Lesson Assessment

Transcription

Lesson Assessment
SAFETY > RISKY ONLINE RELATIONSHIPS
Lesson Assessment
TEACHER VERSION
1. True or false: Most people who ask teens to talk about sexual things online are
older adults.
a) True
b) False
Answer feedback
The correct answer is b, False. It’s more typical that teens receive requests to talk about sexual
things online from other teens or from young adults than from older adults.
2. Mimi just signed up for online chat. How can she avoid getting into risky online chat
situations? Read the following choices and then select the best answer.
a) Avoid chat during evening and night
b) Tell others she meets online that she is older than she actually is
c) Avoid flirting with people online
d) Tell others she meets online that she is already in a relationship
Answer feedback
The correct answer is c. People who flirt online, especially with strangers, are more likely to deal
with unwanted or risky contact.
3. Dana is chatting with someone she only knows online. She starts to feel
uncomfortable about what they’re talking about. Which actions could Dana take
to make the situation better? Circle all that apply.
a) Stop talking to the person altogether
b) Ask a friend to talk to the person and pretend to be her
c) Don’t do anything
d) Log off of chat for a while
e) Keep talking with the person anyway
f) Change the subject
g) Block the user name
Answer feedback
The correct answers are a, d, f, and g. If you feel uncomfortable while chatting online, you can try
to take the conversation in a new direction. If that doesn’t work, you can always stop typing and log
off of chat, or block that person.
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
SAFETY > RISKY ONLINE RELATIONSHIPS
Lesson Assessment
Name
STUDENT VERSION
Class
Date
1. True or false: Most people who ask teens to talk about sexual things online are
older adults.
a) True
b) False
2. Mimi just signed up for online chat. How can she avoid getting into risky online chat
situations? Read the following choices and then select the best answer.
a) Avoid chat during evening and night
b) Tell others she meets online that she is older than she actually is
c) Avoid flirting with people online
d) Tell others she meets online that she is already in a relationship
3. Dana is chatting with someone she only knows online. She starts to feel
uncomfortable about what they’re talking about. Which actions could Dana take
to make the situation better? Circle all that apply.
a) Stop talking to the person altogether
b) Ask a friend to talk to the person and pretend to be her
c) Don’t do anything
d) Log off of chat for a while
e) Keep talking with the person anyway
f) Change the subject
g) Block the user name
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
SECURITY > SCAMS AND SCHEMES
Lesson Assessment
TEACHER VERSION
1. A type of crime in which your private information is stolen and used for criminal
activity is called:
a) Identification
b) Identity theft
c) Burglary
Answer feedback
The correct answer is b. You can help protect yourself from identity theft by watching out for online
offers designed to trick you, and by guarding your private information.
2. Evan sees the following message in his inbox:
Dear Sir,
I’m writing to you because my company has identified you as the kind of person we’d
like to have on our team. Your records show that you are an outstanding individual who
seeks adventure. This is just the kind of person we are looking for.
If you become a member of our team, I can guarantee you a pay raise within the first six
months. To get started, I need some basic information from you:
• your date of birth
• your home address
Thank you,
Mr. Urban Reynolds, Jr.
Which of the following is NOT a warning sign that this message is a scam:
a) The offer sounds too good to be true
b) It asks Evan for his private information
c) Evan is addressed as “Sir”
Answer feedback
The correct answer is c. Offers that seem too good to be true or that ask for private information may
be scams. These kinds of messages should be marked as spam and deleted.
3. Sara finds a message on her phone that she thinks might be a scam. She should:
a) Forward the message to her friends to see if they think it’s a scam too
b) Reply and ask the sender not to send more mail
c) Delete the message
Answer feedback
The correct answer is c. If Sara thinks the message might be a scam, she should delete it.
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
SECURITY > SCAMS AND SCHEMES
Lesson Assessment
Name
STUDENT VERSION
Class
Date
1. A type of crime in which your private information is stolen and used for criminal
activity is called:
a) Identification
b) Identity theft
c) Burglary
2. Evan sees the following message in his inbox:
Dear Sir,
I’m writing to you because my company has identified you as the kind of person we’d
like to have on our team. Your records show that you are an outstanding individual who
seeks adventure. This is just the kind of person we are looking for.
If you become a member of our team, I can guarantee you a pay raise within the first six
months. To get started, I need some basic information from you:
• your date of birth
• your home address
Thank you,
Mr. Urban Reynolds, Jr.
Which of the following is NOT a warning sign that this message is a scam:
a) The offer sounds too good to be true
b) It asks Evan for his private information
c) Evan is addressed as “Sir”
3. Sara finds a message on her phone that she thinks might be a scam. She should:
a) Forward the message to her friends to see if they think it’s a scam too
b) Reply and ask the sender not to send more mail
c) Delete the message
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
SECURITY > DOES IT MATTER WHO HAS YOUR DATA?
