SAFETY > RISKY ONLINE RELATIONSHIPS Lesson Assessment TEACHER VERSION

1. True or false: Most people who ask teens to talk about sexual things online are older adults. a) True b) False

Answer feedback The correct answer is b, False. It’s more typical that teens receive requests to talk about sexual things online from other teens or from young adults than from older adults.

2. Mimi just signed up for online chat. How can she avoid getting into risky online chat situations? Read the following choices and then select the best answer. a) Avoid chat during evening and night b) Tell others she meets online that she is older than she actually is c) Avoid flirting with people online d) Tell others she meets online that she is already in a relationship Answer feedback The correct answer is c. People who flirt online, especially with strangers, are more likely to deal with unwanted or risky contact.

3. Dana is chatting with someone she only knows online. She starts to feel uncomfortable about what they’re talking about. Which actions could Dana take to make the situation better? Circle all that apply. a) Stop talking to the person altogether b) Ask a friend to talk to the person and pretend to be her c) Don’t do anything d) Log off of chat for a while e) Keep talking with the person anyway f) Change the subject g) Block the user name

Answer feedback The correct answers are a, d, f, and g. If you feel uncomfortable while chatting online, you can try to take the conversation in a new direction. If that doesn’t work, you can always stop typing and log off of chat, or block that person.

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 SAFETY > RISKY ONLINE RELATIONSHIPS Lesson Assessment STUDENT VERSION

Name Class Date

1. True or false: Most people who ask teens to talk about sexual things online are older adults. a) True b) False

2. Mimi just signed up for online chat. How can she avoid getting into risky online chat situations? Read the following choices and then select the best answer. a) Avoid chat during evening and night b) Tell others she meets online that she is older than she actually is c) Avoid flirting with people online d) Tell others she meets online that she is already in a relationship

3. Dana is chatting with someone she only knows online. She starts to feel uncomfortable about what they’re talking about. Which actions could Dana take to make the situation better? Circle all that apply. a) Stop talking to the person altogether b) Ask a friend to talk to the person and pretend to be her c) Don’t do anything d) Log off of chat for a while e) Keep talking with the person anyway f) Change the subject g) Block the user name

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 SECURITY > SCAMS AND SCHEMES Lesson Assessment TEACHER VERSION

1. A type of crime in which your private information is stolen and used for criminal activity is called: a) Identification b) Identity theft c) Burglary Answer feedback The correct answer is b. You can help protect yourself from identity theft by watching out for online offers designed to trick you, and by guarding your private information.

2. Evan sees the following message in his inbox:

Dear Sir,

I’m writing to you because my company has identified you as the kind of person we’d like to have on our team. Your records show that you are an outstanding individual who seeks adventure. This is just the kind of person we are looking for.

If you become a member of our team, I can guarantee you a pay raise within the first six months. To get started, I need some basic information from you: • your date of birth • your home address

Thank you, Mr. Urban Reynolds, Jr.

Which of the following is NOT a warning sign that this message is a scam: a) The offer sounds too good to be true b) It asks Evan for his private information c) Evan is addressed as “Sir” Answer feedback The correct answer is c. Offers that seem too good to be true or that ask for private information may be scams. These kinds of messages should be marked as spam and deleted.

3. Sara finds a message on her phone that she thinks might be a scam. She should: a) Forward the message to her friends to see if they think it’s a scam too b) Reply and ask the sender not to send more mail c) Delete the message Answer feedback The correct answer is c. If Sara thinks the message might be a scam, she should delete it.

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 SECURITY > SCAMS AND SCHEMES Lesson Assessment STUDENT VERSION

Name Class Date

1. A type of crime in which your private information is stolen and used for criminal activity is called: a) Identification b) Identity theft c) Burglary

2. Evan sees the following message in his inbox:

Dear Sir,

I’m writing to you because my company has identified you as the kind of person we’d like to have on our team. Your records show that you are an outstanding individual who seeks adventure. This is just the kind of person we are looking for.

If you become a member of our team, I can guarantee you a pay raise within the first six months. To get started, I need some basic information from you: • your date of birth • your home address

Thank you, Mr. Urban Reynolds, Jr.

Which of the following is NOT a warning sign that this message is a scam: a) The offer sounds too good to be true b) It asks Evan for his private information c) Evan is addressed as “Sir”

3. Sara finds a message on her phone that she thinks might be a scam. She should: a) Forward the message to her friends to see if they think it’s a scam too b) Reply and ask the sender not to send more mail c) Delete the message

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 SECURITY > DOES IT MATTER WHO HAS YOUR DATA? Lesson Assessment TEACHER VERSION

1. What kinds of information do companies collect about you when you go online? a) Your likes and dislikes b) Where you live c) Products you look at or buy online d) Subjects or activities that interest you e) All of the above

Answer feedback The correct answer is e. Companies store all kinds of information about you so they can recommend more products that you may want to buy.

2. True or false: The information you enter about yourself online, or the ads that you click on, can affect the results you get when you do an online search. a) True b) False Answer feedback The correct answer is a, True. Companies may use the data you enter online to offer search results they think are most relevant to you.

3. Jana is searching for books online. She wants to make sure that she protects her private information, such as her address, when she searches for and buys the books. Jana could: a) the online companies she is thinking about buying from to ask them not to use her private information b) Only buy books from sites that her friends buy books from c) Read the sites’ privacy policies before she gives out information

Answer feedback The correct answer is c. Jana can find out about how a company plans to use her information by reading its privacy policy. Then she can decide which sites she feels comfortable giving her information to, before she searches for and buys books from them.

