Unit 1: Digital Citizenship - 7th Grade Question Preview (ID: 49307)
7th.
TEACHERS: click here for quick copy question ID numbers.
Electronic devices and media such as computers, cell phones, digital video, social networking sites, the Internet, and video games that allow users to create, communicate, and interact with one another or with the device
a) phishing features
b) digital media
c) information technology
d) flaming
What is the best way to prove that you have been a victim of cyberbullying?
a) Talk about it to your friends.
b) Save screenshots of instances where you have been harassed.
c) Reply to harassing texts and emails.
d) Create a social media post exposing the bully to everyone.
Over a few days, you receive a series of insulting texts from someone at school. What action should you take after deleting the first text?
a) Delete any further texts.
b) Show any further texts to a trusted adult.
c) Respond to every text after the first one.
d) Confront the bully in school.
Which of the following activities involve using a type of digital media?
a) Playing a real card game
b) Sending a postcard via regular postal service to a friend
c) Sending a text message to a friend
d) Attending a live baseball game
People use the term “24/7” to describe digital media because:
a) This type of media is available 24 hours a day, 7 days a week.
b) You need a password with 24 letters and 7 numbers to use digital media.
c) There are 24 different kinds of digital media.
d)
When digital media is described as being interactive, this means:
a) People cannot see what others post online.
b) Communication can be “two-way”
c) It means you can only use it at school.
d)
A type of crime in which your private information is stolen and used for criminal activity is called:
a) Burglary
b) Identity theft
c) Flaming
d) Plagiarism
Sara finds a message on her phone that she thinks might be a scam. She should:
a) Delete the message
b) Forward the message to her friends to see if they think it’s a scam too
c) Reply and ask the sender not to send more mail
d)
The word plagiarize means:
a) Copying or slightly changing someone else’s work and then saying you created it
b) Copying or slightly changing someone else’s
c) Downloading material illegally from the Internet
d)
A ______________ is a law that helps protect your control over your creative work.
a) piracy
b) copyright
c) public domain
d) fair use
Sara finds a message on her phone that she thinks might be a scam. She should:
a) Copy and paste the message into a new message to send to her parents
b) Delete the message
c) Respond to the message
d) Forward the message to her friends
Information about you that can be used to identify you because it's unique to you (e.g., your full name or your address).
a) Personal Information
b) Public Information
c) Private Information
d) Open Information
Which word refers to navigating the digital world safely?
a) Digital Citizenship
b) Digital Media
c) Digital Standard
d) Digital Information
Dean and Eric are on a soccer team together. Dean gets a text from Eric that says, I can't believe you made us lose the game with that lame shot. It's the first time Dean received a message like this from Eric. Is this an example of cyberbullying?
a) It is cyberbullying because Eric is using text messages to be mean.
b) It is not cyberbullying because Dean made them lose the game.
c) It is cyberbullying because Dean feels bad now.
d) It is not cyberbullying because Eric has not been mean repeatedly.
The illegal act of sending emails or messages that appear to come from authentic sources, but that really come from spammers.
a) surfing
b) flaming
c) phishing
d) podcast
The ability to use a small amount of someone's work without permission, but only in certain ways and specific situations. (schoolwork and education, news reporting, criticizing or commenting on something, comedy or parody)
a) Public Domain
b) Creative Commons
c) Phishing Features
d) Fair Use
A creative work that is not protected by copyright and is therefore free for you to use however you want.
a) Fair Use
b) Public Domain
c) Creative Commons
d) Plagiarism
This takes place whenever someone uses digital media tools such as the internet and cell phones to deliberately upset or harass someone, often repeatedly.
a) plagiarism
b) cyberbullying
c) bystander
d) upstander
Information about you that cannot be used to identify you because it is also true for many other people (e.g., your hair color, your dog's name, your favorite food).
a) Personal Information
b) Public Information
c) Private Information
d) Open Information
AJ loves to make clay sculptures and posts pictures of her art online to share with others.Someone AJ doesn't know has been repeatedly posting mean comments about her art.What makes AJ's experie of cyberbullying different from face-to-face bullying?
a) It is easier to handle because AJ can just ignore the mean comments.
b) It is more difficult to handle because she and others on the internet can see the comments, but she doesn't know who's postin
c) It is less hurtful because AJ doesn't personally know all the people who are being mean.
d)
Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 49307 in the upper right hand corner or click here.
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 49307 in the upper right hand corner or click here.
TEACHERS / EDUCATORS
Log In | Sign Up / Register
Log In | Sign Up / Register