Lesson Assessment
TEACHER VERSION
1. What kinds of information do companies collect about you when you go online?
a) Your likes and dislikes
b) Where you live
c) Products you look at or buy online
d) Subjects or activities that interest you
e) All of the above
Answer feedback
The correct answer is e. Companies store all kinds of information about you so they can recommend
more products that you may want to buy.
2. True or false: The information you enter about yourself online, or the ads that you
click on, can affect the results you get when you do an online search.
a) True
b) False
Answer feedback
The correct answer is a, True. Companies may use the data you enter online to offer search results
they think are most relevant to you.
3. Jana is searching for books online. She wants to make sure that she protects
her private information, such as her address, when she searches for and buys the
books. Jana could:
a) Email the online companies she is thinking about buying from to ask them not to use
her private information
b) Only buy books from sites that her friends buy books from
c) Read the sites’ privacy policies before she gives out information
Answer feedback
The correct answer is c. Jana can find out about how a company plans to use her information
by reading its privacy policy. Then she can decide which sites she feels comfortable giving her
information to, before she searches for and buys books from them.
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
SECURITY > DOES IT MATTER WHO HAS YOUR DATA?
Lesson Assessment
Name
STUDENT VERSION
Class
Date
1. What kinds of information do companies collect about you when you go online?
a) Your likes and dislikes
b) Where you live
c) Products you look at or buy online
d) Subjects or activities that interest you
e) All of the above
2. True or false: The information you enter about yourself online, or the ads that you
click on, can affect the results you get when you do an online search.
a) True
b) False
3. Jana is searching for books online. She wants to make sure that she protects
her private information, such as her address, when she searches for and buys the
books. Jana could:
a) Email the online companies she is thinking about buying from to ask them not to use
her private information
b) Only buy books from sites that her friends buy books from
c) Read the sites’ privacy policies before she gives out information
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
DIGITAL LIFE > DIGITAL LIFE 102
Lesson Assessment
TEACHER VERSION
1. Using the chart below, show whether the following sentences are an upside
(positive) or downside (negative) of media life.
Answer feedback
Upside
Downside
b) You can stay in touch with friends easily
a) Private information can be copied and
sent to anyone
c) Many fun things online are also free
f) You can look up information quickly
d) You may spend less time with others face
to face
e) Anything you do online leaves a
permanent record
2. What does digital citizenship mean?
a) Any information about you on the Internet
b) Using digital media safely, responsibly, and ethically
c) An online membership
d) Not giving credit to someone else’s work
Answer feedback
The correct answer is b. Digital citizenship means treating others respectfully online.
3. Which is an example of digital media?
a) Computers
b) Social network sites
c) Video games
d) All of the above
Answer feedback
The correct answer is d. Going online, working on the computer, talking and texting on cell phones,
and playing online games are all examples of using digital media.
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
DIGITAL LIFE > DIGITAL LIFE 102
Lesson Assessment
Name
STUDENT VERSION
Class
Date
1. Using the chart below, show whether the following sentences are an upside
(positive) or downside (negative) of media life.
Upside
Downside
a) Private information can be copied and sent to anyone
b) You can stay in touch with friends easily
c) Many fun things online are also free
d) You may spend less time with others face to face
e) Anything you do online leaves a permanent record
f) You can look up information quickly
2. What does digital citizenship mean?
a) Any information about you on the Internet
b) Using digital media safely, responsibly, and ethically
c) An online membership
d) Not giving credit to someone else’s work
3. Which is an example of digital media?
a) Computers
b) Social network sites
c) Video games
d) All of the above
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
DIGITAL LIFE > MY ONLINE CODE
Lesson Assessment
TEACHER VERSION
1. You learned that online ethics is a set of rules or ideas that guide your behavior.
Choose the answer below that is an example of online ethics.
a) Making sure your seatbelt is on
b) Working on a class project
c) Being in the first row of a concert
d) Asking your brother before posting a funny photo of him online
Answer feedback
The correct answer is d. This is an example of online ethics because it demonstrates acting responsibly to another person, while online.
2. Which of the following behaviors is not ethical?
a) Searching for information online
b) Giving a friend credit for using their song in a video that you created
c) Posting a mean message online about a classmate
d) Asking your friend before you post a picture of her
Answer feedback
The correct answer is c. It is hurtful and unethical to post mean messages.
3. Tommy has not been in school for the past few days and his classmate, Sam,
thinks this is unfair. Sam posts the following message on his social networking
page: “Tommy S. thinks he’s special and doesn’t have to go to class.”