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 SECURITY > DOES IT MATTER WHO HAS YOUR DATA? Lesson Assessment STUDENT VERSION

Name Class Date

1. What kinds of information do companies collect about you when you go online? a) Your likes and dislikes b) Where you live c) Products you look at or buy online d) Subjects or activities that interest you e) All of the above

2. True or false: The information you enter about yourself online, or the ads that you click on, can affect the results you get when you do an online search. a) True b) False

3. Jana is searching for books online. She wants to make sure that she protects her private information, such as her address, when she searches for and buys the books. Jana could: a) Email the online companies she is thinking about buying from to ask them not to use her private information b) Only buy books from sites that her friends buy books from c) Read the sites’ privacy policies before she gives out information

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 DIGITAL LIFE > DIGITAL LIFE 102 Lesson Assessment TEACHER VERSION

1. Using the chart below, show whether the following sentences are an upside (positive) or downside (negative) of media life.

Answer feedback Upside Downside b) You can stay in touch with friends easily a) Private information can be copied and c) Many fun things online are also free sent to anyone f) You can look up information quickly d) You may spend less time with others face to face e) Anything you do online leaves a permanent record

2. What does digital citizenship mean? a) Any information about you on the b) Using digital media safely, responsibly, and ethically c) An online membership d) Not giving credit to someone else’s work Answer feedback The correct answer is b. Digital citizenship means treating others respectfully online.

3. Which is an example of digital media? a) b) Social network sites c) Video games d) All of the above

Answer feedback The correct answer is d. Going online, working on the , talking and texting on cell phones, and playing online games are all examples of using digital media.

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 DIGITAL LIFE > DIGITAL LIFE 102 Lesson Assessment STUDENT VERSION

Name Class Date

1. Using the chart below, show whether the following sentences are an upside (positive) or downside (negative) of media life. Upside Downside

a) Private information can be copied and sent to anyone b) You can stay in touch with friends easily c) Many fun things online are also free d) You may spend less time with others face to face e) Anything you do online leaves a permanent record f) You can look up information quickly

2. What does digital citizenship mean? a) Any information about you on the Internet b) Using digital media safely, responsibly, and ethically c) An online membership d) Not giving credit to someone else’s work

3. Which is an example of digital media? a) Computers b) Social network sites c) Video games d) All of the above

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 DIGITAL LIFE > MY ONLINE CODE Lesson Assessment TEACHER VERSION

1. You learned that online ethics is a set of rules or ideas that guide your behavior. Choose the answer below that is an example of online ethics. a) Making sure your seatbelt is on b) Working on a class project c) Being in the first row of a concert d) Asking your brother before posting a funny photo of him online

Answer feedback The correct answer is d. This is an example of online ethics because it demonstrates acting responsibly to another person, while online.

2. Which of the following behaviors is not ethical? a) Searching for information online b) Giving a friend credit for using their song in a video that you created c) Posting a mean message online about a classmate d) Asking your friend before you post a picture of her

Answer feedback The correct answer is c. It is hurtful and unethical to post mean messages.

3. Tommy has not been in school for the past few days and his classmate, Sam, thinks this is unfair. Sam posts the following message on his social networking page: “Tommy S. thinks he’s special and doesn’t have to go to class.” True or false: Sam’s post is irresponsible. a) True b) False

Answer feedback The correct answer is a. True. Sam should not have posted the message publicly because other people may make untrue assumptions about where Tommy is and about his character.

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 DIGITAL LIFE > MY ONLINE CODE Lesson Assessment STUDENT VERSION

Name Class Date

1. You learned that online ethics is a set of rules or ideas that guide your behavior. Choose the answer below that is an example of online ethics. a) Making sure your seatbelt is on b) Working on a class project c) Being in the first row of a concert d) Asking your brother before posting a funny photo of him online

2. Which of the following behaviors is not ethical? a) Searching for information online b) Giving a friend credit for using their song in a video that you created c) Posting a mean message online about a classmate d) Asking your friend before you post a picture of her

3. Tommy has not been in school for the past few days and his classmate, Sam, thinks this is unfair. Sam posts the following message on his social networking page: “Tommy S. thinks he’s special and doesn’t have to go to class.” True or false: Sam’s post is irresponsible. a) True b) False

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 PRIVACY AND DIGITAL FOOTPRINTS > PRIVATE TODAY, PUBLIC TOMORROW Lesson Assessment TEACHER VERSION

1. Before you post about someone else online, it’s important to: a) Ask that person if it’s okay to post b) Consider if you will upset anyone by posting c) Think about who might see what you post d) All of the above

Answer feedback The correct answer is d. Before you post anything online, make sure you think about who might see what you post and how that could affect the person you’ve posted about.

2. Read the following online post by Elliot. Then underline three phrases that could negatively impact Elliot or his friend Brian’s reputation. Answer feedback There are more than three correct answers. Possible responses are listed below:

Thanks for all of the birthday wishes, everybody! It feels great to be 16.

This weekend was crazy. Brian and I went on a camping trip with my older bro and some of his college friends. Brian said he knew about an awesome trail that was closed off to hikers. A park ranger found us, but we just lied and said we were lost.

The best part about the weekend? Drinking beer with the boys at sunset. What a life.

Who wants to give Brian and me notes for the History test tomorrow? We didn’t have time to study!

