You are on page 1of 36

G2 Unit 3 - TESOL Internet Safety,

Safeguarding Children

 Dashboard
 My courses
 ACADU 040104
 Unit Exam
 Unit 3 'TESOL Internet Safety, Safeguarding Children' - Final Exam

Started on Friday, 6 December 2019, 2:49 PM


State Finished
Completed on Friday, 6 December 2019, 4:21 PM
Time taken 1 hour 31 mins
Marks 49.00/50.00
Grade 98.00 out of 100.00

Question 1

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Acadsoc has identified 3 major risks related to internet safety for young learners. 

Which one of the following is excluded from this?

Select one:
a. A child being exposed to illegal, inappropriate or harmful material.
b. A child being subjected to harmful online interaction with other internet users.
c. A child infecting Acadsoc’s IT systems with malware.
That is correct.
d. A tutor exhibiting personal online behaviour that increases the likelihood of or causes
harm.

Feedback

Your answer is correct.

Question 2

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is NOT a role or behaviour that an Acadsoc tutor should adopt

Select one:
a. Offer additional classes to their pupils to teach safe online practice
That is correct.
b. Help young learners to know the basics of safe online behaviour
c. Identify and respond to concerns about a child’s safety
d. Be a role model for safe use of the internet

Feedback

Your answer is correct.

Question 3

Complete
Mark 1.00 out of 1.00

Flag question
Question text

Match the malware type ‘Trojan’ to its correct description.

Select one:
a. A program that tracks your internet activities to send information back to its owner.
b. A program that lurks in a computer and hijacks information and computer system
resources.
That is correct.
c. A program that makes copies of itself and destroys data and files on a computer.
d. A program that locks you out of the data on your computer until you pay to have it
unlocked.

Feedback

Your answer is correct.

Question 4

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Match the malware type ‘Spyware’ to its correct description.

Select one:
a. A program that makes copies of itself and destroys data and files on a computer.
b. A program that locks you out of the data on your computer until you pay to have it
unlocked.
c. A program that tracks your internet activities to send information back to its owner.
That is correct.
d. A program that lurks in a computer and hijacks information and computer system
resources.
Feedback

Your answer is correct.

Question 5

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Decide whether the following statements about internet dangers are TRUE or FALSE.

I.       Cyberbullying is carried out by a robot sending upsetting messages to random people.

II.      Sexting is sharing messages images or videos that have a sexual nature.

III.     Clickjacking is a means of tricking people into clicking on a web link that is malicious.

IV.     Identity theft can result from your mobile phone being lost or stolen.

Select one:
a. I (False), II (True), III (True), IV (True)
That is correct.
b.
c. I (Flse), II (Tre), III (False), IV (True)
d. I False, II (True), III (True), IV (False)
e. I Flse), II (Fse), III (True), IV (True)

Feedback

Your answer is correct.

Question 6
Complete
Mark 1.00 out of 1.00

Flag question

Question text

You receive an email that says it is from your bank. The email explains a problem with your
bank account and asks you to call a telephone number. When you call the number, the person
wants you to share your bank account number to verify it is really you. What could this be an
example of?

Select one:
a. Phishing
That is correct.
b. Sexting
c. Online Identity Theft
d. Cyberbullying

Feedback

Your answer is correct.

Question 7

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Which of the following is a description of Identify Theft?

Select one:
a. Sending inappropriate images or texts using technology.
b. Bullying someone using electronic devices.
c. Stealing someone's private information, without them knowing, to commit fraud.
That is correct.
d. Trying to persuade a person to share their private information by pretending to be their
bank or another trusted business.

Feedback

Your answer is correct.

Question 8

Complete
Mark 1.00 out of 1.00

Flag question

Question text

What steps might you take to prevent you from becoming a victim of Identity Theft?

Choose the best possible answer(s)

I. Shred documents that contain your personal information.

II. Do not respond to online ads or e-mails that say that you have won a prize, such as a holiday
or a car.

III. Do not make purchases from a website that you are uncertain about.

Select one:
a. II
b. III
c. I and II
d. All of the above
That is correct.

Feedback

Your answer is correct.

Question 9

Complete
Mark 1.00 out of 1.00

Flag question

Question text

All of the following actions can help keep your online personal data secure, EXCEPT:

Select one:
a. Being careful about posting anything online that may include identifying information.
b. Creating one password for all sites you visit so it’s easier for you to remember.
That is correct.
c. Creating a unique password for each site for which you need to login.
d. Keeping all of your software as up to date as possible.