True or false: Sam’s post is irresponsible.
a) True
b) False Answer feedback
The correct answer is a. True. Sam should not have posted the message publicly because other people may make untrue assumptions about where Tommy is and about his character. DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE
© 2011 www.commonsense.org
1
DIGITAL LIFE > MY ONLINE CODE
Lesson Assessment
Name
STUDENT VERSION
Class
Date
1. You learned that online ethics is a set of rules or ideas that guide your behavior.
Choose the answer below that is an example of online ethics.
a) Making sure your seatbelt is on
b) Working on a class project
c) Being in the first row of a concert
d) Asking your brother before posting a funny photo of him online
2. Which of the following behaviors is not ethical?
a) Searching for information online
b) Giving a friend credit for using their song in a video that you created
c) Posting a mean message online about a classmate
d) Asking your friend before you post a picture of her
3. Tommy has not been in school for the past few days and his classmate, Sam,
thinks this is unfair. Sam posts the following message on his social networking
page: “Tommy S. thinks he’s special and doesn’t have to go to class.”
True or false: Sam’s post is irresponsible.
a) True
b) False
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
PRIVACY AND DIGITAL FOOTPRINTS >
PRIVATE TODAY, PUBLIC TOMORROW
Lesson Assessment
TEACHER VERSION
1. Before you post about someone else online, it’s important to:
a) Ask that person if it’s okay to post
b) Consider if you will upset anyone by posting
c) Think about who might see what you post
d) All of the above
Answer feedback
The correct answer is d. Before you post anything online, make sure you think about who might see
what you post and how that could affect the person you’ve posted about.
2. Read the following online post by Elliot. Then underline three phrases that could
negatively impact Elliot or his friend Brian’s reputation.
Answer feedback
There are more than three correct answers. Possible responses are listed below:
Thanks for all of the birthday wishes, everybody! It feels great to be 16.
This weekend was crazy. Brian and I went on a camping trip with my older bro and some of
his college friends. Brian said he knew about an awesome trail that was closed off to hikers.
A park ranger found us, but we just lied and said we were lost.
The best part about the weekend? Drinking beer with the boys at sunset. What a life.
Who wants to give Brian and me notes for the History test tomorrow? We didn’t have time
to study!
Peace,
Elliot
Elliot makes references to trespassing, lying, underage drinking, and not doing homework. Not only
are these things wrong to do, but that they could harm his reputation and Brian’s as well. Elliot
should remove these references from his post to keep his online image positive.
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
PRIVACY AND DIGITAL FOOTPRINTS >
PRIVATE TODAY, PUBLIC TOMORROW
Lesson Assessment
TEACHER VERSION
3. Look at the possible captions for this photo in the chart below. Circle the captions
that make this photo okay to post, and mark an “X” over the captions that would
make this photo inappropriate to post.
“Best
concert
ever!”
“We got so
hammered
this night!”
“Man, you can’t
even tell we drank
before the concert!”
“You guys
look great in
this photo!”
Answer feedback
It’s important to remember that the context you provide when you post something online, like a
caption or a comment, can make a difference in the way others see your post. Before you post
something, think about how you are representing yourself and others. Ask yourself if your post
could harm or embarrass you or anyone else.
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
2
PRIVACY AND DIGITAL FOOTPRINTS >
PRIVATE TODAY, PUBLIC TOMORROW
Lesson Assessment
Name
STUDENT VERSION
Class
Date
1. Before you post about someone else online, it’s important to:
a) Ask that person if it’s okay to post
b) Consider if you will upset anyone by posting
c) Think about who might see what you post
d) All of the above
2. Read the following online post by Elliot. Then underline three phrases that could
negatively impact Elliot or his friend Brian’s reputation.
Thanks for all of the birthday wishes, everybody! It feels great to be 16.
This weekend was crazy. Brian and I went on a camping trip with my older bro and some of
his college friends. Brian said he knew about an awesome trail that was closed off to hikers.
A park ranger found us, but we just lied and said we were lost.
The best part about the weekend? Drinking beer with the boys at sunset. What a life.
Who wants to give Brian and me notes for the History test tomorrow? We didn’t have time
to study!
Peace,
Elliot
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
PRIVACY AND DIGITAL FOOTPRINTS >
PRIVATE TODAY, PUBLIC TOMORROW
Lesson Assessment
STUDENT VERSION
3. Look at the possible captions for this photo in the chart below. Circle the captions
that make this photo okay to post, and mark an “X” over the captions that would
make this photo inappropriate to post.
“Best
concert
ever!”
“We got so
hammered
this night!”
