Digital Citizenship And Safety Course Answers 2022


Digital Citizenship And Safety Course Answers 2022: This preparation is led by Google through Skillshop which tests the comprehension of how you can establish a protected climate for understudies on the web. It contains 5 units and there are 5 unit audits which implies one assessment for each course unit.

Digital Citizenship And Safety Course Answers 2022



Digital Citizenship And Safety Course Questions and Answers 2022


There are several units that train you how to assist understudies with protecting their digital data, how to utilize safe pursuit, how to guard your online standing, and so forth.

Digital Citizenship And Safety Certification Answers 


This exam comprises of an aggregate of 25 questions and you have limitless chance to finish the exam. The declaration is legitimate for a time of a year and on the off chance that you fail in your first attempt, you can retake the exam following 24 hours.

Digital Citizenship And Safety Certification Exam Answers

Exam Name – Google for Education Teacher Center Digital Citizenship and Safety Course Unit Review

Total Questions and Passing Score – 25 Questions and Passing Score is 80%


Google for Education Digital Citizenship and Safety Course Quiz Questions Answers

Q.1 – What guidelines can you teach your students to create a strong password?

  • (A) Use complex and extremely long numeric series
  • (B) Use a combination of letters, symbols and numbers, and make it 8-9 characters long
  • (C) Use random letters and numbers
  • (D) Use a difficult word from the dictionary

Q.2 – Now that you are a password expert, choose the strongest password from this list:

  • (A) Football123
  • (B) ImA@SF#11
  • (C) uhuo$
  • (D) 25041990

Q.3 – Strong passwords can be difficult to remember—what can you teach your students to make them easier to remember? (Check all that apply)

  • (A) Use a password manager
  • (B) Write down your passwords on a piece of paper and store it in a safe place
  • (C) Send yourself an email with your login information
  • (D) Create a passphrase

Q.4 – When choosing a new password, what’s the best advice you can give your students?

  • (A) Add a number or special character at the end of your old password
  • (B) Pick something easy to remember such as your birthday or pet’s name
  • (C) Choose the next consecutive number from your old password
  • (D) Create a new and different passphrase that is easy for you to remember

Q.5 – What is two-factor authentication? (Check all that apply)

  • (A) An extra layer of security for your account
  • (B) A security method that requires two steps to log into your account
  • (C) An encryption method
  • (D) A service to store and share passwords safely

Unit 2 Review Answers

Q.1 – Which of the following actions can help your students protect their mobile devices? Check all that apply:

  • (A) Lock the screen with a strong PIN or pattern
  • (B) Install system updates when available
  • (C) Click on websites that tell you that your phone is infected
  • (D) Never connect to a Wi-Fi network outside your home

Q.2 – What advice can you give your students to AVOID unwanted or potentially dangerous downloads? Check all that apply:

  • (A) Download from reputable sources, like the official app store on their phone
  • (B) Check the size of the file that they want to download
  • (C) Check the reviews and comments from other users before downloading an app
  • (D) Do not click on ads or websites that claim that the phone is infected

Q.3 – What would you tell your students NOT to do when connected to a public WiFi network?

  • (A) Enter username and password, for example, to log into email or social network accounts
  • (B) Online banking
  • (C) Enter credit card details
  • (D) All of these

Q.4 – What’s the risk of entering or sending personal information when connected to a network they do not know or trust?

  • (A) Nothing can go wrong
  • (B) Personal information can be intercepted

Q.5 – When is it important for your students to remember to log out of their account?

  • (A) After using a public computer at the library
  • (B) After borrowing someone else’s device, e.g., a friend’s tablet
  • (C) After using a public WiFi network
  • (D) All of these

Unit 3 Review Answers

Q.1 – What should students look for on a website to help them decide if the information is reliable?

