if you are talking to a friend in a chat room and they ask you for financial information, you...

15

Upload: joel-davidson

Post on 28-Dec-2015

217 views

Category:

Documents


0 download

TRANSCRIPT

If you are talking to a friend in a chat room and they If you are talking to a friend in a chat room and they ask you for financial information, you should:ask you for financial information, you should:

a)a) Ask your friend why they need the information.Ask your friend why they need the information.

b)b) Ask your parents/guardian for their credit card.Ask your parents/guardian for their credit card.

c)c) Leave the chat room.Leave the chat room.

d)d) Call the police.Call the police.

Which of the following chat screen names is the best Which of the following chat screen names is the best choice?choice?

a)a) partyALLnitelong.partyALLnitelong.

b)b) i_like_stuff.i_like_stuff.

c)c) hottie69.hottie69.

d)d) [email protected]@ua07.

Where is a safe place to put personal information about Where is a safe place to put personal information about yourself?yourself?

a)a) MySpace.MySpace.

b)b) Xanga.Xanga.

c)c) IM profile.IM profile.

d)d) None of the above.None of the above.

The definition of social engineering or social The definition of social engineering or social networking:networking:

a)a) A special degree at The Ohio State University.A special degree at The Ohio State University.

b)b) A service that uses the Internet for online A service that uses the Internet for online communication through an interactive network of communication through an interactive network of photos, blogs, user profiles, e-mail and other groups.photos, blogs, user profiles, e-mail and other groups.

c)c) IM profile engineered by a friend.IM profile engineered by a friend.

d)d) None of the above.None of the above.

Examples of Online Social Networks are:Examples of Online Social Networks are:

a)a) LiveJournal, Xanga, Facebook.LiveJournal, Xanga, Facebook.

b)b) Alpha, Beta, Gamma, Psi.Alpha, Beta, Gamma, Psi.

c)c) Profiles engineered by your parents.Profiles engineered by your parents.

d)d) Google.Google.

Cyber predators are people who use the Internet to Cyber predators are people who use the Internet to hunt for victims to take advantage of them:hunt for victims to take advantage of them:

a)a) PhysicallyPhysically

b)b) Emotionally.Emotionally.

c)c) Financially.Financially.

d)d) All of the above.All of the above.

In Cyber Lingo what does LMIRL mean?In Cyber Lingo what does LMIRL mean?

a)a) Let’s meet in real life.Let’s meet in real life.

b)b) Love means I’m really lucky.Love means I’m really lucky.

c)c) Let’s move into real love.Let’s move into real love.

d)d) All of the above.All of the above.

Excessive praise, questions about what theyExcessive praise, questions about what they’r’re e wearing or questions designed to determine whether wearing or questions designed to determine whether their parents are nearby in a chat could:their parents are nearby in a chat could:

a)a) Be a warning of a possible cyber predator.Be a warning of a possible cyber predator.

b)b) Mean a friend that would help with homework.Mean a friend that would help with homework.

c)c) Mean someone to help you with what not to Mean someone to help you with what not to wear.wear.

d)d) All of the above.All of the above.

Ownership rights of materials, created, written,Ownership rights of materials, created, written,designed or expressed by individuals are:designed or expressed by individuals are:

a)a) Not applied to online work.Not applied to online work.

b)b) But a click away.But a click away.

c)c) Examples of intellectual property.Examples of intellectual property.

d)d) Only the property of a university.Only the property of a university.

How can inappropriate content can appear on a How can inappropriate content can appear on a computer screen by accident?computer screen by accident?

a)a) Through pop-up windows.Through pop-up windows.

b)b) Misspelled URL’s.Misspelled URL’s.

c)c) Misrepresented links.Misrepresented links.

d)d) All of the above.All of the above.

Inappropriate online content includes:Inappropriate online content includes:

a)a) Epicurious.Epicurious.

b)b) ESPN, SI.ESPN, SI.

c)c) Hate groups, pornography, gambling.Hate groups, pornography, gambling.

d)d) Both a) and c) Both a) and c)

The act of sending or posting messages that are The act of sending or posting messages that are deliberately hostile and insulting is called:deliberately hostile and insulting is called:

a)a) Xanga.Xanga.

b)b) Flaming.Flaming.

c)c) Cyber lurking.Cyber lurking.

d)d) Phishing.Phishing.

Teens can be cyber bullied via:Teens can be cyber bullied via:

a)a) Text messages.Text messages.

b)b) Bash boards and chat rooms.Bash boards and chat rooms.

c)c) Social networking sites, morphed pictures.Social networking sites, morphed pictures.

d)d) All of the above.All of the above.