“Man, you can’t
even tell we drank
before the concert!”
“You guys
look great in
this photo!”
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
2
PRIVACY AND DIGITAL FOOTPRINT > COLLEGE BOUND
Lesson Assessment
TEACHER VERSION
1. Your digital footprint is all of the information about you:
a) that can be found online, posted by you or by others
b) that can be found online, posted only by you
c) in the text messages that you send
d) in the emails that you send to your friends
Answer feedback
The correct answer is a. Your digital footprint is all of the information about you that can be found
online, posted by you or by others. Your digital footprint can help or hurt your image.
2. Look at Anna’s social network profile below. Find three things on the profile that
shouldn’t be there and mark them with an “x”.
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
PRIVACY AND DIGITAL FOOTPRINT > COLLEGE BOUND
Lesson Assessment
TEACHER VERSION
Answer feedback
Anna posts several references to partying, which might create a negative image for college admissions
officers, family, or people at work. Anna also makes a comment about a friend that makes both Anna
and her friend look bad. Anna should remove all of these things to improve her online image.
3. True or False: Only things that you post about yourself affect your online image.
Posts about you by other people don’t matter.
a) True
b) False
Answer feedback
The correct answer is b. False. A person’s entire digital footprint is part of their online image. This
is why it’s important to show positive things about yourself and others when you post online.
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
2
PRIVACY AND DIGITAL FOOTPRINTS > COLLEGE BOUND
Lesson Assessment
Name
STUDENT VERSION
Class
Date
1. Your digital footprint is all of the information about you:
a) that can be found online, posted by you or by others
b) that can be found online, posted only by you
c) in the text messages that you send
d) in the emails that you send to your friends
2. Look at Anna’s social network profile below. Find three things on the profile that
shouldn’t be there and mark them with an “x”.
3. True or False: Only things that you post about yourself affect your online image.
Posts about you by other people don’t matter.
a) True
b) False
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
CONNECTED CULTURE >
TURN DOWN THE DIAL ON CYBERBULLYING AND ONLINE CRUELTY
Lesson Assessment
TEACHER VERSION
1. Reflect on each of these statements about the Internet. Circle three statements that support
the idea that the Internet makes bullying easier and a bigger problem.
a) Information can spread very quickly on
the Internet.
d) Anything someone says could stay on
the Internet for a long time.
b) If you say something mean online, you don’t
have to worry about getting in a physical fight.
e) You can get support from groups on
the Internet
c) You can find lots of information on
the Internet.
f) Parents, teachers, and students all use
the Internet.
Answer feedback
The correct answers are a, b, and d. Bullying and online cruelty can be intensified online
because information on the Internet can be anonymous, public, and can last a long time.
2. Mei keeps getting mean comments on her Twitter posts. Cara, Mei’s good friend,
has seen the comments and wants to help. What can both girls do to make the
situation better?
a) Mei could delete her Twitter account. Cara could let Mei use her Twitter account so that Mei
can still post, but no one knows it’s her.
b) Mei could ignore and block the bully. Cara could comfort Mei.
c) Mei could tell the bully to back off, and Cara could post mean things about the bully on Twitter.
d) Mei could tell the bully to back off, and Cara could get a group of friends to post embarrassing
photos of the bully.
Answer feedback
The correct answer is b. Oftentimes bullies want attention, so it’s best to ignore them. The best
thing for Mei to do is to block and ignore the bully, and the best thing for Cara to do is to offer
support and comfort to her friend.
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
CONNECTED CULTURE >
TURN DOWN THE DIAL ON CYBERBULLYING AND ONLINE CRUELTY
Lesson Assessment
TEACHER VERSION
3. A(n) ____________ helps to de-escalate, or lessen the impact of online cruelty by
supporting and standing up for the person who is bullied.
a) bystander
b) upstander
c) target
d) offender
Answer feedback
The correct answer is b. An upstander does something to help or support the target of bullying.
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
2
CONNECTED CULTURE >
TURN DOWN THE DIAL ON CYBERBULLYING AND ONLINE CRUELTY
Lesson Assessment
Name
STUDENT VERSION
Class
Date
1. Reflect on each of these statements about the Internet. Circle three statements that support
the idea that the Internet makes bullying easier and a bigger problem.
a) Information can spread very quickly on
the Internet.
d) Anything someone says could stay on
the Internet for a long time.
b) If you say something mean online, you don’t
have to worry about getting in a physical fight.
e) You can get support from groups on
the Internet
c) You can find lots of information on
the Internet.
f) Parents, teachers, and students all use
the Internet.
