CYBERPROOFED? - Peel Regional Police

advertisement
ANSWER SHEET
CYBERPROOFED?
ASSESSMENT QUESTIONNAIRE
AND TEACHING NOTES
1. There is no recommended location for your Internet access computer in the home.
A.
True
B.
False
Teaching Notes:
 computer should be in a high traffic, visible area to facilitate monitoring by others in the home
 family members should take note of the amount of time others are spending on the

Internet (possible Internet addiction)
also monitor for inappropriate material or discussions (chat rooms)
2. Sexual predators frequently meet youth on the Internet by pretending to be of similar age and sex
to the potential victim.
A.
True
B.
False
Teaching Notes:
 predators and con artists use the anonymity of the internet to their advantage
 by claiming to be of similar age and having similar interests, the victim identifies with and
confides in the predator
3. If you come across a site which has inappropriate content, you should send them an e-mail saying
that you don’t approve of their site.
A.
True
B.
False
Teaching Notes:
 many perpetrators of this type of activity are seeking a response of any kind
 sending them an e-mail will reveal your e-mail address which may encourage them to
target you directly
4. All Internet users are responsible for the content of the messages they send.
(This includes hate statements, pranks or prejudice)
A.
True
B.
False
Teaching Notes:
 crimes on the Internet are subject to the same penalties as crimes in the "real world"
 if you perpetrate this type of activity, you may be subject to fraud, liable, harassment, various
53
hate crimes, etc.
Answer Sheet (cont'd)
5. Visiting websites often results in the user having cookies saved onto their computer system
A.
True
B.
False
Teaching Notes:

contact with individuals, companies or other groups may result in a file being placed on your
computer allowing them to obtain personal information from your computer (see Glossary)
6. Entering contests, and filling out questionnaires or submitting forms on the Internet may be a
threat to you and your family’s safety and security.
A.
True
B.
False
Teaching Notes:
 revealing personal information can aid criminals in impersonating you or members of your family
 they may use your address or phone number to commit a break and enter on your home
 personal credit information can be obtained and used to defraud
7. Virus Protection software is 100 percent effective in detecting viruses attached to e-mail
including those with JPEG, GIF and BMP (Bitmap) attachments. (see Glossary)
A.
True
B.
False
Teaching Notes:
 new viruses are constantly emerging, no protection software is 100 percent effective
8. Through your computer, commercial companies can track your Internet purchases and the sites
you visit.
A.
True
B.
False
Teacher Notes:
 by design many companies place links to similar sites
 they may also track sites you have visited sites before and after you visited that company
9. Making copies of purchased software and/or CD’s for others is illegal.
A.
True
B.
False
Teacher Notes:
 downloading music
54

copyright infringements
Answer Sheet (cont'd)
10. Every website on the Internet is registered and screened for content and accuracy.
A.
True
B.
False
Teacher Notes:
 the Internet is notorious for inaccurate content
 information that looks legitimate may be totally false
 use a variety of sources to verify your information
11. Software is available to protect private information like your address and telephone number from
being transmitted when you visit a website.
A.
True
B.
False
Teacher Notes:
 make sure you buy good quality software and keep it up to date
12. All instant messenger conversations and e-mails are private and cannot be intercepted by others.
A.
True
B.
False
Teacher Notes:
 you should not say anything over the Internet that you would not want to become public
knowledge
13. A virus on your computer can allow a hacker to copy, delete or modify information on your
computer.
A.
True
B.
False
Teacher Notes:
 they may send you what appears to be an innocent message and attach a virus that will allow them
to take over your computer
14. Predators may offer bogus jobs over the Internet to lure victims.
A.
True
B.
False
Teacher Notes:
 this is a way to lure young people to an unsafe place or to get private information through a job
55
application
Answer Sheet (cont'd)
15. Always bring a friend when you go to meet someone in person, who you have initially met on
the Internet.
A.
True
B.
False
Teacher Notes:

there are numerous other ways to meet people, the potential risks involved with meeting someone over
the internet may far exceed the benefits
16. Most computer viruses are revealed within 12 hours.
A.
True
B.
False
Teacher Notes:
 there are thousands of viruses with different types of triggers (dates like holidays are often the
activator)
 these viruses can remain in your system for months or years before they are activated
17. Flaming and spamming are activities that can be done through e-mail.
A.
True
B.
False
Teacher Notes:


flaming is sending inflammatory information by e-mail designed to provoke a reaction from the
recipient
spamming is flooding electronic mailboxes with unsolicited material (usually advertising
promotions)(see Glossary)
18. If you disclose your telephone number on the Internet, it may be traced to reveal your home
address.
A.
True
B.
False
Teacher Notes:
 a reverse directory which can be accessed on the Internet will reveal a listed phone number
19. Internet addiction can have serious repercussions.
A.
True
B.
False
Teacher Notes:
 may lead to spousal breakups, family breakdown, student loss of friends,
56
reduction in academic standing
Answer Sheet (cont'd)
20. Deleting information from your computer before you sell it, will ensure the information
cannot be recovered by the purchaser.
A.
True
B.
False
Teacher Notes:


deleting allows the information to be typed over but does not erase the material
the seller must purchase software that will “wipe” the information from the computer
(Questions 21 – 25 are designed to reveal the school profile. There are no correct or incorrect
answers)
21. I have a computer with Internet access at home.
A.
True
B.
False
22. I have used an online instant messenger in the last month.
A.
True
B.
False
23. I or a member of my family have purchased an item on-line.
A.
True
B.
False
24. I have met, in person, someone I initially met on the Internet.
A.
True
B.
False
25. There is a computer with Internet access in one of the bedrooms in our home.
A.
True
B.
False
57
Download