Lesson Assessment TEACHER VERSION
Total Page:16
File Type:pdf, Size:1020Kb
SAFETY > RISKY ONLINE RELATIONSHIPS Lesson Assessment TEACHER VERSION 1. True or false: Most people who ask teens to talk about sexual things online are older adults. a) True b) False Answer feedback The correct answer is b, False. It’s more typical that teens receive requests to talk about sexual things online from other teens or from young adults than from older adults. 2. Mimi just signed up for online chat. How can she avoid getting into risky online chat situations? Read the following choices and then select the best answer. a) Avoid chat during evening and night b) Tell others she meets online that she is older than she actually is c) Avoid flirting with people online d) Tell others she meets online that she is already in a relationship Answer feedback The correct answer is c. People who flirt online, especially with strangers, are more likely to deal with unwanted or risky contact. 3. Dana is chatting with someone she only knows online. She starts to feel uncomfortable about what they’re talking about. Which actions could Dana take to make the situation better? Circle all that apply. a) Stop talking to the person altogether b) Ask a friend to talk to the person and pretend to be her c) Don’t do anything d) Log off of chat for a while e) Keep talking with the person anyway f) Change the subject g) Block the user name Answer feedback The correct answers are a, d, f, and g. If you feel uncomfortable while chatting online, you can try to take the conversation in a new direction. If that doesn’t work, you can always stop typing and log off of chat, or block that person. DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 SAFETY > RISKY ONLINE RELATIONSHIPS Lesson Assessment STUDENT VERSION Name Class Date 1. True or false: Most people who ask teens to talk about sexual things online are older adults. a) True b) False 2. Mimi just signed up for online chat. How can she avoid getting into risky online chat situations? Read the following choices and then select the best answer. a) Avoid chat during evening and night b) Tell others she meets online that she is older than she actually is c) Avoid flirting with people online d) Tell others she meets online that she is already in a relationship 3. Dana is chatting with someone she only knows online. She starts to feel uncomfortable about what they’re talking about. Which actions could Dana take to make the situation better? Circle all that apply. a) Stop talking to the person altogether b) Ask a friend to talk to the person and pretend to be her c) Don’t do anything d) Log off of chat for a while e) Keep talking with the person anyway f) Change the subject g) Block the user name DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 SECURITY > SCAMS AND SCHEMES Lesson Assessment TEACHER VERSION 1. A type of crime in which your private information is stolen and used for criminal activity is called: a) Identification b) Identity theft c) Burglary Answer feedback The correct answer is b. You can help protect yourself from identity theft by watching out for online offers designed to trick you, and by guarding your private information. 2. Evan sees the following message in his inbox: Dear Sir, I’m writing to you because my company has identified you as the kind of person we’d like to have on our team. Your records show that you are an outstanding individual who seeks adventure. This is just the kind of person we are looking for. If you become a member of our team, I can guarantee you a pay raise within the first six months. To get started, I need some basic information from you: • your date of birth • your home address Thank you, Mr. Urban Reynolds, Jr. Which of the following is NOT a warning sign that this message is a scam: a) The offer sounds too good to be true b) It asks Evan for his private information c) Evan is addressed as “Sir” Answer feedback The correct answer is c. Offers that seem too good to be true or that ask for private information may be scams. These kinds of messages should be marked as spam and deleted. 3. Sara finds a message on her phone that she thinks might be a scam. She should: a) Forward the message to her friends to see if they think it’s a scam too b) Reply and ask the sender not to send more mail c) Delete the message Answer feedback The correct answer is c. If Sara thinks the message might be a scam, she should delete it. DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 SECURITY > SCAMS AND SCHEMES Lesson Assessment STUDENT VERSION Name Class Date 1. A type of crime in which your private information is stolen and used for criminal activity is called: a) Identification b) Identity theft c) Burglary 2. Evan sees the following message in his inbox: Dear Sir, I’m writing to you because my company has identified you as the kind of person we’d like to have on our team. Your records show that you are an outstanding individual who seeks adventure. This is just the kind of person we are looking for. If you become a member of our team, I can guarantee you a pay raise within the first six months. To get started, I need some basic information from you: • your date of birth • your home address Thank you, Mr. Urban Reynolds, Jr. Which of the following is NOT a warning sign that this message is a scam: a) The offer sounds too good to be true b) It asks Evan for his private information c) Evan is addressed as “Sir” 3. Sara finds a message on her phone that she thinks might be a scam. She should: a) Forward the message to her friends to see if they think it’s a scam too b) Reply and ask the sender not to send more mail c) Delete the message DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 SECURITY > DOES IT MATTER WHO HAS YOUR DATA? Lesson Assessment TEACHER VERSION 1. What kinds of information do companies collect about you when you go online? a) Your likes and dislikes b) Where you live c) Products you look at or buy online d) Subjects or activities that interest you e) All of the above Answer feedback The correct answer is e. Companies store all kinds of information about you so they can recommend more products that you may want to buy. 2. True or false: The information you enter about yourself online, or the ads that you click on, can affect the results you get when you do an online search. a) True b) False Answer feedback The correct answer is a, True. Companies may use the data you enter online to offer search results they think are most relevant to you. 3. Jana is searching for books online. She wants to make sure that she protects her private information, such as her address, when she searches for and buys the books. Jana could: a) Email the online companies she is thinking about buying from to ask them not to use her private information b) Only buy books from sites that her friends buy books from c) Read the sites’ privacy policies before she gives out information Answer feedback The correct answer is c. Jana can find out about how a company plans to use her information by reading its privacy policy. Then she can decide which sites she feels comfortable giving her information to, before she searches for and buys books from them. DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 SECURITY > DOES IT MATTER WHO HAS YOUR DATA? Lesson Assessment STUDENT VERSION Name Class Date 1. What kinds of information do companies collect about you when you go online? a) Your likes and dislikes b) Where you live c) Products you look at or buy online d) Subjects or activities that interest you e) All of the above 2. True or false: The information you enter about yourself online, or the ads that you click on, can affect the results you get when you do an online search. a) True b) False 3. Jana is searching for books online. She wants to make sure that she protects her private information, such as her address, when she searches for and buys the books. Jana could: a) Email the online companies she is thinking about buying from to ask them not to use her private information b) Only buy books from sites that her friends buy books from c) Read the sites’ privacy policies before she gives out information DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org 1 DIGITAL LIFE > DIGITAL LIFE 102 Lesson Assessment TEACHER VERSION 1. Using the chart below, show whether the following sentences are an upside (positive) or downside (negative) of media life. Answer feedback Upside Downside b) You can stay in touch with friends easily a) Private information can be copied and c) Many fun things online are also free sent to anyone f) You can look up information quickly d) You may spend less time with others face to face e) Anything you do online leaves a permanent record 2.