2.Mei keeps getting mean comments on her Twitter posts. Cara, Mei’s good friend,
has seen the comments and wants to help. What can both girls do to make the
situation better?
a) Mei could delete her Twitter account. Cara could let Mei use her Twitter account so that Mei
can still post, but no one knows it’s her.
b) Mei could ignore and block the bully. Cara could comfort Mei.
c) Mei could tell the bully to back off, and Cara could post mean things about the bully on Twitter.
d) Mei could tell the bully to back off, and Cara could get a group of friends to post embarrassing
photos of the bully.
3. A(n) ____________ helps to de-escalate, or lessen the impact of online cruelty by
supporting and standing up for the person who is bullied.
a) bystander
b) upstander
c) target
d) offender
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
CONNECTED CULTURE > BUILDING COMMUNITY ONLINE
Lesson Assessment
TEACHER VERSION
1. How is a positive community built, and how can it break down? Read each example below
and circle whether it!s a “community builder” or a “community breaker.” The first one is
done for you.
Community members are mean
or disrespectful
Community Builder
Community Breaker
Community members help everyone
feel welcome
Community Builder
Community Breaker
Community members don!t like to participate
in activities
Community Builder
Community Breaker
Community members have lots of options
for getting involved
Community Builder
Community Breaker
Community members feel they can share
their interests
Community Builder
Community Breaker
There is little opportunity for members! input
Community Builder
Community Breaker
2. Complete the following sentence.
______________ media are online communications that promote user interaction,
feedback, and content sharing.
!"#$%&'(%%)*+,!"#$%&''#%($)*+,#'$-+$.!"#$%&/0$1&%-)2$3#4-)$)22&,$5+#'+$(&$%&**#%($&*2-*#/
3. What do all social media sites have in common?
)6$!"#7$)22$#*8)8#$5+#'+$,-("$95*$&'$-*(#'#+(-*8$9#)(5'#+
:6$!"#7$'#,)'4$("#$3&+($;&;52)'$5+#'+$,-("$9'##$<*(#'*#($)%%#++
%6$!"#7$#*%&5')8#$;#&;2#$(&$;)'(-%-;)(#
'()*"+,)%)%-')#
!"#$%&'(%%)*+,!"#$%&''#%($)*+,#'$-+$'/$=22$+&%-)2$3#4-)$+-(#+$#*8)8#$5+#'+$,-("$95*$)*4$-*(#'#+(-*8$9#)(5'#+$)*4$
#*%&5')8#$;#&;2#$(&$;)'(-%-;)(#/$!"-*>$):&5($7&5'$9)?&'-(#$+&%-)2$3#4-)$+-(#/$@&524$7&5$+(-22$,)*($(&$
+;#*4$(-3#$&*$("#$+-(#$-9$7&5$,#'#*A($-*(#'#+(#4$-*$,")($7&5$%&524$4&$&*$-(B
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE
© 2011 www.commonsense.org
1
CONNECTED CULTURE > BUILDING COMMUNITY ONLINE
Lesson Assessment
Name
STUDENT VERSION
Class
Date
1. How is a positive community built, and how can it break down? Read each example below
and circle whether it’s a “community builder” or a “community breaker.” The first one is
done for you.
Community members are mean
or disrespectful
Community Builder Community Breaker
Community members help everyone
feel welcome
Community Builder Community Breaker
Community members don’t like to participate
in activities
Community Builder Community Breaker
Community members have lots of options
for getting involved
Community Builder Community Breaker
Community members feel they can share
their interests
Community Builder Community Breaker
There is little opportunity for members’ input
Community Builder Community Breaker
2. Complete the following sentence.
______________ media are online communications that promote user interaction,
feedback, and content sharing.
3. What do all social media sites have in common?
a) They all engage users with fun or interesting features
b) They reward the most popular users with free Internet access
c) They encourage people to participate
d) Both a and c
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
CONNECTED CULTURE >
OVEREXPOSED: SEXTING AND RELATIONSHIPS
Lesson Assessment
TEACHER VERSION
1. The word “sexting” has to do with sharing a specific kind of content. Sexting is:
a) Getting a text that says you look nice
b) Sending or receiving a text about going on a date
c) Sharing any photos by text message
d) Sending or receiving sexually explicit photos or videos by text message or other
digital media
Answer feedback
The correct answer is d. The term “sexting” describes sexually explicit photos or videos sent by
phone or by other digital media (social networking sites, email, IM, etc.)
2. Sexting by minors, or kids under age 18, is illegal in some states.
a) True
b) False
Answer feedback
The correct answer is a. True. Many states have laws that don’t allow the sending or receiving of
sexual images by minors.
3. Read the following situations below and circle whether they are risky or safe uses of
digital media in romantic relationships.
Hector sends his cell phone number to his crush in a private message
on Facebook.
