok, Twitter, and Snapchat. She likes to stay informed about the world by reading news websites, but trying to keep up with current events and five social media feeds takes a lot of time and effort. Margo finds herself having difficulty concentrating and making decisions. She may be experiencing
Question 12 options:
A)
information overload.
B)
a mood disorder.
C)
internet addiction disorder.
D)
a processing disorder.
Question 13 (5 points)
Listen
What group of people is at the highest risk from cyberstalking?
Question 13 options:
A)
Women aged 18 to 24
B)
Men aged 35 to 49
C)
All teenagers from 12 to 19
D)
Racial minorities of all ages
Question 14 (5 points)
Listen
Digital _______ is the act of buying or selling online.
Question 14 options:
A)
encryption
B)
commerce
C)
legislation
D)
ethics
Question 15 (5 points)
Listen
When monitoring software is used as malware to steal private information, it's known as
Question 15 options:
A)
bossware.
B)
securityware.
C)
keystroke logging.
D)
spyware.
Question 16 (5 points)
Listen
Your friend Dave tells you he has a problem with doomscrolling. What would be the best piece of advice to give Dave?
Question 16 options:
A)
You don't need to stop doomscrolling because it will help you learn to stay safe in the world.
B)
If doomscrolling makes you feel bad, try stopping after 15 minutes or so.
C)
The only cure for doomscrolling is to quit using any kind of social media.
D)
Doomscrolling means you have internet addiction disorder and need to seek immediate help.
Question 17 (5 points)
Listen
Which digital law allowed the government access to private electronic messages such as emails and social media posts?
Question 17 options:
A)
Communications Decency Act, Section 230
B)
Creative Commons Act
C)
Digital Millennium Copyright Act
D)
Electronic Communications Privacy Act of 1986
Question 18 (5 points)
Listen
Information about the rights to the pictures you post on social media platforms and how the companies are allowed to use your images can be found in the platform's
Question 18 options:
A)
anti-piracy statement.
B)
creative commons license.
C)
terms of service.
D)
copyright law.
Question 19 (5 points)
Listen
What's the best way to increase your online privacy?
Question 19 options:
A)
Provide your email address for mailing lists instead of clicking on advertisements.
B)
Click on advertisements on social media platforms instead of Googling things you want to buy.
C)
Customize your browser settings to reduce the number of cookies you accept.
D)
Use your Gmail or Facebook accounts to log into as many other sites as possible.
Question 20 (5 points)
Listen
What information should you never give out when you buy something online?
Question 20 options:
A)
Social Security number
B)
Telephone number
C)
Home address
D)
Credit card number
Listen
Esther uses a program on her tablet to draw a picture of the sun setting over a lake near her home. The drawing is Esther's
Question 1 options:
A)
copyright infringement.
B)
physical property.
C)
creative commons license.
D)
intellectual property.
Question 2 (5 points)
Listen
A _______ is a type of bossware that keeps a record of everything that a user types, even if it's later deleted.
Question 2 options:
A)
browser extension
B)
VPN
C)
firewall
D)
keystroke logger
Question 3 (5 points)
Listen
Tamir works remotely and travels frequently. That means he often needs to do work in airports, hotels, and other places with public Wi-Fi connections. Which program would be most useful in keeping Tamir's private information, including his IP address, safe while he works?
Question 3 options:
A)
A firewall
B)
Monitoring software
C)
A web browser
D)
A VPN
Question 4 (5 points)
Listen
You can legally use material published under a Creative Commons attribution license as long as you
Question 4 options:
A)
pay the original author or source to use the work.
B)
claim that you're the author or source of the work.
C)
credit the original author or source of the work.
D)
make substantial changes to it or comment on the original work.
Question 5 (5 points)
Listen
Which worker is most likely to suffer from a repetitive strain injury?
Question 5 options:
A)
An accountant who sits at a computer for most of the workday
B)
A traveling salesperson who must meet many clients every day
C)
A locksmith who uses small tools to do their job
D)
A fast food employee who works at the drive-through
Question 6 (5 points)
Listen
Danielle got into an argument with another user on Reddit. That user became so angry that they found Danielle's Facebook page based on her username and then posted her personal information, including her real name and address, on Reddit. Danielle has become a victim of
Question 6 options:
A)
cyberbullying.
B)
catfishing.
C)
doxing.
D)
phishing.
Question 7 (5 points)
Listen
Which statement describes proper posture when sitting at a desk to use an electronic device?
Question 7 options:
A)
Desk kept at chest level
B)
Wrists arched when typing and flat when using the mouse
C)
Thighs and forearms parallel to the floor
D)
Screen kept below eye level to relax the back of the neck
Question 8 (5 points)
Listen
What's the best advice for staying safe while meeting someone from the internet in person?