Feedback

Your answer is correct.

Question 10

Complete
Mark 1.00 out of 1.00

Flag question

Question text
You have received an email telling you that you have won a large amount of money. All you
need to do is send your bank account details so that you can receive the money. What should you
do?

Select one:
a. Send your bank details but keep a record of the email for proof
b. Reply but ask for further information before you send your bank details.
c. Be delighted that you are a winner. Send your details immediately
d. Delete the email. This is a fraudulent email.
That is correct.

Feedback

Your answer is correct.

Question 11

Complete
Mark 0.00 out of 1.00

Flag question

Question text

When you search for information online, the results you see are influenced by the following.

Choose the best possible answer(s)

I. Other searches you have made in the past.

II. Where you live.

III. Videos you have looked at online.

Select one:
a. Only I
Sorry that is incorrect.
b. Only II
c. I and III
d. All of the above

Feedback

Your answer is incorrect.

Question 12

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Decide which of the following statements about internet safety are TRUE.

I. When I browse the internet no one can find out which website I visited.

II. The search results I see are tailored to suit my interests and beliefs.’

III. Clickjacking uses fake e-mails and websites to trick people into handing over personal data.

IV. Phishing is a means of tricking people into clicking on a web link that is malicious.

Select one:
a. Only II
That is correct.
b. II and IV
c. II and III
d. III and IV
Feedback

Your answer is correct.

Question 13

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Using a webcam or phone camera for video chat is NOT advisable for which of these activities:

I. Engaging with family or friends that you know in real life.

II. Speaking with someone that you have only become friends with online recently.

III. Any communication with others via the internet.

Select one:
a. II and III
b. Only I
c. None of the above
d. Only II
That is correct.

Feedback

Your answer is correct.

Question 14

Complete
Mark 1.00 out of 1.00
Flag question

Question text

A young learner needs advice about giving out personal information online. They believe that the
following situations are safe to give out their personal details:

I.  They have been chatting with a friend online for several weeks and know that person well

II.  Their best friend has given out his/her information to this person and nothing bad has
happened

III.  Their online friend suggests that they meet up in town and asks for personal details.

How should you advise them?


Select one:
a. Only I is safe
b. Only III is safe
c. None of these situations are safe
That is correct.
d. All are safe

Feedback

Your answer is correct.

Question 15

Complete
Mark 1.00 out of 1.00

Flag question
Question text

A person whom you have heard about from online friends asks to be your friend on a social
network. What action should you take?

Select one:
a. Block that person immediately
b. Accept them as a friend without question as they are a friend of your friends
c. Arrange to meet the person in real life so that you can make your mind up.
d. Make enquirie's of those who have better knowledge of this person.
That is correct.

Feedback

Your answer is correct.

Question 16

Complete
Mark 1.00 out of 1.00

Flag question

Question text

The ‘disinhibition effect’ is when:

Select one:
a. People prefer to spend time online rather than socialising in person.
b. People join an online group of others with similar interests.
c. People act out behaviour online that is different to their usual behaviour.
That is correct.
d. People share images and videos with their friends.

Feedback

Your answer is correct.


Question 17

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Which of the behaviours below is NOT an example of ‘toxic disinhibition’?

Select one:
a. Cyberbullying
b. Flaming in a chat room
c. Exhibiting a fear of missing out (FOMO)
That is correct.
d. Criticising others in a forum post

Feedback

Your answer is correct.

Question 18

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Which of these statements best describes potential results from an individual's online reputation?

I. Other people will form a particular opinion of the individual.


II. The individual’s friends and/or family may have hurtful experiences.

III. Affects the individual’s future opportunities such as employment.

Select one:
a. All of these
That is correct.
b. None of these
c. Only I and II
d. Only I and III

Feedback

Your answer is correct.

Question 19

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Consider these two statements about a tutor’s responsibilities:

I. A tutor has a duty of care to minimise the risk of an internet safety incident for their pupils.

II. A tutor has no responsibility for how their pupils might use the internet.

Which of the following is correct?

Select one:
a. Only II is true
b. Both I and II are true
That is correct.
c. Only I is true
d. Neither I nor II are true

Feedback

Your answer is correct.