Risky
Safe
Adam asks his girlfriend to say sexually explicit things in an IM
conversation.
Risky
Safe
Monica surprises her crush by taking off some of her clothes during a
video chat.
Risky
Safe
Ariel’s boyfriend wants her to send him a naked photo. She texts him:
“Only if you text me one first.”
Risky
Safe
Cristina texts her boyfriend a picture of her at the Great Wall of China.
Risky
Safe
Jack tweets “I have the best girlfriend ever!”
Risky
Safe
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
CONNECTED CULTURE >
OVEREXPOSED: SEXTING AND RELATIONSHIPS
Lesson Assessment
Name
STUDENT VERSION
Class
Date
1. The word “sexting” has to do with sharing a specific kind of content. Sexting is:
a) Getting a text that says you look nice
b) Sending or receiving a text about going on a date
c) Sharing any photos by text message
d) Sending or receiving sexually explicit photos or videos by text message or other
digital media
2. Sexting by minors, or kids under age 18, is illegal in some states.
a) True
b) False
3. Read the following situations below and circle whether they are risky or safe uses of
digital media in romantic relationships.
Hector sends his cell phone number to his crush in a private message
on Facebook.
Risky
Safe
Adam asks his girlfriend to say sexually explicit things in an IM
conversation.
Risky
Safe
Monica surprises her crush by taking off some of her clothes during a
video chat.
Risky
Safe
Ariel’s boyfriend wants her to send him a naked photo. She texts him:
“Only if you text me one first.”
Risky
Safe
Cristina texts her boyfriend a picture of her at the Great Wall of China.
Risky
Safe
Jack tweets “I have the best girlfriend ever!”
Risky
Safe
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
CONNECTED CULTURE >
TAKING PERSPECTIVES ON CYBERBULLYING
Lesson Assessment
TEACHER VERSION
1. Someone’s “perspective” is their outlook, based on their thoughts, feelings, experiences,
and background. What is another way to say “perspective”?
a) Point of view
b) Stereotype
c) Morals
d) Race
Answer feedback
The correct answer is a. Understanding that everyone has a different point of view, or perspective,
might help explain why they act the way they do.
2. Read the following story. Then use the chart to label the role that each person plays.
Raul is captain of the hockey team. His girlfriend dumps him and starts dating his
teammate, Nick. Raul feels that Nick “stole” his girlfriend, and decides to get back
at him. Raul starts a website where he uploads photos of Nick that show him spraypainting a park bench, which is illegal. Soon, everybody at school knows about
Raul’s website. Raul’s teammate, Andrew, tells him that he should take it down
because it’s bad for Nick and the whole team.
Answer feedback
Who is the target?
Who is the upstander?
Who is the offender?
b) Nick
c) Andrew
a) Raul
3. Read the following scenario and then choose the best answer.
Avery and Alannah were competing for the last spot on the soccer team. On the final
day of tryouts, Avery stole Alannah’s cleats so she couldn’t play. Avery ended up
getting picked for the team. To get back at Avery, Alannah started a webpage dedicated
to hurting Avery.
True or false: This is NOT an example of cyberbullying.
a) True
b) False
Answer feedback
The correct answer is b, False. It is never okay to use the Internet to intentionally hurt someone. If
someone upsets you, “getting back at them” will only make the situation worse.
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
CONNECTED CULTURE >
TAKING PERSPECTIVES ON CYBERBULLYING
Lesson Assessment
Name
STUDENT VERSION
Class
Date
1. Someone’s “perspective” is their outlook, based on their thoughts, feelings, experiences,
and background. What is another way to say “perspective”?
a) Point of view
b) Stereotype
c) Morals
d) Race
2. Read the following story. Then use the chart to label the role that each person plays.
Raul is captain of the hockey team. His girlfriend dumps him and starts dating his
teammate, Nick. Raul feels that Nick “stole” his girlfriend, and decides to get back
at him. Raul starts a website where he uploads photos of Nick that show him spraypainting a park bench, which is illegal. Soon, everybody at school knows about
Raul’s website. Raul’s teammate, Andrew, tells him that he should take it down
because it’s bad for Nick and the whole team.
Who is the target?
Who is the upstander?
Who is the offender?
3. Read the following scenario and then choose the best answer.
Avery and Alannah were competing for the last spot on the soccer team. On the final
day of tryouts, Avery stole Alannah’s cleats so she couldn’t play. Avery ended up
getting picked for the team. To get back at Avery, Alannah started a webpage dedicated
to hurting Avery.