Peace, Elliot

Elliot makes references to trespassing, lying, underage drinking, and not doing homework. Not only are these things wrong to do, but that they could harm his reputation and Brian’s as well. Elliot should remove these references from his post to keep his online image positive.

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 PRIVACY AND DIGITAL FOOTPRINTS > PRIVATE TODAY, PUBLIC TOMORROW Lesson Assessment TEACHER VERSION

3. Look at the possible captions for this photo in the chart below. Circle the captions that make this photo okay to post, and mark an “X” over the captions that would make this photo inappropriate to post.

“Best “We got so “Man, you can’t “You guys concert hammered even tell we drank look great in ever!” this night!” before the concert!” this photo!”

Answer feedback It’s important to remember that the context you provide when you post something online, like a caption or a comment, can make a difference in the way others see your post. Before you post something, think about how you are representing yourself and others. Ask yourself if your post could harm or embarrass you or anyone else.

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 2 PRIVACY AND DIGITAL FOOTPRINTS > PRIVATE TODAY, PUBLIC TOMORROW Lesson Assessment STUDENT VERSION

Name Class Date

1. Before you post about someone else online, it’s important to: a) Ask that person if it’s okay to post b) Consider if you will upset anyone by posting c) Think about who might see what you post d) All of the above

2. Read the following online post by Elliot. Then underline three phrases that could negatively impact Elliot or his friend Brian’s reputation.

Thanks for all of the birthday wishes, everybody! It feels great to be 16.

This weekend was crazy. Brian and I went on a camping trip with my older bro and some of his college friends. Brian said he knew about an awesome trail that was closed off to hikers. A park ranger found us, but we just lied and said we were lost.

The best part about the weekend? Drinking beer with the boys at sunset. What a life.

Who wants to give Brian and me notes for the History test tomorrow? We didn’t have time to study!

Peace, Elliot

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 PRIVACY AND DIGITAL FOOTPRINTS > PRIVATE TODAY, PUBLIC TOMORROW Lesson Assessment STUDENT VERSION

3. Look at the possible captions for this photo in the chart below. Circle the captions that make this photo okay to post, and mark an “X” over the captions that would make this photo inappropriate to post.

“Best “We got so “Man, you can’t “You guys concert hammered even tell we drank look great in ever!” this night!” before the concert!” this photo!”

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 2 PRIVACY AND DIGITAL FOOTPRINT > COLLEGE BOUND Lesson Assessment TEACHER VERSION

1. Your digital footprint is all of the information about you: a) that can be found online, posted by you or by others b) that can be found online, posted only by you c) in the text messages that you send d) in the that you send to your friends Answer feedback The correct answer is a. Your digital footprint is all of the information about you that can be found online, posted by you or by others. Your digital footprint can help or hurt your image.

2. Look at Anna’s social network profile below. Find three things on the profile that shouldn’t be there and mark them with an “x”.

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 PRIVACY AND DIGITAL FOOTPRINT > COLLEGE BOUND Lesson Assessment TEACHER VERSION

Answer feedback Anna posts several references to partying, which might create a negative image for college admissions officers, family, or people at work. Anna also makes a comment about a friend that makes both Anna and her friend look bad. Anna should remove all of these things to improve her online image.

3. True or False: Only things that you post about yourself affect your online image. Posts about you by other people don’t matter. a) True b) False

Answer feedback The correct answer is b. False. A person’s entire digital footprint is part of their online image. This is why it’s important to show positive things about yourself and others when you post online.

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 2 PRIVACY AND DIGITAL FOOTPRINTS > COLLEGE BOUND Lesson Assessment STUDENT VERSION

Name Class Date

1. Your digital footprint is all of the information about you: a) that can be found online, posted by you or by others b) that can be found online, posted only by you c) in the text messages that you send d) in the emails that you send to your friends

2. Look at Anna’s social network profile below. Find three things on the profile that shouldn’t be there and mark them with an “x”.

3. True or False: Only things that you post about yourself affect your online image. Posts about you by other people don’t matter. a) True b) False

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 CONNECTED CULTURE > TURN DOWN THE DIAL ON CYBERBULLYING AND ONLINE CRUELTY Lesson Assessment TEACHER VERSION

1. Reflect on each of these statements about the Internet. Circle three statements that support the idea that the Internet makes bullying easier and a bigger problem.

a) Information can spread very quickly on d) Anything someone says could stay on the Internet. the Internet for a long time.

b) If you say something mean online, you don’t e) You can get support from groups on have to worry about getting in a physical fight. the Internet

c) You can find lots of information on f) Parents, teachers, and students all use the Internet. the Internet.

Answer feedback The correct answers are a, b, and d. Bullying and online cruelty can be intensified online because information on the Internet can be anonymous, public, and can last a long time.

2. Mei keeps getting mean comments on her posts. Cara, Mei’s good friend, has seen the comments and wants to help. What can both girls do to make the situation better? a) Mei could delete her Twitter account. Cara could let Mei use her Twitter account so that Mei can still post, but no one knows it’s her. b) Mei could ignore and block the bully. Cara could comfort Mei. c) Mei could tell the bully to back off, and Cara could post mean things about the bully on Twitter. d) Mei could tell the bully to back off, and Cara could get a group of friends to post embarrassing photos of the bully. Answer feedback The correct answer is b. Oftentimes bullies want attention, so it’s best to ignore them. The best thing for Mei to do is to block and ignore the bully, and the best thing for Cara to do is to offer support and comfort to her friend.

