1.
What is NOT an example of cyberbullying?
Correct Answer
C. Bullying someone in the hallway
Explanation
Bullying someone in the hallway is not an example of cyberbullying because it does not involve the use of electronic communication or technology. Cyberbullying refers to the act of using digital platforms to harass, intimidate, or harm others, such as creating embarrassing pictures and forwarding them, sending mean texts, or threatening someone through instant messages.
2.
Which is an example of plagiarism?
Correct Answer
D. Copying and pasting a sentence from the Internet into your paper.
Explanation
Copying and pasting a sentence from the Internet into your paper is an example of plagiarism because it involves directly taking someone else's work without giving proper credit or citation. This action does not involve rephrasing or summarizing the information in your own words, which is necessary to avoid plagiarism.
3.
Which is NOT a consequence of copying or distributing copyrighted software?
Correct Answer
A. Community Service
Explanation
Copying or distributing copyrighted software without permission is illegal and can result in various consequences. Community service is not typically a consequence of this action. Instead, the possible consequences include imprisonment, legal fees of up to $10,000, and civil fees of up to $50,000.
4.
Which is not a type of cyberbully?
Correct Answer
C. Big, Bad Bully
Explanation
The correct answer is "Big, Bad Bully." This is because the other options, such as "Mean Girls," "Power Hungry or Revenge of the Nerds," "The Vengeful Angel," and "The Inadvertent Cyberbully 'Because I Can,'" all describe different types of cyberbullies. However, "Big, Bad Bully" does not accurately describe a specific type of cyberbully.
5.
Check TWO ways to prevent or stop cyberbullying.
Correct Answer(s)
B. Tell your parents, and teachers, or inform the administrator.
C. Not forwarding mean texts which are sent to you about a classmate.
Explanation
The correct answer is to tell your parent, or teacher, or inform the administrator, and not to forward mean texts that are sent to you about a classmate. By informing a trusted adult or authority figure, you are seeking help and support in dealing with the cyberbullying situation. Additionally, by refusing to forward mean texts, you are actively choosing not to participate in the spread of harmful content, which can help to prevent the escalation of cyberbullying incidents.
6.
Which of the following is a key principle of computer ethics that involves ensuring the privacy and confidentiality of user data?
Correct Answer
D. Information Privacy
Explanation
Information Privacy is a key principle of computer ethics that involves protecting the privacy and confidentiality of user data. This principle ensures that personal information is not disclosed without consent and is safeguarded against unauthorized access. Plagiarism refers to using someone else's work without giving credit, Intellectual Property Rights protect creators' inventions and works, and Data Integrity ensures the accuracy and consistency of data.
7.
Which of the following is NOT a rule listed in Computer Discovery's Ten Commandments of Computer Ethics?
Correct Answer
A. Thou shalt not use a computer to email.
Explanation
The correct answer is "Thou shalt not use a computer to email." This is not listed as a rule in Computer Discovery's Ten Commandments of Computer Ethics. The other options are all listed as rules, such as not using a computer to cyberbully, interfere with other people's computer work, be nosy or snoop into other people's computer files, or steal.
8.
Which of the following is NOT a rule listed in Computer Discovery's Ten Commandments of Computer Ethics?
Correct Answer
C. Thou shalt not let others borrow your computer.
Explanation
The correct answer is "Thou shalt not let others borrow your computer." This statement is not listed in Computer Discovery's Ten Commandments of Computer Ethics. The other four options are all mentioned in the commandments: not using a computer to lie, not copying copyrighted software and materials, not using a computer to plagiarize, and respecting others at all times when using the computer.
9.
Thou shalt not create ______________________ software or games.
Correct Answer
D. Harmful
Explanation
The phrase "Thou shalt not" is a biblical commandment that means "you shall not." In this context, it is instructing not to create software or games that are harmful. Harmful software or games can refer to those that cause damage, pose a threat to users' privacy or security, promote violence or hate speech, or have negative impacts on individuals or society. Creating such software or games goes against ethical and moral principles, and can have legal consequences as well.
10.
Thou shalt not copy ___________________________ software or materials.
Correct Answer
B. Copyrighted
Explanation
The phrase "Thou shalt not copy copyrighted software or materials" suggests that it is prohibited to reproduce or duplicate software or materials that are protected by copyright laws. Copyrighted materials are those that are owned by someone and are protected by law, granting the owner exclusive rights to control their reproduction and distribution. Therefore, copying copyrighted software or materials without permission would be considered a violation of the law.