True or false: This is NOT an example of cyberbullying.
a) True
b) False
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
CONNECTED CULTURE > BREAKING DOWN HATE SPEECH
Lesson Assessment
TEACHER VERSION
1. Vinny and Katie are lab partners. After school, Katie sees that Vinny posted the
following message on his friend’s social network profile: “So my lab results with
KT are a mess. Dumb blonde. Don’t girls know they suck at science?”
This type of negative comment is an example of ___________. The comment is
based on ______________ about girls.
a) a compliment / an assumption
b) hate speech / a stereotype
c) hate speech / a compliment
d) mediation / a stereotype
Answer feedback
The correct answer is b. This type of negative comment is an example of hate speech. The comment
is based on a stereotype about girls.
2. Read the following sentence. Then answer the question below:
Rachel directs negative comments at Jorge online in a chat room that many would
consider hate speech.
True or false: Jorge is the only person affected by Rachel’s comments.
a) True. Jorge is the only person affected by Rachel’s comments because the other people in the chat
room know the comment was meant for Jorge only.
b) True. Jorge is the only person affected by Rachel’s comments because Rachel only chats with Jorge.
c) False. Jorge and other people in the chat room who are like him are affected by Rachel’s comments.
d) False. Everyone in the chat room is affected by Rachel’s comments.
Answer feedback
The correct answer is d. Everyone in the chat room is affected by Rachel’s comments. Hate speech
changes the way people feel. It can make people who aren’t part of the conversation feel scared,
trapped, or threatened.
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
CONNECTED CULTURE > BREAKING DOWN HATE SPEECH
Lesson Assessment
TEACHER VERSION
3. The following chart lists several places online where you might encounter hate
speech. Using the answers below, write the actions you might take if you encountered
hate speech in these places.
You can write a letter more than once.
Online chat forum
YouTube
Twitter
Facebook
a, c, d
a, b, c
a, c, d
a, b, c, d
a) Post a link to educational resources
b) Flag inappropriate videos
c) Make a comment that reaches out to large bodies of people
d) Make counterpoint comments
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
2
CONNECTED CULTURE > BREAKING DOWN HATE SPEECH
Lesson Assessment
Name
STUDENT VERSION
Class
Date
1. Vinny and Katie are lab partners. After school, Katie sees that Vinny posted the
following message on his friend’s social network profile: “So my lab results with
KT are a mess. Dumb blonde. Don’t girls know they suck at science?”
This type of negative comment is an example of ___________. The comment is
based on ______________ about girls.
a) a compliment / an assumption
b) hate speech / a stereotype
c) hate speech / a compliment
d) mediation / a stereotype
2. Read the following sentence. Then answer the question below:
Rachel directs negative comments at Jorge online in a chat room that many would
consider hate speech.
True or false: Jorge is the only person affected by Rachel’s comments.
a) True. Jorge is the only person affected by Rachel’s comments because the other people in the chat
room know the comment was meant for Jorge only.
b) True. Jorge is the only person affected by Rachel’s comments because Rachel only chats with Jorge.
c) False. Jorge and other people in the chat room who are like him are affected by Rachel’s comments.
d) False. Everyone in the chat room is affected by Rachel’s comments.
3. The following chart lists several places online where you might encounter hate
speech. Using the answers below, write the actions you might take if you encountered You can write a letter more than once.
Online chat forum
YouTube
Twitter
Facebook
a) Post a link to educational resources
b) Flag inappropriate videos
c) Make a comment that reaches out to large bodies of people
d) Make counterpoint comments
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
IDENTITY AND SELF-EXPRESSION > WHO ARE YOU ONLINE?
Lesson Assessment
TEACHER VERSION
1. __________________ means to show yourself to others as being a certain way or having
particular characteristics.
a) Represent
b) Inhibited
c) Anonymous
d) Label
Answer feedback
The correct answer is a. Represent means to show yourself as being a certain way. The way you
represent yourself online can be different than the way you represent yourself offline.
2. Offline, Tyrone is shy and gets made fun of at school. Online, Tyrone is outgoing and
feels popular. Why might Tyrone feel he can be outgoing and popular online when he
is shy and unpopular at school?
a) Tyrone has a funny screen name
b) Tyrone can’t see other people online, so he feels he can behave differently than he would offline
c) Tyrone has more time to plan what he says to people online
d) Both b and c
Answer feedback
The correct answer is d. Oftentimes people feel less shy online because they are not interacting with
others face to face.