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 CONNECTED CULTURE > TURN DOWN THE DIAL ON CYBERBULLYING AND ONLINE CRUELTY Lesson Assessment TEACHER VERSION

3. A(n) ______helps to de-escalate, or lessen the impact of online cruelty by supporting and standing up for the person who is bullied. a) bystander b) upstander c) target d) offender Answer feedback The correct answer is b. An upstander does something to help or support the target of bullying.

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 2 CONNECTED CULTURE > TURN DOWN THE DIAL ON CYBERBULLYING AND ONLINE CRUELTY Lesson Assessment STUDENT VERSION

Name Class Date

1. Reflect on each of these statements about the Internet. Circle three statements that support the idea that the Internet makes bullying easier and a bigger problem.

a) Information can spread very quickly on d) Anything someone says could stay on the Internet. the Internet for a long time.

b) If you say something mean online, you don’t e) You can get support from groups on have to worry about getting in a physical fight. the Internet

c) You can find lots of information on f) Parents, teachers, and students all use the Internet. the Internet.

2. Mei keeps getting mean comments on her Twitter posts. Cara, Mei’s good friend, has seen the comments and wants to help. What can both girls do to make the situation better? a) Mei could delete her Twitter account. Cara could let Mei use her Twitter account so that Mei can still post, but no one knows it’s her. b) Mei could ignore and block the bully. Cara could comfort Mei. c) Mei could tell the bully to back off, and Cara could post mean things about the bully on Twitter. d) Mei could tell the bully to back off, and Cara could get a group of friends to post embarrassing photos of the bully.

3. A(n) ______helps to de-escalate, or lessen the impact of online cruelty by supporting and standing up for the person who is bullied. a) bystander b) upstander c) target d) offender

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 CONNECTED CULTURE > BUILDING COMMUNITY ONLINE Lesson Assessment TEACHER VERSION

1. How is a positive community built, and how can it break down? Read each example below and circle whether it!s a “community builder” or a “community breaker.” The first one is done for you.

Community members are mean Community Builder Community Breaker or disrespectful Community members help everyone Community Builder Community Breaker feel welcome Community members don!t like to participate Community Builder Community Breaker in activities Community members have lots of options Community Builder Community Breaker for getting involved Community members feel they can share Community Builder Community Breaker their interests There is little opportunity for members! input Community Builder Community Breaker

2. Complete the following sentence.

______media are online communications that promote user interaction, feedback, and content sharing.

!"#$%&'(%%)*+,- !"#$%&''#%($)*+,#'$-+$.!"#$%&/0$1&%-)2$3#4-)$)22&,$5+#'+$(&$%&**#%($&*2-*#/

3. What do all sites have in common? )6$!"#7$)22$#*8)8#$5+#'+$,-("$95*$&'$-*(#'#+(-*8$9#)(5'#+ :6$!"#7$'#,)'4$("#$3&+($;&;52)'$5+#'+$,-("$9'##$<*(#'*#($)%%#++ %6$!"#7$#*%&5')8#$;#&;2#$(&$;)'(-%-;)(# '()*"+,)%)%-')#

!"#$%&'(%%)*+,- !"#$%&''#%($)*+,#'$-+$'/$=22$+&%-)2$3#4-)$+-(#+$#*8)8#$5+#'+$,-("$95*$)*4$-*(#'#+(-*8$9#)(5'#+$)*4$ #*%&5')8#$;#&;2#$(&$;)'(-%-;)(#/$!"-*>$):&5($7&5'$9)?&'-(#$+&%-)2$3#4-)$+-(#/$@&524$7&5$+(-22$,)*($(&$ +;#*4$(-3#$&*$("#$+-(#$-9$7&5$,#'#*A($-*(#'#+(#4$-*$,")($7&5$%&524$4&$&*$-(B

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 CONNECTED CULTURE > BUILDING COMMUNITY ONLINE Lesson Assessment STUDENT VERSION

Name Class Date

1. How is a positive community built, and how can it break down? Read each example below and circle whether it’s a “community builder” or a “community breaker.” The first one is done for you.

Community members are mean Community Builder Community Breaker or disrespectful

Community members help everyone Community Builder Community Breaker feel welcome

Community members don’t like to participate Community Builder Community Breaker in activities

Community members have lots of options Community Builder Community Breaker for getting involved

Community members feel they can share Community Builder Community Breaker their interests

There is little opportunity for members’ input Community Builder Community Breaker

2. Complete the following sentence.

______media are online communications that promote user interaction, feedback, and content sharing.

3. What do all social media sites have in common? a) They all engage users with fun or interesting features b) They reward the most popular users with free Internet access c) They encourage people to participate d) Both a and c

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 CONNECTED CULTURE > OVEREXPOSED: SEXTING AND RELATIONSHIPS Lesson Assessment TEACHER VERSION

1. The word “sexting” has to do with sharing a specific kind of content. Sexting is: a) Getting a text that says you look nice b) Sending or receiving a text about going on a date c) Sharing any photos by text message d) Sending or receiving sexually explicit photos or videos by text message or other digital media

Answer feedback The correct answer is d. The term “sexting” describes sexually explicit photos or videos sent by phone or by other digital media (social networking sites, email, IM, etc.)

2. Sexting by minors, or kids under age 18, is illegal in some states. a) True b) False

Answer feedback The correct answer is a. True. Many states have laws that don’t allow the sending or receiving of sexual images by minors.

3. Read the following situations below and circle whether they are risky or safe uses of digital media in romantic relationships.

