The document provides multiple choice questions about computer ethics, cyberbullying, plagiarism, copyright, and respect. It tests understanding of these topics through questions about proper online behavior, consequences of misbehavior, and definitions of key computer-related concepts.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
123 views5 pages
Online Safety
The document provides multiple choice questions about computer ethics, cyberbullying, plagiarism, copyright, and respect. It tests understanding of these topics through questions about proper online behavior, consequences of misbehavior, and definitions of key computer-related concepts.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5
1. What are computer ethics?
o A. An honest, moral code that should be followed when on the computer
o B. A computer program about honesty o C. A computer that fits on or under a desk o D. A list of commandments in the Bible 2. What is NOT an example of cyber bullying? o A. Creating an embarrassing picture of your classmate and forwarding it to your friend's email addresses o B. Sending someone a mean text o C. Bullying someone in the hallway o D. Threatening someone in an instant message 3. Which is an example of plagiarism? o A. Reading a paragraph online and retyping it in your own words. o B. Copying and pasting someone else's work into your paper using qoutation marks and citing the author o C. Typing a paper in your own words o D. Copying and pasting a sentence from the Internet into your paper. 4. Which is NOT a consequence of copying or distributing copyrighted software? o A. Community Service o B. Imprisonment o C. Up to $10,000 in legal fees o D. Up to $50,000 in civil fees 5. Which is not a type of cyberbully? o A. "Mean Girls" o B. Power Hungery or Revenge of the Nerds o C. Big, Bad Bully o D. The Vengeful Angel o E. The Inadvertent Cyberbully "Because I Can"
6. Check TWO ways to prevent or stop cyberbullying?
o A. Forward a mean message about a bully to your friends o B. Tell a parent, teacher, or administrator o C. Not forwarding mean texts sent you about a classmate o D. Use instant messanger to talk to your friends about someone's outfit you did not like that day at school 7. Which is NOT a consequence of plagiarism? o A. You can get kicked out of college. o B. You can make a zero on your assignment. o C. You can get fired from your job. o D. You could get a warning from your college professor. 8. 8. Thou shalt not copy ___________________________ software or materials. o A. Public-domain o B. Copyrighted o C. Self created o D. Self published 9. What is Netiquette? o A. The proper use of manners and etiquette on the Internet. o B. Using a net to catch fish. o C. Being mean to other people on Facebook. o D. Using proper manners at the dinner table. 10. Which of these is cyber-bullying? o A. Flame mail. o B. Hate mail. o C. Posting mean comments on a discussion board. o D. All of the above. 11. What is considered shouting over the Internet? o A. Screaming at your computer. o B. Writing in all CAPS. o C. Putting a lot of exclamation marks at the end of a sentence. o D. Not answering a friend request on Facebook. 12. Who can see the information you type in a chat room? o A. Only the person to whom you are chatting. o B. Anyone on the web at anytime. o C. Only the person with you at the computer. o D. Anyone in the chat room at the time. 13. If you receive a text or email from someone you don't know, what should you do? o A. Open it immediately and reply. o B. Call the police. o C. Delete it without opening it. o D. Leave it in your inbox until you figure out who it is. 14. You should never give out which of the following on the Internet? o A. Your name. o B. Your age. o C. Your address. o D. All of the above. 15. To avoid being cyber-bullied you should always... o A. Give out personal information to anyone who asks. o B. Strike first - post mean things about other people on your Wall on Facebook. o C. Observe proper netiquette rules. o D. Ignore any requests from people to be your friend online. 16. What do you do if you feel you are being cyber-bullied? o A. Tell a trusted adult like a parent or teacher. o B. Tell no one, it's embarrassing. o C. Just delete anything referring to you on the internet. o D. Call the police. 17. How are you judged in cyberspace? o A. No one can see you, so no one can judge you. o B. You are judged by what you do on the Internet and how it looks - by your spelling, grammar, and netiquette. o C. You are judged by your intent - if you didn't mean to hurt someone's feelings, then it's okay. o D. You are judged by how you look - your profile picture is important. 18. If you get an embarrassing picture from someone you know you should NEVER... o A. Tell your parents or a teacher. o B. Talk to the person again. o C. Discourage the person from sending pictures like that. o D. Send it on to other friends. 19. What is a worm? o A. Malware that sneaks onto your computer; often through an email attachment, and then makes copies of itself. o B. Programs that, when installed on your computer, enable unauthorized people to access it and sometimes to send spam from it. o C. A program that reproduces itself over a network and can use up your computer's resources and possibly shut your system down. o D. Short for "malicious software;" includes viruses and spyware that steal personal information, send spam and commit fraud. 20. What is a virus? o A. Malware that sneaks onto your computer; often through an email attachment, and then makes copies of itself. o B. Programs that, when installed on your computer, enable unauthorized people to access it and sometimes to send spam from it. o C. A program that reproduces itself over a network and can use up your computer's resources and possibly shut your system down. o D. Short for "malicious software;" includes viruses and spyware that steal personal information, send spam and commit fraud. 21. What is malware? o A. Malware that sneaks onto your computer; often through an email attachment, and then makes copies of itself. o B. Programs that, when installed on your computer, enable unauthorized people to access it and sometimes to send spam from it. o C. A program that reproduces itself over a network and can use up your computer's resources and possibly shut your system down. o D. Short for "malicious software;" includes viruses and spyware that steal personal information, send spam and commit fraud. 22. What is a Trojan? o A. Malware that sneaks onto your computer; often through an email attachment, and then makes copies of itself. o B. Programs that, when installed on your computer, enable unauthorized people to access it and sometimes to send spam from it. o C. A program that reproduces itself over a network and can use up your computer's resources and possibly shut your system down. o D. Short for "malicious software;" includes viruses and spyware that steal personal information, send spam and commit fraud. 23. Giving credit to the person who created the work, such as a photograph, sound recording, motion picture, or document is called ____ o A. Fair use o B. Copyrighting o C. Attribution o D. Public domain 24. Works that are not copyrighted and may be used without permission are called ____. o A. Public domain o B. Attritioned o C. Non profit o D. Property 25. I can legally burn back-up DVDs for my own home collection. o A. True o B. False 26. 33. I can legally share my Hollywood DVD collection with my friends by either uploading them to the internet or burning copies, as long as I don’t sell them for profit. o A. True o B. False 27. If I rent a DVD I can copy it for later or repeat viewing. o A. True o B. False 28. What is copyright? Check all that apply. o A. A legal protection that guarantees that only the original creator of the work has the right to use it. o B. A legal protection against copying and using original work. o C. The legal protection that says that only the original writer or artist can derive profit from the original work. o D. A legal intellectual property protection that is in place for a certain amount of time. 29. The definition of RESPECT is: o A. To regard or treat without respect; regard or treat with contempt or rudeness. o B. Esteem for or a sense of the worth or excellence of a person, a personal quality or ability, or something considered as a manifestation of a personal quality or ability o C. Chargeable with being the author, cause, or occasion of something o D. Not capable of or qualified for responsibility, as due to age, circumstances, or a mental deficiency. 30. This is an example of respect: Yelling or talking back to your elder. o A. True o B. False 31. This is an example of respect: Telling your mother to, "Go to hell!" o A. True o B. False 32. This is an example of respect: Saying, "Yes ma'am, no sir." o A. True o B. False 33. You will be able to use team skills throughout your life. o A. True o B. False 34. Collaboration means working with others for a common ______________. 35. Effective communication includes passive and aggressive behaviors. o A. True o B. False