Self-Assessment Questions and Answers
1
2
3
4
5
6
7
8
9
10
Which action is most essential for educators to maintain safe digital practices in the classroom?
A
Using the same password for all online platforms
B
Encouraging students to open unknown email attachments for practice
C
Keeping software and anti-virus programs updated regularly
D
Disabling all security features to simplify technology use
Next Question
Ms. Alvarez receives an email claiming her school email account will be suspended unless she confirms her login details. The email looks official but asks for her password. Which action best aligns with safe digital practices?
A
Reply immediately with her username and password to avoid suspension
B
Delete the email without verifying its authenticity
C
Click the link and fill in the information
D
Contact the school’s IT department to verify the message’s legitimacy
Last Question
Next Question
An educator wants to prevent malware infections on classroom devices. Which strategy is most effective?
A
Allowing all file downloads without scanning
B
Using trusted security software and scanning downloads before opening
C
Restricting updates to avoid potential system interruptions
D
Relying solely on the operating system’s default firewall
Last Question
Next Question
Which primary reason should teachers be familiar with regulations like FERPA (Family Educational Rights and Privacy Act) or similar data privacy laws?
A
To sell student information to educational marketers
B
To ensure compliance when sharing or storing student records
C
To allow public posting of student grades without permission
D
To reduce classroom workload by removing confidentiality requirements
Last Question
Next Question
Mr. Chan needs to store sensitive student information digitally. He’s choosing between a password-protected spreadsheet on his personal laptop and the school’s encrypted cloud platform. Which approach best protects student data?
A
Personal laptop spreadsheet with an easy password, for convenience
B
School’s encrypted cloud platform, following district guidelines
C
Printing all data and keeping it on his desk for quick access
D
Storing data on multiple flash drives labeled “Student Info”
Last Question
Next Question
If a teacher suspects a data breach has exposed student information, which step is most appropriate?
A
Attempt to fix the problem alone without notifying anyone
B
Inform the IT department and follow the school’s data breach protocol
C
Ignore it if only a few students are affected
D
Move all student data to an unsecured personal account
Last Question
Next Question
When teaching cyber etiquette to students, which principle should most strongly be emphasized?
A
Maintaining anonymity to be free of responsibility
B
Using digital platforms to vent frustrations without consequences
C
Communicating respectfully and responsibly, just as in face-to-face interaction
D
Excluding peers with different opinions from online discussions
Last Question
Next Question
A high school student makes inappropriate comments on a class discussion board. Which action best models appropriate cyber etiquette as a teacher’s response?
A
Publicly shaming the student to discourage others
B
Deleting the entire discussion without explanation
C
Contacting the student privately to discuss respectful communication and setting clear guidelines
D
Ignoring the behavior to avoid confrontation
Last Question
Next Question
An educator wants to integrate all three concepts—safe digital practices, protecting student data, and cyber etiquette—into a single lesson plan. Which classroom activity best meets this goal?
A
Demonstrating how to download apps from unverified sites
B
Walking students through privacy settings, discussing respectful online communication, and showing how to identify phishing emails
C
Asking students to share personal details to test data security
D
Assigning a worksheet about the history of computers
Last Question
Next Question
Which policy most effectively promotes a secure and respectful digital environment for a school?
A
Requiring students to share passwords for easy IT checks
B
Allowing anyone to install software on school devices
C
Mandating strong passwords, regular training on data privacy, and clear guidelines on online conduct
D
Limiting technology to a single, outdated computer per classroom
Last Question
Submit