Hector sends his cell phone number to his crush in a private message on . Risky Safe

Adam asks his girlfriend to say sexually explicit things in an IM conversation. Risky Safe

Monica surprises her crush by taking off some of her clothes during a video chat. Risky Safe

Ariel’s boyfriend wants her to send him a naked photo. She texts him: “Only if you text me one first.” Risky Safe

Cristina texts her boyfriend a picture of her at the Great Wall of China. Risky Safe

Jack tweets “I have the best girlfriend ever!” Risky Safe

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 CONNECTED CULTURE > OVEREXPOSED: SEXTING AND RELATIONSHIPS Lesson Assessment STUDENT VERSION

Name Class Date

1. The word “sexting” has to do with sharing a specific kind of content. Sexting is: a) Getting a text that says you look nice b) Sending or receiving a text about going on a date c) Sharing any photos by text message d) Sending or receiving sexually explicit photos or videos by text message or other digital media

2. Sexting by minors, or kids under age 18, is illegal in some states. a) True b) False

3. Read the following situations below and circle whether they are risky or safe uses of digital media in romantic relationships.

Hector sends his cell phone number to his crush in a private message on Facebook. Risky Safe

Adam asks his girlfriend to say sexually explicit things in an IM conversation. Risky Safe

Monica surprises her crush by taking off some of her clothes during a video chat. Risky Safe

Ariel’s boyfriend wants her to send him a naked photo. She texts him: “Only if you text me one first.” Risky Safe

Cristina texts her boyfriend a picture of her at the Great Wall of China. Risky Safe

Jack tweets “I have the best girlfriend ever!” Risky Safe

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 CONNECTED CULTURE > TAKING PERSPECTIVES ON CYBERBULLYING Lesson Assessment TEACHER VERSION

1. Someone’s “perspective” is their outlook, based on their thoughts, feelings, experiences, and background. What is another way to say “perspective”? a) Point of view b) Stereotype c) Morals d) Race Answer feedback The correct answer is a. Understanding that everyone has a different point of view, or perspective, might help explain why they act the way they do.

2. Read the following story. Then use the chart to label the role that each person plays.

Raul is captain of the hockey team. His girlfriend dumps him and starts dating his teammate, Nick. Raul feels that Nick “stole” his girlfriend, and decides to get back at him. Raul starts a website where he uploads photos of Nick that show him spray- painting a park bench, which is illegal. Soon, everybody at school knows about Raul’s website. Raul’s teammate, Andrew, tells him that he should take it down because it’s bad for Nick and the whole team. Answer feedback Who is the target? b) Nick Who is the upstander? c) Andrew Who is the offender? a) Raul

3. Read the following scenario and then choose the best answer.

Avery and Alannah were competing for the last spot on the soccer team. On the final day of tryouts, Avery stole Alannah’s cleats so she couldn’t play. Avery ended up getting picked for the team. To get back at Avery, Alannah started a webpage dedicated to hurting Avery.

True or false: This is NOT an example of cyberbullying. a) True b) False

Answer feedback The correct answer is b, False. It is never okay to use the Internet to intentionally hurt someone. If someone upsets you, “getting back at them” will only make the situation worse.

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 CONNECTED CULTURE > TAKING PERSPECTIVES ON CYBERBULLYING Lesson Assessment STUDENT VERSION

Name Class Date

1. Someone’s “perspective” is their outlook, based on their thoughts, feelings, experiences, and background. What is another way to say “perspective”? a) Point of view b) Stereotype c) Morals d) Race

2. Read the following story. Then use the chart to label the role that each person plays.

Raul is captain of the hockey team. His girlfriend dumps him and starts dating his teammate, Nick. Raul feels that Nick “stole” his girlfriend, and decides to get back at him. Raul starts a website where he uploads photos of Nick that show him spray- painting a park bench, which is illegal. Soon, everybody at school knows about Raul’s website. Raul’s teammate, Andrew, tells him that he should take it down because it’s bad for Nick and the whole team.

Who is the target? Who is the upstander? Who is the offender?

3. Read the following scenario and then choose the best answer.

Avery and Alannah were competing for the last spot on the soccer team. On the final day of tryouts, Avery stole Alannah’s cleats so she couldn’t play. Avery ended up getting picked for the team. To get back at Avery, Alannah started a webpage dedicated to hurting Avery.

True or false: This is NOT an example of cyberbullying. a) True b) False

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 CONNECTED CULTURE > BREAKING DOWN HATE SPEECH Lesson Assessment TEACHER VERSION

1. Vinny and Katie are lab partners. After school, Katie sees that Vinny posted the following message on his friend’s social network profile: “So my lab results with KT are a mess. Dumb blonde. Don’t girls know they suck at science?”

This type of negative comment is an example of ______. The comment is based on ______about girls. a) a compliment / an assumption b) hate speech / a stereotype c) hate speech / a compliment d) mediation / a stereotype Answer feedback The correct answer is b. This type of negative comment is an example of hate speech. The comment is based on a stereotype about girls.

2. Read the following sentence. Then answer the question below:

Rachel directs negative comments at Jorge online in a chat room that many would consider hate speech.

True or false: Jorge is the only person affected by Rachel’s comments. a) True. Jorge is the only person affected by Rachel’s comments because the other people in the chat room know the comment was meant for Jorge only. b) True. Jorge is the only person affected by Rachel’s comments because Rachel only chats with Jorge. c) False. Jorge and other people in the chat room who are like him are affected by Rachel’s comments. d) False. Everyone in the chat room is affected by Rachel’s comments.

