Online Safety

Not a Learning.com customer? Learn More

Type:Quiz

Estimated Time:15 minutes

Score Type:Auto Score

This quiz automatically provides a score to your gradebook

Available Languages: English, Spanish


Vocabulary: copyright, creative commons, cyberbullying, derivative work, digital citizenship, digital footprint, fair use, plagiarism


Primary Objectives:

  • Student understands the importance of protecting personal safety when communicating online.
  • Student demonstrates an awareness of cyberbullying and the actions they can take to address this issue effectively and safely.
  • Student understands the permanent nature of the information they publish and share online.
  • Student understands copyright principles, including fair use and creative commons licenses, and how to legally use images and other media in derivative work.
  • Student can describe plagiarism and situations in which information can be legally and ethically used in personal work.

Secondary Objectives:

  • Student understands basic principles of effective and appropriate online communication.
  • Student understands and practices responsible measures for protecting oneself online and offline.
  • Student will evaluate the quality, credibility and accuracy of information published online.

Subjects:

Advantages and Disadvantages of Technology Use 

Information Technology > Technology and Society > Advantages and Disadvantages of Technology Use 

Appropriate Use of Information 

Information Technology > Internet > Appropriate Use of Information 

Bullying and Harassment

Information Technology > Internet > Bullying and Harassment

Bullying and Harassment 

Information Technology > Internet > Bullying and Harassment 

Copyright Infringement and Plagiarism (Technology Specific)

Information Technology > Technology and Society > Copyright Infringement and Plagiarism (Technology Specific)

Copyright Infringement and Plagiarism (Technology Specific) 

Information Technology > Technology and Society > Copyright Infringement and Plagiarism (Technology Specific) 

Copyright/Plagiarism

Digital Literacy > Student Use > Digital Citizenship > Copyright/Plagiarism

Copyright/Plagiarism

Information Literacy > ALA Social Responsibility > Copyright/Plagiarism

Development of Safe Interactive Environments 

Information Technology > Internet > Development of Safe Interactive Environments 

Digital Citizenship

Information Literacy > Student Use - Digital Media > Digital Citizenship

Digital Citizenship 

Digital Literacy > Student Use > Digital Citizenship 

Ethics 

Information Technology > Digital Communications > Ethics 

Internet Attacks and Abuse

Information Technology > Internet > Internet Attacks and Abuse

Internet Attacks and Abuse 

Information Technology > Internet > Internet Attacks and Abuse 

Negative Impact

Information Technology > Internet > Negative Impact

Negative Impact 

Information Technology > Internet > Negative Impact 

Risks and Benefits of Use 

Information Technology > Mobile Applications > Risks and Benefits of Use 

Safety

Information Technology > Internet > Safety

Safety 

Information Technology > Internet > Safety 

Security and Privacy 

Information Technology > Internet > Security and Privacy 

Sharing of Information 

Information Technology > Internet > Sharing of Information 

Social Networking 

Information Technology > Internet > Social Networking 
Show More

Standards:

S.2.a Students cultivate and manage their digital identity and reputation and are aware of the permanence of their actions in the digital world.
S.2.b Students engage in positive, safe, legal and ethical behavior when using technology, including social interactions online or when using networked devices.
S.2.c Students demonstrate an understanding of and respect for the rights and obligations of using and sharing intellectual property.
S.2.d Students manage their personal data to maintain digital privacy and security and are aware of data-collection technology used to track their navigation online.
2-IC-23 Describe tradeoffs between allowing information to be public and keeping information private and secure. (P7.2)
2-NI-05 Explain how physical and digital security measures protect electronic information. (P7.2)
3A-AP-20 Evaluate licenses that limit or restrict use of computational artifacts when using resources such as libraries. (P7.3)
3A-IC-28 Explain the beneficial and harmful effects that intellectual property laws can have on innovation. (P7.3)
3A-IC-29 Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users. (P7.2)
3A-IC-30 Evaluate the social and economic implications of privacy in the context of safety, law, or ethics. (P7.3)
3A-NI-06 Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts. (P3.3)
3A-NI-07 Compare various security measures, considering tradeoffs between the usability and security of a computing system. (P6.3)
3B-AP-18 Explain security issues that might lead to compromised computer programs. (P7.2)
ISTE seal of compliance for proficiency student standards ISTE seal of compliance for readiness student standards
Feedback