1 / 21

Cyber Safety Assessment Review

A set of review questions to assess students' knowledge of cyber safety for grades 3-5, covering topics such as personal information, email usage, online communication, cyber bullying, online predators, music swapping, social networking, and online behavior.

bishopj
Download Presentation

Cyber Safety Assessment Review

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Grades 3-5 Cyber Safety Assessment Review

  2. Question #1 Personal information that should never be shared online is: • A) address and phone number • B) names of your friends • C) your school name and town you live in • D) All of the above

  3. Answer #1 Personal information that should never be shared online is: • A) address and phone number • B) names of your friends • C) your school name and town you live in • D) All of the above

  4. Question #2 When using email, you should always: • A) Open and read all emails very carefully • B) Reply back to harassing emails to tell them to leave you alone • C) Delete all emails (unread) from people you do not know • D) Download all email attachments to your computer

  5. Answer#2 When using email, you should always: • A) Open and read all emails very carefully • B) Reply back to harassing emails to tell them to leave you alone • C) Delete all emails (unread) from people you do not know • D) Download all email attachments to your computer

  6. Question #3 The best thing about online communication is: • A) You can post embarrassing pictures of your friends • B) You are completely hidden so you can say anything to anyone • C) You can post messages to others and they will never know who sent it • D) None of the above

  7. Answer #3 The best thing about online communication is: • A) You can post embarrassing pictures of your friends • B) You are completely hidden so you can say anything to anyone • C) You can post messages to others and they will never know who sent it • D) None of the above

  8. Question #4 A cyber bully is a person who creates blogs, websites, emails, or phone messages or pictures that spread lies, transmit threats, or other hurtful things. • A)TRUE • B) FALSE

  9. Answer#4 A cyber bully is a person who creates blogs, websites, emails, or phone messages or pictures that spread lies, transmit threats, or other hurtful things. • A)TRUE • B) FALSE

  10. Question #5 Even if you use an online username, what you post on the Internet can lead others to find your information. You must be careful what you post in your profile. • A)TRUE • B) FALSE

  11. Answer#5 Even if you use an online username, what you post on the Internet can lead others to find your information. You must be careful what you post in your profile. • A)TRUE • B) FALSE

  12. Question #6 Online predators are recognizable to you because: • A) They use screen names that tell you who they really are • B) They tease or insult you in order to gain your trust • C) They send you their picture so you know who you are talking to • D) None of the above

  13. Answer#6 Online predators are recognizable to you because: • A) They use screen names that tell you who they really are • B) They tease or insult you in order to gain your trust • C) They send you their picture so you know who you are talking to • D) None of the above

  14. Question #7 When using your computer to swap music with others, be aware that there is real danger in doing so because: • A) Swapping all music is illegal • B) Opening email lets other people have access to your computer • C) Many nasty viruses can be transferred to your computer • D) Most music files are incomplete

  15. Answer#7 When using your computer to swap music with others, be aware that there is real danger in doing so because: • A) Swapping all music is illegal • B) Opening email lets other people have access to your computer • C) Many nasty viruses can be transferred to your computer • D) Most music files are incomplete

  16. Question #8 To be safe, social networking sites such as Facebook: • A)Should never be used • B) Require that you register all your personal information • C) Require that you follow some safety precautions • D) All of the above

  17. Answer #8 To be safe, social networking sites such as Facebook: • A)Should never be used • B) Require that you register all your personal information • C) Require that you follow some safety precautions • D) All of the above

  18. Question #9 When using blogs, chat rooms, email, or instant messaging: • A) Never reveal your real name • B) Never reveal your username or password • C) Never reveal your phone number • D) Never reveal any of the above information

  19. Answer #9 When using blogs, chat rooms, email, or instant messaging: • A) Never reveal your real name • B) Never reveal your username or password • C) Never reveal your phone number • D) Never reveal any of the above information

  20. Question #10 If anyone online is making you uncomfortable or scared, the best thing to do is: • A) Tell a trusted adult about it • B) Write them back and tell them to leave you alone • C) Turn off your computer • D) Meet them and tell them to leave you alone

  21. Question #10 If anyone online is making you uncomfortable or scared, the best thing to do is: • A) Tell a trusted adult about it • B) Write them back and tell them to leave you alone • C) Turn off your computer • D) Meet them and tell them to leave you alone

More Related