Answer feedback The correct answer is d. Everyone in the chat room is affected by Rachel’s comments. Hate speech changes the way people feel. It can make people who aren’t part of the conversation feel scared, trapped, or threatened.

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 CONNECTED CULTURE > BREAKING DOWN HATE SPEECH Lesson Assessment TEACHER VERSION

3. The following chart lists several places online where you might encounter hate speech. Using the answers below, write the actions you might take if you encountered hate speech in these places. You can write a letter more than once. Online chat forum a, c, d YouTube a, b, c Twitter a, c, d Facebook a, b, c, d a) Post a link to educational resources b) Flag inappropriate videos c) Make a comment that reaches out to large bodies of people d) Make counterpoint comments

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 2 CONNECTED CULTURE > BREAKING DOWN HATE SPEECH Lesson Assessment STUDENT VERSION

Name Class Date

1. Vinny and Katie are lab partners. After school, Katie sees that Vinny posted the following message on his friend’s social network profile: “So my lab results with KT are a mess. Dumb blonde. Don’t girls know they suck at science?” This type of negative comment is an example of ______. The comment is based on ______about girls. a) a compliment / an assumption b) hate speech / a stereotype c) hate speech / a compliment d) mediation / a stereotype

2. Read the following sentence. Then answer the question below: Rachel directs negative comments at Jorge online in a chat room that many would consider hate speech. True or false: Jorge is the only person affected by Rachel’s comments. a) True. Jorge is the only person affected by Rachel’s comments because the other people in the chat room know the comment was meant for Jorge only. b) True. Jorge is the only person affected by Rachel’s comments because Rachel only chats with Jorge. c) False. Jorge and other people in the chat room who are like him are affected by Rachel’s comments. d) False. Everyone in the chat room is affected by Rachel’s comments.

3. The following chart lists several places online where you might encounter hate speech. Using the answers below, write the actions you might take if you encountered You can write a letter more than once.

Online chat forum YouTube Twitter Facebook a) Post a link to educational resources b) Flag inappropriate videos c) Make a comment that reaches out to large bodies of people d) Make counterpoint comments

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 IDENTITY AND SELF-EXPRESSION > WHO ARE YOU ONLINE? Lesson Assessment TEACHER VERSION

1. ______means to show yourself to others as being a certain way or having particular characteristics. a) Represent b) Inhibited c) Anonymous d) Label Answer feedback The correct answer is a. Represent means to show yourself as being a certain way. The way you represent yourself online can be different than the way you represent yourself offline.

2. Offline, Tyrone is shy and gets made fun of at school. Online, Tyrone is outgoing and feels popular. Why might Tyrone feel he can be outgoing and popular online when he is shy and unpopular at school? a) Tyrone has a funny screen name b) Tyrone can’t see other people online, so he feels he can behave differently than he would offline c) Tyrone has more time to plan what he says to people online d) Both b and c

Answer feedback The correct answer is d. Oftentimes people feel less shy online because they are not interacting with others face to face.

3. What are some risks and some benefits to presenting yourself differently online than you present yourself offline? Write the letter of each answer choice in the correct part of the chart. a) You might behave in ways that are unsafe or harmful to yourself b) You might be able to try things out that you normally wouldn’t or couldn’t try c) You can highlight or emphasize the parts of yourself that you feel good about d) You might behave in ways that are disrespectful to others

Answer feedback Risks Benefits a) You might behave in ways that are unsafe or b) You might be able to try things out that you harmful to yourself normally wouldn’t or couldn’t try d) You might behave in ways that are c) You can highlight or emphasize the parts of disrespectful to others yourself that you feel good about

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 IDENTITY AND SELF-EXPRESSION > WHO ARE YOU ONLINE? Lesson Assessment STUDENT VERSION

Name Class Date

1. ______means to show yourself to others as being a certain way or having particular characteristics. a) Represent b) Inhibited c) Anonymous d) Label

2. Offline, Tyrone is shy and gets made fun of at school. Online, Tyrone is outgoing and feels popular. Why might Tyrone feel he can be outgoing and popular online when he is shy and unpopular at school? a) Tyrone has a funny screen name b) Tyrone can’t see other people online, so he feels he can behave differently than he would offline c) Tyrone has more time to plan what he says to people online d) Both b and c

3. What are some risks and some benefits to presenting yourself differently online than you present yourself offline? Write the letter of each answer choice in the correct part of the chart. a) You might behave in ways that are unsafe or harmful to yourself b) You might be able to try things out that you normally wouldn’t or couldn’t try c) You can highlight or emphasize the parts of yourself that you feel good about d) You might behave in ways that are disrespectful to others

Risks Benefits

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 RESPECTING CREATIVE WORK > COPYRIGHTS AND WRONGS Lesson Assessment TEACHER VERSION

1. Decide which kind of license is best for each student’s work. Write the letter of each answer in the chart below. Copyright Creative Commons Public Domain a) An original song that b) A digital illustration that d) An article that Ryan finds Janelle doesn’t want anyone Sasha wants credit for but in a government database to copy or distribute doesn’t mind if others use f) A photo that Marcus without her permission without her permission wants others to share and c.) An original documentary e) A collection of photos that use however they want that Dom wants complete Artie wants credit for but for the purpose of creating ownership of in case the doesn’t care if others use new artwork documentary makes money

a) An original song that Janelle doesn’t want anyone to copy or distribute without her permission b) A digital illustration that Sasha wants credit for but doesn’t mind if others use without her permission c) An original documentary that Dom wants complete ownership of in case the documentary makes money d) An article that Ryan finds in a government database e) A collection of photos that Artie wants credit for but doesn’t care if others use f) A photo that Marcus wants others to share and use however they want for the purpose of creating new artwork Answer feedback The students that want complete ownership of their creative works should choose to copyright their works so others will have to ask permission to use those works. The students that want credit for their works but don’t mind others using them without permission should choose a Creative Commons license. The students that want to share their creative work so that others can adapt it for their own purposes should choose the public domain.