Question 8 options:
A)
Only become suspicious if the person asks for money.
B)
Ask the person you're meeting to give you a ride to or from home.
C)
Ask for a video call before you meet in person.
D)
Meet at your home where you can feel safe.
Question 9 (5 points)
Listen
When you send a message with WhatsApp, the app scrambles the text of your message so that it looks like unreadable code. When the code reaches your friend's phone, their app unscrambles it so they can read it. WhatsApp is using a type of security technology called
Question 9 options:
A)
biometric identification.
B)
third-party security.
C)
two-factor authentication.
D)
encryption.
Question 10 (5 points)
Listen
Which statement about online data tracking is true?
Question 10 options:
A)
The government keeps a detailed record of everything you do on your digital devices.
B)
Advertisers can access your digital footprint, including search terms and phone contacts.
C)
The police don't need a warrant to get access to the record of your online behavior.
D)
Apps can track your location on your mobile device, but websites can't.
Question 11 (5 points)
Listen
What does a computer firewall do?
Question 11 options:
A)
It prevents things such as malware from getting through an internet connection to a device.
B)
It removes unwanted monitoring software from a digital device.
C)
It allows employers to monitor everything their employees do on company devices.
D)
It encrypts the information sent from a device over an internet connection.
Question 12 (5 points)
Listen
Margo has social media accounts on Instagram, Facebook, TikTok, Twitter, and Snapchat. She likes to stay informed about the world by reading news websites, but trying to keep up with current events and five social media feeds takes a lot of time and effort. Margo finds herself having difficulty concentrating and making decisions. She may be experiencing
Question 12 options:
A)
information overload.
B)
a mood disorder.
C)
internet addiction disorder.
D)
a processing disorder.
Question 13 (5 points)
Listen
What group of people is at the highest risk from cyberstalking?
Question 13 options:
A)
Women aged 18 to 24
B)
Men aged 35 to 49
C)
All teenagers from 12 to 19
D)
Racial minorities of all ages
Question 14 (5 points)
Listen
Digital _______ is the act of buying or selling online.
Question 14 options:
A)
encryption
B)
commerce
C)
legislation
D)
ethics
Question 15 (5 points)
Listen
When monitoring software is used as malware to steal private information, it's known as
Question 15 options:
A)
bossware.
B)
securityware.
C)
keystroke logging.
D)
spyware.
Question 16 (5 points)
Listen
Your friend Dave tells you he has a problem with doomscrolling. What would be the best piece of advice to give Dave?
Question 16 options:
A)
You don't need to stop doomscrolling because it will help you learn to stay safe in the world.
B)
If doomscrolling makes you feel bad, try stopping after 15 minutes or so.
C)
The only cure for doomscrolling is to quit using any kind of social media.
D)
Doomscrolling means you have internet addiction disorder and need to seek immediate help.
Question 17 (5 points)
Listen
Which digital law allowed the government access to private electronic messages such as emails and social media posts?
Question 17 options:
A)
Communications Decency Act, Section 230
B)
Creative Commons Act
C)
Digital Millennium Copyright Act
D)
Electronic Communications Privacy Act of 1986
Question 18 (5 points)
Listen
Information about the rights to the pictures you post on social media platforms and how the companies are allowed to use your images can be found in the platform's
Question 18 options:
A)
anti-piracy statement.
B)
creative commons license.
C)
terms of service.
D)
copyright law.
Question 19 (5 points)
Listen
What's the best way to increase your online privacy?
Question 19 options:
A)
Provide your email address for mailing lists instead of clicking on advertisements.
B)
Click on advertisements on social media platforms instead of Googling things you want to buy.
C)
Customize your browser settings to reduce the number of cookies you accept.
D)
Use your Gmail or Facebook accounts to log into as many other sites as possible.
Question 20 (5 points)
Listen
What information should you never give out when you buy something online?
Question 20 options:
A)
Social Security number
B)
Telephone number
C)
Home address
D)
Credit card number
Answers
Answered by
GPT-4o mini
Here are the answers to the questions provided:
1. **Question 1**: Esther's drawing is her
**Answer**: D) intellectual property.
2. **Question 2**: A _______ is a type of bossware that keeps a record of everything that a user types, even if it's later deleted.
**Answer**: D) keystroke logger.
3. **Question 3**: Which program would be most useful in keeping Tamir's private information safe while he works?
**Answer**: D) A VPN.
4. **Question 4**: You can legally use material published under a Creative Commons attribution license as long as you
**Answer**: C) credit the original author or source of the work.
5. **Question 5**: Which worker is most likely to suffer from a repetitive strain injury?
