Search Header Logo

Digital Footprint & Reputation Review

Authored by April Mason

Computers

9th - 12th Grade

Used 17+ times

Digital Footprint & Reputation Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A person’s digital footprint is:

Public, but not usually permanent

Only public to people whom a person share things with, but what’s there is permanent

Public and permanent to anyone

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following people can access your digital footprint?

I. Teachers, colleges, and scholarship committees

II. Potential employers

III. Family, friends, and acquaintances

I only

I and II only

III only

I-III All

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What should you do if you are a victim of cyberbullying?

I. Respond to the bully

II. Keep a record of messages received (print or take screenshots)

III. Reach out to parents, teachers, counselors, and school administrators

IV. Block communication from the bully (if possible)

I only

I - IV all

II, III, and IV

II and III

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

How can you be an upstander if you witness cyberbullying?

Reach out to the victim–let them know that you care and encourage them to seek help

Tell a teacher, parent, or counselor about the bullying

Report bullying to the website admin

All of the above

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, even if you change your settings.

True. This is always the case.

True. Changing your settings does not affect the privacy policy.

False. It depends if the privacy policy allows you to opt in or out of sharing data.

False. Companies do not give you the option to update your settings.

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is not true of white hat hackers?

They contribute to robust security systems

They use the same methods as black hat hackers

They alert companies of security vulnerabilities

They are breaking the law and are at risk of legal repercussions

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following pieces of information would be safe to include in an online username?

School mascot

Favorite sport

Year of birth

City of residence

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?