2. Read the following scenario. Then answer the question below.

Lola takes a photo of the mountains near her home. She uploads the photo to the Internet with “Copyright 2011 Lola Dominguez” next to the image. About a week later, she checks one of her favorite blogs and sees that the blogger has posted her photo on the blog and has posted a creative writing story to go with it.

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 RESPECTING CREATIVE WORK > COPYRIGHTS AND WRONGS Lesson Assessment TEACHER VERSION

True or false: If the blogger doesn’t ask Lola’s permission to use the photo but still gives her credit, the blogger can post Lola’s photo with his story. a) True. Copyright is pretty relaxed, so even though Lola put “Copyright” on her photo the blogger can do what he wants. b) False. When you copyright something, the only way that others can use the work without your permission is if they change the original meaning of the work. Adding a story to the photo doesn’t change the original photo, so the blogger can’t use it. c) False. When you copyright something, others have to ask your permission before using it. d) True. Even though Lola put “Copyright” on her photo, the blogger doesn’t have to ask permission because he posted his own original story to go with it. Answer feedback The correct answer is c. When you copyright something, others have to ask your permission to use it no matter what, even if the person who uses your creative work wants to change the meaning of your work. If the blogger does not have permission to post Lola’s photo with his story, he should not post the photo at all.

3. What is the safest way to use someone else’s creative work, no matter what kind of license it has (copyright, Creative Commons, etc.)? a) Assume that it’s in the public domain and use it however you want b) Give credit to the creator c) Ask permission to use the work d) Check who owns the work Answer feedback The correct answer is c. Asking permission to use someone else’s work is a great idea if you are unsure about whether or not you can use the work for your own purposes. It’s also important to give credit to the original creator, but if you don’t have permission to use another person’s work, giving credit isn’t enough.

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 2 RESPECTING CREATIVE WORK > COPYRIGHTS AND WRONGS Lesson Assessment STUDENT VERSION

Name Class Date

1. Decide which kind of license is best for each student’s work. Write the letter of each answer in the chart below. Copyright Creative Commons Public Domain

a) An original song that Janelle doesn’t want anyone to copy or distribute without her permission b) A digital illustration that Sasha wants credit for but doesn’t mind if others use without her permission c) An original documentary that Dom wants complete ownership of in case the documentary makes money d) An article that Ryan finds in a government database e) A collection of photos that Artie wants credit for but doesn’t care if others use f) A photo that Marcus wants others to share and use however they want for the purpose of creating new artwork

2. Read the following scenario. Then answer the question below.

Lola takes a photo of the mountains near her home. She uploads the photo to the Internet with “Copyright 2011 Lola Dominguez” next to the image. About a week later, she checks one of her favorite blogs and sees that the blogger has posted her photo on the blog and has posted a creative writing story to go with it.

True or false: If the blogger doesn’t ask Lola’s permission to use the photo but still gives her credit, the blogger can post Lola’s photo with his story. a) True. Copyright is pretty relaxed, so even though Lola put “Copyright” on her photo the blogger can do what he wants. b) False. When you copyright something, the only way that others can use the work without your permission is if they change the original meaning of the work. Adding a story to the photo doesn’t change the original photo, so the blogger can’t use it. c) False. When you copyright something, others have to ask your permission before using it. d) True. Even though Lola put “Copyright” on her photo, the blogger doesn’t have to ask permission because he posted his own original story to go with it.

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 RESPECTING CREATIVE WORK > COPYRIGHTS AND WRONGS Lesson Assessment STUDENT VERSION

3. What is the safest way to use someone else’s creative work, no matter what kind of license it has (copyright, Creative Commons, etc.)? a) Assume that it’s in the public domain and use it however you want b) Give credit to the creator c) Ask permission to use the work d) Check who owns the work

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 2 RESPECTING CREATIVE WORK > RIGHTS, REMIXES, AND RESPECT Lesson Assessment TEACHER VERSION

1. ______is to use someone else’s creative work to make something new, often without their permission. a) Appropriation b) Fair use c) Copyright d) Public domain Answer feedback The correct answer is a. Appropriation is to use someone else’s creative work to make something new, often without their permission.

2. There is a difference between inspiration and appropriation. It is considered acceptable to use others’ work for inspiration, but it is often considered unacceptable to use, or appropriate, others’ work without their permission. Put the actions below in the right category.

Inspiration Appropriation

c) Writing a paper based on an article a) Using a song as the soundtrack to a video you read you have made b) Writing a song in the same style as your d) Adding someone else’s photos to your favorite band, but with different notes social networking profile

Answer feedback The difference between inspiration and appropriation is in how you use the original work. If you change someone else’s work or idea to create something of your own, that’s using the work for inspiration. If you use someone else’s work and simply add it to something you made (like using a song as the soundtrack to a video), that’s considered appropriating the work without permission.

