Questions LLC
Login
or
Sign Up
Ask a New Question
Internet Safety
Page 6
Questions (348)
Digital footprint
1 answer
asked anonymously
14 views
What type of person tries to get your personal information by sending out friend requests from a fake profile?
A. hackers B.
1 answer
asked by
young_240sx
12 views
Social media can be a fun way to connect with friends and share your experiences. But, it can also be a place where identity
1 answer
asked anonymously
18 views
Multiple Choice
What do you do about cyberbullying if the first adult you tell doesn’t take you seriously? (1 point) Responses
1 answer
asked by
Kanna
16 views
What is the grooming process as it relates to online predators?
(1 point) Responses the process by which online predators lure in
1 answer
asked by
sal fisher<3
16 views
What are some ways that an online predator might groom a victim? Select all that apply.
Responses pretending to like the same
1 answer
asked by
sal fisher<3
31 views
You are surfing the internet and see an advertisement for an online contest. It wants you to enter a bunch of information about
1 answer
asked by
Donald Craven
23 views
What is the grooming process as it relates to online predators?
a the process by which online predators lure in minors to get
1 answer
asked by
.
17 views
what to do if someone in our school has all our passwords and accounts
1 answer
asked anonymously
10 views
One problem that has moved from the school yard to the digital arena is bullying. Legally, who should be monitoring the sites?(1
1 answer
asked anonymously
41 views
make a brochure about online safety
1 answer
asked by
Noah Daniel
7 views
Which of the following could cause your personal identity to be stolen online?
(1 point) Responses purchasing items online from
1 answer
asked by
Kanna
20 views
which of the following is a sign that a website is inappropriate?
a it contains information that you find embarrassing b it
1 answer
asked by
.
20 views
Different forms of cyberbullying
1 answer
asked anonymously
5 views
during a meeting with a small group of students. You can revisit the Think About It exercise to get some ideas.
Use this area to
1 answer
asked by
the letter 7
9 views
Read the following about cyberbullying
Report bullying. Social media sites take it seriously when people post cruel or mean stuff
1 answer
asked anonymously
12 views
What should you do if you are cyberbullied?
(1 point) answer the texts or messages ○ block their messages or ignore them ○
1 answer
asked by
Vixy
27 views
Why should you give out email address on internet
1 answer
asked anonymously
12 views
Why shouldn’t you give out email address on internet. Two sentences in 5the grade response
1 answer
asked anonymously
13 views
said in 2-3 short sentences, define cyberbullying
1 answer
asked anonymously
12 views
When students post photos or other videos of other students that are revealing yes or no if you think school can’t punish a
1 answer
asked anonymously
11 views
please do not ban me
1 answer
asked by
meep
4 views
2 of 4 2 of 4 Items
Question Which of the following is an inappropriate screen name? (1 point) Responses KimberlyHosking2002
1 answer
asked anonymously
7 views
Which of these behaviors does NOT put a user at risk for an online threat? (1 point) Responses setting social media to private
1 answer
asked by
Johovah_Witness
13 views
Which of the following are good ways to maintain a positive digital footprint? Select all the options that apply.
Only post
1 answer
asked anonymously
23 views
Which of the following statements about digital footprints are true? Select all that apply.
Your digital footprint is permanent.
1 answer
asked anonymously
26 views
Which is the best reason to be wary of those you talk to on the Internet?(1 point)ResponsesThey may not be who they say they
1 answer
asked by
wheatus
17 views
How can you stay safe on the Internet?(1 point)ResponsesCreate a screen name that includes your first and last name.Create a
1 answer
asked by
wheatus
15 views
Which term, as it relates to the Internet, means to act in an unthinking, unsafe, or disrespectful manner online?
(1 point)
1 answer
asked by
yes
15 views
Which of the following rules is most likely to be used in an AUP? (1 point) Responses Communication should be civil and
1 answer
asked anonymously
8 views
Which of the following is not a quality of a successful AUP? (1 point) Responses states acceptable use for school computers
1 answer
asked anonymously
7 views
One day, Michael and Joshua were playing a game online when they saw a suspicious link. It said, "Click here for free coins!
1 answer
asked anonymously
20 views
Joshua’s mom explained that they did the right thing by not clicking the link. It could have led them to malicious software
1 answer
asked anonymously
8 views
Which term is used to mean the methods a predator uses to befriend youth online?
(1 point) the training process the chatting
1 answer
asked by
Sleeper
17 views
When is it okay to share your password with a friend?
A. If your friend promises not to tell anyone B. If you change your
1 answer
asked anonymously
21 views
When should you talk to an adult you trust?
A. If you see yourself tagged online and you don't want to be B. If someone asks you
1 answer
asked anonymously
18 views
How can sexual exploitation occur through the internet? (1 point) Responses You learn about facts related to sexual violence
1 answer
asked anonymously
12 views
Why is it important to take responsibility for your online publications?
(1 point) Responses What you post can hurt or slander
1 answer
asked by
Kanna
17 views
What is the definition of cyberstalking?(1 point)
a. the use of personally identifiable information found about a user online to
3 answers
asked anonymously
25 views
Which of the following is a risk of perpetrating doxxing?
a. legal penalties b. data breaches legal penalties c. surveillance d.
1 answer
asked anonymously
25 views
A bunnies friend Margo was eager to tell her about the new friend she met online she began chatting with Erin on a social
1 answer
asked anonymously
28 views
What should you do if you accidentally end up on an inappropriate website?
(1 point) Responses keep clicking on links until you
5 answers
asked by
the happy person
14 views
Which of the following information is okay to share on a social networking site?
(1 point) Responses your phone number your phone
3 answers
asked by
the happy person
8 views
Which of the following is not a danger of blogging? (1 point) cyberbullying Oslander gossip staying connected with an old friend
1 answer
asked anonymously
6 views
True/False
Your online chat name should never contain your full name. true false
1 answer
asked anonymously
14 views
What does a code of conduct include?
(1 point) Responses a secret code for Internet users a secret code for Internet users the
1 answer
asked by
jacob_101_gunner
25 views
Which of the following information is safe to share online?
when and where you will have a soccer game this weekend where you
3 answers
asked by
Julie
24 views
What is the definition of cyberstalking?(1 point)
Responses the use of personally identifiable information found about a user
1 answer
asked anonymously
16 views
What is the definition of cyberstalking?(1 point)
Responses a b c or d the use of personally identifiable information found about
1 answer
asked anonymously
11 views
What should you do first if you find out that you are being cyberbullied? (1 point) Responses Reply to the bully in an angry
1 answer
asked by
JavierAsksAQuestion
21 views
Pages
1
2
3
4
5
6
7
Parent Categories (10)
Digital Literacy
Education
Internet
Online Safety
Personal Safety
Safety
Technology
Technology and Internet
Technology and Online Learning
Technology Education