Sovi.AI - AI Math Tutor

Scan to solve math questions

QUESTION IMAGE

5. how can you be an upstander if you witness cyberbullying? a. reach o…

Question

  1. how can you be an upstander if you witness cyberbullying? a. reach out to the victim - let them know that you care and encourage them to seek help. b. tell a teacher, parent, or counselor about the bullying. c. report bullying to the website admin. d. all of the above 6. which of the following is not a characteristic of a credible source? a. the author is not named on the website. b. the domain is.edu or.gov. c. multiple scholarly sources are cited. d. the source is well - organized and follows rules of spelling and grammar. 7. by checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, even if you change your settings. a. true. this is always the case. b. true. changing your settings does not affect the privacy policy. c. false. it depends if the privacy policy allows you to opt in or out of sharing data. d. false. companies do not give you the option to update your settings. 8. which of the following is an example of two factor authentication? a. you are asked to factor a large prime number in order to gain access to sensitive data. b. you are asked to reset your password every other time you enter a secure website. c. after inputting your password, you are asked to enter it again. d. after inputting your password, you receive a text message with a unique pin. 9. which of the following pieces of information would be safe to include in an online username? a. school mascot b. favorite sport c. year of birth d. city of residence 10. which of the following is not a good practice for effective internet searches? a. search for specific keywords that define your topic. b. use quotation marks to search for exact phrases. c. be general in your search query to get as many results possible. d. use + or - to include or exclude different topics.

Explanation:

Brief Explanations
  • Question 5: Reaching out to the victim, telling an adult, and reporting to website admin are all ways to be an up - stander against cyberbullying.
  • Question 6: A credible source usually has a named author. A website without a named author is less credible compared to others.
  • Question 7: Privacy policies can vary. Some allow you to opt - in or out of data sharing even after initial consent.
  • Question 8: Two - factor authentication involves two different forms of verification. Receiving a text message with a unique pin after entering a password is a common example.
  • Question 9: School mascot and favorite sport are less personal compared to year of birth and city of residence.
  • Question 10: Being too general in a search query can lead to a large number of irrelevant results, which is not an effective practice.

Answer:

  1. d. All of the above
  2. a. The author is not named on the website
  3. c. False. It depends if the privacy policy allows you to opt in or out of sharing data.
  4. d. After inputting your password, you receive a text message with a unique pin.
  5. a. School mascot, b. Favorite sport
  6. c. Be general in your search query to get as many results possible