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 RESPECTING CREATIVE WORK > RIGHTS, REMIXES, AND RESPECT Lesson Assessment TEACHER VERSION

3. Read the following scenario. Then answer the “true or false” question.

Top40 is a popular DJ who takes the first 10 seconds from the 40 most popular songs on the radio each week and blends them together to create one long song. Top40 does not change the parts of the songs he uses, and he does not ask permission from the original artists.

True or false: Top40 violates copyright law every time he uses a song from the radio without asking permission. a) True. If Top40 does not ask, then he does not have permission to use the songs. b) False. Even though Top40 does not ask for permission, no one cares, so it isn’t a big deal. c) False. Because what Top40 does helps the original artists, copyright law does not matter. d) Both b and c Answer feedback The correct answer is a. Even though the artists don’t mind, Top40 breaks copyright law if he doesn’t first ask permission before using the first 10 seconds of the songs.

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 2 RESPECTING CREATIVE WORK > RIGHTS, REMIXES, AND RESPECT Lesson Assessment STUDENT VERSION

Name Class Date

1. ______is to use someone else’s creative work to make something new, often without their permission. a) Appropriation b) Fair use c) Copyright d) Public domain

2. There is a difference between inspiration and appropriation. It is considered acceptable to use others’ work for inspiration, but it is often considered unacceptable to use, or appropriate, others’ work without their permission. Put the actions below in the right category.

Inspriration Appropriation

a) Using a song as the soundtrack to a video you have made b) Writing a song in the same style as your favorite band, but with different lyrics and with different notes c) Writing a paper based on an article you read d) Adding someone else’s photos to your social networking profile

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 RESPECTING CREATIVE WORK > RIGHTS, REMIXES, AND RESPECT Lesson Assessment STUDENT VERSION

3. Read the following scenario. Then answer the “true or false” question.

Top40 is a popular DJ who takes the first 10 seconds from the 40 most popular songs on the radio each week and blends them together to create one long song. Top40 does not change the parts of the songs he uses, and he does not ask permission from the original artists.

True or false: Top40 violates copyright law every time he uses a song from the radio without asking permission. a) True. If Top40 does not ask, then he does not have permission to use the songs. b) False. Even though Top40 does not ask for permission, no one cares, so it isn’t a big deal. c) False. Because what Top40 does helps the original artists, copyright law does not matter. d) Both b and c

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 2 SEARCHING > STRATEGIC SEARCHING Lesson Assessment TEACHER VERSION

1. A strategy is: a) A course of action designed to help you reach a goal or result b) A fraction of a larger amount c) A word that helps you search online Answer feedback The correct answer is a. Having a search strategy, for example, means that you have a specific plan for carrying out your online search.

2. Cindy heard a new song on the radio. She wants to search for it online, but she can only remember one line of the song. Which of the following strategies should Cindy use to search for this song? a) Include the date she heard the song on the radio b) Add synonyms to a few of the words she remembers c) Use quotation marks around the line she remembers Answer feedback The correct answer is c. When you use quotation marks around a search term, you are telling a search engine to look for that exact phrase.

3. What is the first step you should take when you want to conduct an online search? a) Select research questions b) Extract keywords and terms c) Run your search Answer feedback The correct answer is a. Before you do a search, you should think of a question about what you are looking for. You can then use this question to help you choose your keywords.

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 SEARCHING > STRATEGIC SEARCHING Lesson Assessment STUDENT VERSION

Name Class Date

1. A strategy is: a) A course of action designed to help you reach a goal or result b) A fraction of a larger amount c) A word that helps you search online

2. Cindy heard a new song on the radio. She wants to search for it online, but she can only remember one line of the song. Which of the following strategies should Cindy use to search for this song? a) Include the date she heard the song on the radio b) Add synonyms to a few of the words she remembers c) Use quotation marks around the line she remembers

3. What is the first step you should take when you want to conduct an online search? a) Select research questions b) Extract keywords and terms c) Run your search

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 RESEARCH AND EVALUATION > RETOUCHING REALITY Lesson Assessment TEACHER VERSION

1. The word retouching means: a) To mislead someone into believing something that’s not true b) To improve a photo by adding or changing small details c) To give a photographer credit for his work Answer feedback The correct answer is b. When you retouch a photo, you try to “touch up” or improve parts of it.

2. Tyler is editing a photo of the basketball team for the yearbook. Which of the following photo alterations would probably be considered deceptive? a) Making some of the players look taller b) Cropping the photo to fit on the yearbook page c) Adding the team’s name at the top of the image Answer feedback The correct answer is a. People might feel deceived, or tricked, if they find out that someone looks different in a photo than in real life.

3. True or false: Changing an image in any way is always a bad thing to do. a) True b) False

Answer feedback The correct answer is b, False. An edited photo can be considered creative or artistic. It all depends on the purpose of an edited photo and how it’s shared.

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 RESEARCH AND EVALUATION > RETOUCHING REALITY Lesson Assessment STUDENT VERSION

Name Class Date

1. The word retouching means: a) To mislead someone into believing something that’s not true b) To improve a photo by adding or changing small details c) To give a photographer credit for his work

2. Tyler is editing a photo of the basketball team for the yearbook. Which of the following photo alterations would probably be considered deceptive? a) Making some of the players look taller b) Cropping the photo to fit on the yearbook page c) Adding the team’s name at the top of the image

3. True or false: Changing an image in any way is always a bad thing to do. a) True b) False

DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1