Question 20

Complete
Mark 1.00 out of 1.00

Flag question

Question text

“Parental concerns about risks to their children while online have moved from contact-based
dangers to content-based risks”. This statement means:

Select one:
a. Parents are becoming better at monitoring their children online.
b. There is no danger nowadays of young people meeting up with strangers via the internet.
c. Their child is likely to be posting unsuitable content to internet websites.
d. The risks of a child viewing harmful or upsetting material online is much greater than the
risk of meeting an online stranger.
That is correct.

Feedback

Your answer is correct.

Question 21

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Why can it be dangerous for a young person to personally meet a stranger that they have only
met online?  Select the best answer.

Select one:
a. The stranger may have a criminal record.
b. The stranger might be a paedophile or a person with bad intentions.
That is correct.
c.
The stranger may want to meet up and have some fun together without parental control.
d. The stranger may want to persuade the young person to spend money.

Feedback

Your answer is correct.

Question 22

Complete
Mark 1.00 out of 1.00

Flag question

Question text

A pupil informs you that someone else has created a page in their name on a social media
platform (e.g. QQ or WeChat). Your correct course of action is to:

Select one:
a. Advise the child to make sure that all their friends know it is a fake page.
b. Inform your Acadsoc Tutor Manager of the information you have been given.
That is correct.
c. Ignore it as it is innocuous, it doesn’t really matter.
d. Advise the parents of the child to make a complaint to the social network site
administrator

Feedback

Your answer is correct.

Question 23

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Which of these online activities is NOT an example of online chat?

Select one:
a. Participating in an online discussion
b. Commenting on blog posts
c. Reading an online news website
That is correct.
d. Engaging in Instant messaging (IM)

Feedback

Your answer is correct.

Question 24

Complete
Mark 1.00 out of 1.00
Flag question

Question text

As an Acadsoc tutor, which of the following behaviours would be deemed inappropriate?

Select one:
a. Maintaining strict professional boundaries when engaging with learners
b. Both b and c
That is correct.
c. None of these
d. Putting your personal interest before those of the learner
e. Sharing personal comments about individual learners with colleagues

Feedback

Your answer is correct.

Question 25

Complete
Mark 1.00 out of 1.00

Flag question

Question text

A tutor’s dress and appearance are matters of choice and self-expression. However, not all
clothing may be appropriate. Decide which of the following statements are TRUE.

I. Some items of clothing might distract or cause embarrassment.

II. It’s okay for me to wear clothing that displays whatever slogans that I believe in.
III. Company uniforms can avoid issues to do with dress.

Select one:
a. Only II
b. All of the above
c. I and III
That is correct.
d. Only I

Feedback

Your answer is correct.

Question 26

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Using copyrighted works online without permission, e.g. copyrighted music, is called:

Select one:
a. Uploading
b. Online piracy
That is correct.
c. Spam email
d. Cyberbullying

Feedback

Your answer is correct.

Question 27
Complete
Mark 1.00 out of 1.00

Flag question

Question text

You have been particularly helpful to a young learner. The parents are very pleased with the
progress that their child has made and have decided to reward you for the extra effort that you
have put in to help their child. You have decided that this is OK and you have accepted a cash
payment from the parents as this is a personal and private matter between the parties. 

Which of the following is true?

Select one:
a. Both b and c are true
b. You have behaved in a manner that is illegal and a criminal prosecution may follow.
c. You have transgressed the Acadsoc code of conduct by not declaring this gift to your
Tutor Manager
That is correct.
d. You are quite correct. Accepting a payment of this sort is not a matter for Acadsoc

Feedback

Your answer is correct.

Question 28

Complete
Mark 1.00 out of 1.00

Flag question

Question text
Infatuation is when a young learner develops an admiration or fondness for their tutor. Possible
statements of the dangers inherent for a tutor in a developing infatuation are given below.
Choose the correct statement.

Select one:
a. All of these
That is correct.
b. None of these
c. A high risk that the tutor’s words or actions might be misinterpreted
d. A high risk that the tutor might favour the young learner, giving rise to concerns about
grooming
e. A high risk that the young learner may become distressed or embarrassed

Feedback

Your answer is correct.

Question 29

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Consider these statements of behaviours that a tutor might adopt.

I.            Answering a mobile phone call during a tuition session.

II.           Using language that has sexual undertones.

III.          Communicating with a pupil or his/her parents on social networks.

IV.         Mentioning extra resources that the learner can check outside of class.
Which of the statements below is true about this set of behaviours?

