Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Unit 1: Digital Citizenship - 7th Grade
Test Description: 7th
Instructions: Answer all questions to get your test result.
1) Electronic devices and media such as computers, cell phones, digital video, social networking sites, the Internet, and video games that allow users to create, communicate, and interact with one another or with the device
A
digital media
B
flaming
C
phishing features
D
information technology
2) What is the best way to prove that you have been a victim of cyberbullying?
A
Talk about it to your friends.
B
Save screenshots of instances where you have been harassed.
C
Create a social media post exposing the bully to everyone.
D
Reply to harassing texts and emails.
3) Over a few days, you receive a series of insulting texts from someone at school. What action should you take after deleting the first text?
A
Confront the bully in school.
B
Respond to every text after the first one.
C
Delete any further texts.
D
Show any further texts to a trusted adult.
4) Which of the following activities involve using a type of digital media?
A
Attending a live baseball game
B
Playing a real card game
C
Sending a postcard via regular postal service to a friend
D
Sending a text message to a friend
5) People use the term “24/7” to describe digital media because:
A
There are 24 different kinds of digital media.
B
You need a password with 24 letters and 7 numbers to use digital media.
C
This type of media is available 24 hours a day, 7 days a week.
6) When digital media is described as being interactive, this means:
A
It means you can only use it at school.
B
Communication can be “two-way”
C
People cannot see what others post online.
7) A type of crime in which your private information is stolen and used for criminal activity is called:
A
Burglary
B
Flaming
C
Identity theft
D
Plagiarism
8) Sara finds a message on her phone that she thinks might be a scam. She should:
A
Reply and ask the sender not to send more mail
B
Forward the message to her friends to see if they think it’s a scam too
C
Delete the message
9) The word plagiarize means:
A
Copying or slightly changing someone else’s
B
Downloading material illegally from the Internet
C
Copying or slightly changing someone else’s work and then saying you created it
10) A ______________ is a law that helps protect your control over your creative work.
A
piracy
B
public domain
C
fair use
D
copyright
11) Sara finds a message on her phone that she thinks might be a scam. She should:
A
Respond to the message
B
Delete the message
C
Forward the message to her friends
D
Copy and paste the message into a new message to send to her parents
12) Information about you that can be used to identify you because it's unique to you (e.g., your full name or your address).
A
Personal Information
B
Open Information
C
Public Information
D
Private Information
13) Which word refers to navigating the digital world safely?
A
Digital Standard
B
Digital Media
C
Digital Information
D
Digital Citizenship
14) Dean and Eric are on a soccer team together. Dean gets a text from Eric that says, I can't believe you made us lose the game with that lame shot. It's the first time Dean received a message like this from Eric. Is this an example of cyberbullying?
A
It is cyberbullying because Dean feels bad now.
B
It is cyberbullying because Eric is using text messages to be mean.
C
It is not cyberbullying because Dean made them lose the game.
D
It is not cyberbullying because Eric has not been mean repeatedly.
15) The illegal act of sending emails or messages that appear to come from authentic sources, but that really come from spammers.
A
surfing
B
podcast
C
flaming
D
phishing
16) The ability to use a small amount of someone's work without permission, but only in certain ways and specific situations. (schoolwork and education, news reporting, criticizing or commenting on something, comedy or parody)
A
Phishing Features
B
Creative Commons
C
Fair Use
D
Public Domain
17) A creative work that is not protected by copyright and is therefore free for you to use however you want.
A
Fair Use
B
Plagiarism
C
Public Domain
D
Creative Commons
18) This takes place whenever someone uses digital media tools such as the internet and cell phones to deliberately upset or harass someone, often repeatedly.
A
plagiarism
B
cyberbullying
C
upstander
D
bystander
19) Information about you that cannot be used to identify you because it is also true for many other people (e.g., your hair color, your dog's name, your favorite food).
A
Public Information
B
Personal Information
C
Private Information
D
Open Information
20) AJ loves to make clay sculptures and posts pictures of her art online to share with others.Someone AJ doesn't know has been repeatedly posting mean comments about her art.What makes AJ's experie of cyberbullying different from face-to-face bullying?
A
It is more difficult to handle because she and others on the internet can see the comments, but she doesn't know who's postin
B
It is less hurtful because AJ doesn't personally know all the people who are being mean.
C
It is easier to handle because AJ can just ignore the mean comments.
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?