MTEL Digital Literacy and Computer Science - Question List

Select how would you like to study

11.
Which of the following actions involving technology would most likely be considered unethical but not illegal?
  1. A hacker gains access to a company's network, copies personal financial data, and saves it on a hard drive for use at a later date.
  2. The owner of a website that sells nutritional supplements allows customers to freely purchase medications that require a prescription from a doctor in their regions.
  3. A theater teacher uses the school's network to send an email encouraging colleagues to attend an upcoming school fundraising performance.
  4. An Internet blogger with thousands of followers knowingly posts partial statistics and slanted evidence related to a regional environmental issue.
12.
The Children's Internet Protection Act (CIPA) requires that schools and libraries receiving E-Rate discounts have in place technologies to:
  1. Store usernames and passwords safely and securely.
  2. Prevent minors from viewing obscene or harmful material.
  3. Deny access to questionable website content to all users.
  4. Monitor and log minors' total Internet usage time.
13.
A digital literacy teacher plans to make a year-end video showcasing their fifth-grade class and the work students have done. One of the students in the class does not have a video/image release form on file with the school office. In which of the following ways can the student be represented in the class video without violating the Children's Online Privacy Protection Act (COPPA)?
  1. Video of the class that shows the student, but not their face.
  2. Images of work products captioned with the student's name.
  3. Anonymous video samples of the student's digital art.
  4. Audio interviews with the student in which they are not identified by name.
14.
During a lesson on cyberbullying prevention, an elementary teacher discusses characteristics of cyberbullying with students. Which of the following additional strategies would best promote positive and responsible digital citizenship skills among students in the context of this lesson?
  1. Illustrating for students strategies and techniques that will help them distinguish between real and cyber experiences in the same way that adults do.
  2. Familiarizing students with cyberbullying techniques, such as creating a fake persona or website to harass someone or hacking into someone's account and sharing private details and images.
  3. Posting on the school's website links to parental control and monitoring software and step-by-step protocols for preventing or blocking student access to social media accounts.
  4. Increasing students' knowledge of and empathy for the effects of cyberbullying, and emphasizing the necessity of not sharing, tolerating, or providing feedback to cyberbullying posts.
15.
Which of the following strategies would be most appropriate for student computer users who are interested in minimizing their passive digital footprint?
  1. Sharing only videos created by well-known influencers.
  2. Refraining from liking or sharing social media content.
  3. Ensuring that all online subscription services are set to be renewed manually.
  4. Avoiding posting photos of school events on the school's social media site.

Select how would you like to study