Select one:
a. All of the above are unacceptable behaviours 
b. All of the above are unacceptable behaviours with the exception of IV
That is correct.
c. I and II are acceptable

Feedback

Your answer is correct.

Question 30

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Modern computer technology makes it simple to capture a screen image of a pupil online. Which
of these statements is correct?

Select one:
a. It's OK to do this provided the child has agreed
b. It is considered cyberbullying.
c. it's OK to do this provided the parent has agreed
d. It is contrary to Acadsoc policy to do this.
That is correct.

Feedback

Your answer is correct.


Question 31

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Grooming is an activity carried out by adults with the purpose of gaining the trust of a child and
manipulating that relationship so that sexual abuse can take place. Decide whether the following
statement is True or False.

‘Almost all groomers are older men.’

Select one:
a. False
That is correct.
b. True

Feedback

Your answer is correct.

Question 32

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Grooming is an activity carried out by adults with the purpose of gaining the trust of a child and
manipulating that relationship so that sexual abuse can take place. Decide whether the following
statement is True or False.
‘Grooming always begins in chat rooms.’

Select one:
a. False
That is correct.
b. True

Feedback

Your answer is correct.

Question 33

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Grooming is an activity carried out by adults with the purpose of gaining the trust of a child and
manipulating that relationship so that sexual abuse can take place. Decide whether the following
statement is True or False.

‘A groomer will ask the child to keep all conversations secret.’

Select one:
a. False
b. True
That is correct.

Feedback

Your answer is correct.

Question 34

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Grooming is an activity carried out by adults with the purpose of gaining the trust of a child and
manipulating that relationship so that sexual abuse can take place. Decide whether the following
statement is True or False.

‘Groomers prefer to reveal their real identity to their victims as soon as possible.’

Select one:
a. True
b. False
That is correct.

Feedback

Your answer is correct.

Question 35

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Match the form of online bullying behaviour ‘Impersonation’ to its correct description.

Select one:
a. Cutting out a pupil from an exclusive group and letting them know it, with the intention of
making them feel isolated and afraid.
b. Repeatedly sending threatening messages to make someone afraid or feel bad (can be
illegal).
c.
d. Spreading fake news/fake information about a person e.g. altering images with
inappropriate comments.
e. Hacking into someone’s account and posting messages from it. Making up a fake profile
pretending to be another person.
That is correct.

Feedback

Your answer is correct.

Question 36

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Match the form of online bullying behaviour ‘Cyber-stalking’ to its correct description

Select one:
a. Cutting out a pupil from an exclusive group and letting them know it, with the intention of
making them feel isolated and afraid.
b. Hacking into someone’s account and posting messages from it. Making up a fake profile
pretending to be another person.
c. Repeatedly sending threatening messages to make someone afraid or feel bad (can be
illegal)
That is correct.
d. Spreading fake news/fake information about a person e.g. altering images with
inappropriate comments

Feedback

Your answer is correct.


Question 37

Complete
Mark 1.00 out of 1.00

Flag question

Question text

A young person tells you that they have had a disagreement with a friend from school that had
caused them to get into trouble. As a result they had sent the other person a series of angry text
messages, over and over, calling them names. What is this an example of?

Select one:
a. Cyberbullying
That is correct.
b. Sexting
c. Online Identity Theft
d. Phishing

Feedback

Your answer is correct.

Question 38

Complete
Mark 1.00 out of 1.00

Flag question

Question text

You receive online an inappropriate image of a colleague. What is the safe way to respond to
this?
Select one:
a. Forward it to other colleagues and ask their opinion
b. Contact your superior so they can deal with the matter
That is correct.
c. Delete the image and ignore the matter
d. Post it to your feed on Social Media

Feedback

Your answer is correct.

Question 39

Complete
Mark 1.00 out of 1.00

Flag question

Question text

What advice would you give to a young person who feels that they are a victim of
cyberbullying?

Select one:
a. Block the bullying person on your social media
b. Turn off their computer or mobile device for a while
c. Block the bullying person and confide in a trusted adult
That is correct.
d. Call the police and then hand in their computer or mobile device to the police station

Feedback

Your answer is correct.

Question 40

Complete
Mark 1.00 out of 1.00
Flag question

Question text

What is the best way to avoid issues with fair use of copyrighted materials

Select one:
a. Avoid copying anything that has a copyright
b. Use public domain resources wherever possible
That is correct.
c. Do not alter any works you have copied
d. Assume you are a teacher and that it is unlikely you would be liable for copyright
infringement

Feedback

Your answer is correct.