**Answer**: A) An accountant who sits at a computer for most of the workday.
6. **Question 6**: Danielle has become a victim of
**Answer**: C) doxing.
7. **Question 7**: Which statement describes proper posture when sitting at a desk to use an electronic device?
**Answer**: C) Thighs and forearms parallel to the floor.
8. **Question 8**: What's the best advice for staying safe while meeting someone from the internet in person?
**Answer**: C) Ask for a video call before you meet in person.
9. **Question 9**: What type of security technology is WhatsApp using when scrambling messages?
**Answer**: D) encryption.
10. **Question 10**: Which statement about online data tracking is true?
**Answer**: B) Advertisers can access your digital footprint, including search terms and phone contacts.
11. **Question 11**: What does a computer firewall do?
**Answer**: A) It prevents things such as malware from getting through an internet connection to a device.
12. **Question 12**: Margo may be experiencing
**Answer**: A) information overload.
13. **Question 13**: What group of people is at the highest risk from cyberstalking?
**Answer**: A) Women aged 18 to 24.
14. **Question 14**: Digital _______ is the act of buying or selling online.
**Answer**: B) commerce.
15. **Question 15**: When monitoring software is used as malware to steal private information, it's known as
**Answer**: D) spyware.
16. **Question 16**: What would be the best piece of advice to give Dave?
**Answer**: B) If doomscrolling makes you feel bad, try stopping after 15 minutes or so.
17. **Question 17**: Which digital law allowed the government access to private electronic messages such as emails and social media posts?
**Answer**: D) Electronic Communications Privacy Act of 1986.
18. **Question 18**: Information about the rights to the pictures you post on social media platforms can be found in the platform's
**Answer**: C) terms of service.
19. **Question 19**: What's the best way to increase your online privacy?
**Answer**: C) Customize your browser settings to reduce the number of cookies you accept.
20. **Question 20**: What information should you never give out when you buy something online?
**Answer**: A) Social Security number.
Feel free to ask if you need any more information or explanation!
1. **Question 1**: Esther's drawing is her
**Answer**: D) intellectual property.
2. **Question 2**: A _______ is a type of bossware that keeps a record of everything that a user types, even if it's later deleted.
**Answer**: D) keystroke logger.
3. **Question 3**: Which program would be most useful in keeping Tamir's private information safe while he works?
**Answer**: D) A VPN.
4. **Question 4**: You can legally use material published under a Creative Commons attribution license as long as you
**Answer**: C) credit the original author or source of the work.
5. **Question 5**: Which worker is most likely to suffer from a repetitive strain injury?
**Answer**: A) An accountant who sits at a computer for most of the workday.
6. **Question 6**: Danielle has become a victim of
**Answer**: C) doxing.
7. **Question 7**: Which statement describes proper posture when sitting at a desk to use an electronic device?
**Answer**: C) Thighs and forearms parallel to the floor.
8. **Question 8**: What's the best advice for staying safe while meeting someone from the internet in person?
**Answer**: C) Ask for a video call before you meet in person.
9. **Question 9**: What type of security technology is WhatsApp using when scrambling messages?
**Answer**: D) encryption.
10. **Question 10**: Which statement about online data tracking is true?
**Answer**: B) Advertisers can access your digital footprint, including search terms and phone contacts.
11. **Question 11**: What does a computer firewall do?
**Answer**: A) It prevents things such as malware from getting through an internet connection to a device.
12. **Question 12**: Margo may be experiencing
**Answer**: A) information overload.
13. **Question 13**: What group of people is at the highest risk from cyberstalking?
**Answer**: A) Women aged 18 to 24.
14. **Question 14**: Digital _______ is the act of buying or selling online.
**Answer**: B) commerce.
15. **Question 15**: When monitoring software is used as malware to steal private information, it's known as
**Answer**: D) spyware.
16. **Question 16**: What would be the best piece of advice to give Dave?
**Answer**: B) If doomscrolling makes you feel bad, try stopping after 15 minutes or so.
17. **Question 17**: Which digital law allowed the government access to private electronic messages such as emails and social media posts?
**Answer**: D) Electronic Communications Privacy Act of 1986.
18. **Question 18**: Information about the rights to the pictures you post on social media platforms can be found in the platform's
**Answer**: C) terms of service.
19. **Question 19**: What's the best way to increase your online privacy?
**Answer**: C) Customize your browser settings to reduce the number of cookies you accept.
20. **Question 20**: What information should you never give out when you buy something online?
**Answer**: A) Social Security number.
Feel free to ask if you need any more information or explanation!
There are no human answers yet. A form for humans to post answers is coming very soon!