Search Header Logo

CSA Unit 2

Authored by Ms B

Computers

9th - 12th Grade

Used 1+ times

CSA Unit 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following people can access your digital footprint?

I. Teachers, colleges, and scholarship committees II. Potential employers III. Family, friends, and acquaintances

A I only

B I and II only

C III only

D I-III All

A

B

C

D

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following people can access your digital footprint?

A person’s digital footprint is:

A Public, but not usually permanent

B Only public to people whom a person shares things with, but what’s there is permanent

C Public and permanent to anyone

A

B

C

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following people can access your digital footprint?

What should you do if you are a victim of cyberbullying?

I. Respond to the bully II. Keep a record of messages received (print or take screenshots) III. Reach out to parents, teachers, counselors, and school administrators IV. Block communication from the bully (if possible)

A I only

B I - IV all

C II, III, and IV

D II and III

A

B

C

D

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

How can you be an upstander if you witness cyberbullying?

A Reach out to the victim–let them know that you care and encourage them to seek help

B Tell a teacher, parent, or counselor about the bullying

C Report bullying to the website admin

D All of the above

A

B

C

D

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, even if you change your settings.

A True. This is always the case.

B True. Changing your settings does not affect the privacy policy.

C False. It depends if the privacy policy allows you to opt in or out of sharing data.

D False. Companies do not give you the option to update your settings.

A

B

C

D

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is an example of two factor authentication?

A You are asked to factor a large prime number in order to gain access to sensitive data.

B You are asked to reset your password every other time you enter a secure website.

C After inputting your password, you are asked to enter it again.

D After inputting your password, you receive a text message with a unique pin.

A

B

C

D

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following pieces of information would be safe to include in an online username?

A School mascot

B Favorite sport

C Year of birth

D City of residence

A

B

C

D

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?