Question 41

Complete
Mark 1.00 out of 1.00

Flag question

Question text

The use of online technology can have both positive and negative impacts on an individual’s
health and wellbeing. Decide whether the following statement is True or False.

‘Improved social skills through use of social media.’

Select one:
a. False
That is correct.
b. True

Feedback

Your answer is correct.

Question 42

Complete
Mark 1.00 out of 1.00

Flag question

Question text

What types of work can be copyrighted?

Select one:
a. Products and ideas that lack originality
b. Only literary work
c. Only works that are literary, musical or pictorial
d. All types of original works
That is correct.

Feedback

Your answer is correct.

Question 43

Complete
Mark 1.00 out of 1.00

Flag question

Question text
What is ‘fair use’ of a copyrighted work?

Select one:
a. Limited copying or distribution of a published work without the author's permission
That is correct.
b. Using a paid-for commercial product once and never sharing it
c. Paying the creator a fair price for the work
d. Freeware that you obtain from the Internet

Feedback

Your answer is correct.

Question 44

Complete
Mark 1.00 out of 1.00

Flag question

Question text

What is the Convention on the Rights of the Child?

Select one:
a. It is a treaty created to tackle child poverty in developing countries
b. It is a treaty that recognizes the unique rights of children and the issues they face.
That is correct.
c. It is a convention/conference where child rights are discussed.
 
d. It is a treaty that attempts to abolish child abuse

Feedback

Your answer is correct.

Question 45
Complete
Mark 1.00 out of 1.00

Flag question

Question text

The following are statements describing different actions that can be taken by tutors and
institutes. Decide which of these correspond to the ‘Responsive’ category of child protection.

I. Log every concern, with procedures to follow if an issue is reported.

II. Have open discussions with learners about what they can do in situations they find
uncomfortable.

III. Provide staff training and awareness raising sessions about child protection.

IV. Periodically review issues raised and how they were resolved.

Select one:
a. I and IV
That is correct.
b. None of these
c. II and III
d. Only I

Feedback

Your answer is correct.

Question 46

Complete
Mark 1.00 out of 1.00
Flag question

Question text

The following are statements describing different actions that can be taken by tutors and
institutes. 

Decide which of these correspond to the ‘Preventative’ category of child protection.

I. Log every concern, with procedures to follow if an issue is reported.

II. Have open discussions with learners about what they can do in situations they find
uncomfortable.

III. Provide staff training and awareness raising sessions about child protection.

IV. Periodically review issues raised and how they were resolved.

Select one:
a. I and IV
b. II and III
That is correct.
c. Only III
d. None of these

Feedback

Your answer is correct.

Question 47

Complete
Mark 1.00 out of 1.00
Flag question

Question text

Consider this statement about the purpose of the ‘Acadsoc Code of Conduct’ and decide whether
this statement would be best described as either True or False.

‘To protect tutors from inappropriate behaviour.’

Select one:
a. False
b. True
That is correct.

Feedback

Your answer is correct.

Question 48

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Consider this statement about the purpose of the ‘Acadsoc Code of Conduct’ and decide whether
this statement would be better described as being True or False.

‘To ensure students do not misuse the internet.’

Select one:
a. True
b. False
That is correct.

Feedback

Your answer is correct.

Question 49

Complete
Mark 1.00 out of 1.00

Flag question

Question text

Consider this statement about the purpose of the ‘Acadsoc Code of Conduct’ and decide whether
this statement would be better described as being True or False.

‘To help Acadsoc teachers steer an ethical and respectful course.’

Select one:
a. False
b. True
That is correct.

Feedback

Your answer is correct.

Question 50

Complete
Mark 1.00 out of 1.00

Flag question
Question text

Consider these statements about the purpose of the ‘Acadsoc Code of Conduct’ and decide which
are FALSE:

I. ‘To help students understand the boundaries of their behaviour.’

II. ‘To help guarantee the safety of Acadsoc tutors.’

III. ‘To explain to pupils their rights and responsibilities as online learners.’

IV. ‘To protect Acadsoc from complaints.’

Select one:
a. I and II
b. I, II and III
c. III
d. I, II and IV
That is correct.

Feedback

Your answer is correct.

You might also like