  • (A) Author’s name
  • (B) Publication date
  • (C) Author’s qualifications
  • (D) All of these

Q.2 – It’s important to teach students to contrast at least 3 sources of information when reading about:

  • (A) Today’s news and recent world events
  • (B) Historical events
  • (C) Health-related information
  • (D) All types of information, regardless of topic

Q.3 – Choose the statement that best reflects how to identify dubious sources of information:

  • (A) Dubious information is generally hosted on suspicious-looking sites
  • (B) If you can find the author’s name, the information is likely to be reliable
  • (C) Ask where, who, what, when questions and contrast at least 3 sources of information
  • (D) Find the date of publication and trust only the latest information

Q.4 – If one of your students finds an anonymous article online that they wish to quote in an essay, what would you advise them to do?

  • (A) Contrast the information with additional sources by qualified authors, determine if it’s reliable, and quote the qualified authors
  • (B) Quote the anonymous article without contrasting the information, but make it clear that it came from an “anonymous” or “unknown” author
  • (C) Immediately conclude that the article contains dubious information

Q.5 – If you notice that your students rely heavily on a single source of information, how might you go about encouraging them to be critical thinkers?

  • (A) Ask them to no longer use that source of information
  • (B) Ask them to check a minimum of 3 sources of information, including an opposing viewpoint
  • (C) Make sure that the single source of information they use is legitimate

Unit 4 Review Answers

Q.1 – What is social engineering?

  • (A) Content that tricks you into revealing personal information, like your password or credit card number
  • (B) The correct use of social networks

Q.2 – What are some common tactics that scammers use to steal personal information?

  • (A) Create a sense of urgency, asking you to act quickly before something bad happens or before you miss out on a special deal
  • (B) Create websites that look like sites you already use
  • (C) Fake the “From” address in an email to make it look like it’s from someone you know
  • (D) All of these

Q.3 – What does the “s” in https indicate?

  • (A) That the connection is encrypted and secure
  • (B) That the connection isn’t secure

Q.4 – Can a website or an ad detect if your computer is infected?

  • (A) Yes
  • (B) No

Q.5 – What should you advise your students to do if they receive a suspicious email from an email provider or company?

  • (A) Click the reply button and request more information
  • (B) Open a new window, type in the official website of the email provider or company, and find the contact email address
  • (C) Forward email to someone you trust and ask for their opinion

Q.6 – Before entering personal information on a webpage, what checks would you recommend your students to perform?

  • (A) Check that the page’s URL starts with https
  • (B) Check that the page’s URL is preceded by a green padlock
  • (C) Check that the URL is correct
  • (D) All of these

Unit 5 Review Answers


Q.1 – What sort of information could you possibly gather from an image posted on social media? Check all that apply:

  • (A) Date and Time the photo was taken
  • (B) How old the person posting is
  • (C) Location the photo was taken
  • (D) Whether the person likes ice-cream

Q.2 – Looking through all of the photos posted on an individual’s social media account in the last two years, it seems most photos set in a kitchen were tagged with the same address. However, posts in the last few days show tourist attractions in a different country. What can someone with bad intentions infer from this profile? Check all that apply:

  • (A) How many siblings the person has
  • (B) Where the person possibly lives
  • (C) That the person is not home right now and the apartment might be vacant
  • (D) Where the person was born

Q.3 – One of your students discovers that some of his peers are making fun of a new student who joined class only last week. What can that student do to be an upstander? Check all that apply:

  • (A) Encourage other students to stand up against bullying, even if it is happening to others and not to themselves
  • (B) Let the students involved know that what they’re doing is hurtful and isn’t cool
  • (C) If necessary, let teachers and the parents of the new student know so that they can continue to monitor and support the student
  • (D) Wait for a week or two to see if the situation gets better before taking any action

Q.4 – What practical steps can you teach your students to protect their privacy while participating in online communities? Check all that apply:

  • (A) Avoid online communities altogether
  • (B) Ensure that they know how to set their privacy settings to a level they are comfortable with
  • (C) Intentionally set permissions on their posts so that only people they choose can view their posts
  • (D) Have a class discussion to help students set boundaries around what information they feel is private and shouldn’t be shared, and what information they are okay sharing, and with whom


This article gives every one of the answers nitty gritty clarification with the goal that you don't simply find the right solutions however you really comprehend the purpose for the answers. You can really take a look at the answers to any remaining Google for Education exams in our google certified educator level 1 fundamentals training answers and google certified educator level 2 exam answers.