3. What are some risks and some benefits to presenting yourself differently online than
you present yourself offline? Write the letter of each answer choice in the correct
part of the chart.
a) You might behave in ways that are unsafe or harmful to yourself
b) You might be able to try things out that you normally wouldn’t or couldn’t try
c) You can highlight or emphasize the parts of yourself that you feel good about
d) You might behave in ways that are disrespectful to others
Answer feedback
Risks
Benefits
a) You might behave in ways that are unsafe or
harmful to yourself
b) You might be able to try things out that you
normally wouldn’t or couldn’t try
d) You might behave in ways that are
disrespectful to others
c) You can highlight or emphasize the parts of
yourself that you feel good about
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
IDENTITY AND SELF-EXPRESSION > WHO ARE YOU ONLINE?
Lesson Assessment
Name
STUDENT VERSION
Class
Date
1. __________________ means to show yourself to others as being a certain way or having
particular characteristics.
a) Represent
b) Inhibited
c) Anonymous
d) Label
2. Offline, Tyrone is shy and gets made fun of at school. Online, Tyrone is outgoing and
feels popular. Why might Tyrone feel he can be outgoing and popular online when he
is shy and unpopular at school?
a) Tyrone has a funny screen name
b) Tyrone can’t see other people online, so he feels he can behave differently than he would offline
c) Tyrone has more time to plan what he says to people online
d) Both b and c
3. What are some risks and some benefits to presenting yourself differently online than
you present yourself offline? Write the letter of each answer choice in the correct
part of the chart.
a) You might behave in ways that are unsafe or harmful to yourself
b) You might be able to try things out that you normally wouldn’t or couldn’t try
c) You can highlight or emphasize the parts of yourself that you feel good about
d) You might behave in ways that are disrespectful to others
Risks
Benefits
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
RESPECTING CREATIVE WORK > COPYRIGHTS AND WRONGS
Lesson Assessment
TEACHER VERSION
1. Decide which kind of license is best for each student’s work. Write the letter of each
answer in the chart below.
Copyright
Creative Commons
Public Domain
a) An original song that
Janelle doesn’t want anyone
to copy or distribute
without her permission
b) A digital illustration that
Sasha wants credit for but
doesn’t mind if others use
without her permission
d) An article that Ryan finds
in a government database
c.) An original documentary
that Dom wants complete
ownership of in case the
documentary makes money
e) A collection of photos that
Artie wants credit for but
doesn’t care if others use
f) A photo that Marcus
wants others to share and
use however they want
for the purpose of creating
new artwork
a) An original song that Janelle doesn’t want anyone to copy or distribute without her permission
b) A digital illustration that Sasha wants credit for but doesn’t mind if others use without
her permission
c) An original documentary that Dom wants complete ownership of in case the documentary
makes money
d) An article that Ryan finds in a government database
e) A collection of photos that Artie wants credit for but doesn’t care if others use
f) A photo that Marcus wants others to share and use however they want for the purpose of creating
new artwork
Answer feedback
The students that want complete ownership of their creative works should choose to copyright their
works so others will have to ask permission to use those works. The students that want credit for
their works but don’t mind others using them without permission should choose a Creative Commons
license. The students that want to share their creative work so that others can adapt it for their own
purposes should choose the public domain.
2. Read the following scenario. Then answer the question below.
Lola takes a photo of the mountains near her home. She uploads the photo to the
Internet with “Copyright 2011 Lola Dominguez” next to the image. About a week
later, she checks one of her favorite blogs and sees that the blogger has posted her
photo on the blog and has posted a creative writing story to go with it.
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
RESPECTING CREATIVE WORK > COPYRIGHTS AND WRONGS
Lesson Assessment
TEACHER VERSION
True or false: If the blogger doesn’t ask Lola’s permission to use the photo but still
gives her credit, the blogger can post Lola’s photo with his story.
a) True. Copyright is pretty relaxed, so even though Lola put “Copyright” on her photo the blogger
can do what he wants.
b) False. When you copyright something, the only way that others can use the work without your
permission is if they change the original meaning of the work. Adding a story to the photo doesn’t
change the original photo, so the blogger can’t use it.
c) False. When you copyright something, others have to ask your permission before
using it.
d) True. Even though Lola put “Copyright” on her photo, the blogger doesn’t have to ask permission
because he posted his own original story to go with it.
Answer feedback
The correct answer is c. When you copyright something, others have to ask your permission to use
it no matter what, even if the person who uses your creative work wants to change the meaning of
your work. If the blogger does not have permission to post Lola’s photo with his story, he should not
post the photo at all.
3. What is the safest way to use someone else’s creative work, no matter what kind of
license it has (copyright, Creative Commons, etc.)?
a) Assume that it’s in the public domain and use it however you want
b) Give credit to the creator
c) Ask permission to use the work
d) Check who owns the work
Answer feedback
The correct answer is c. Asking permission to use someone else’s work is a great idea if you are
unsure about whether or not you can use the work for your own purposes. It’s also important to give
credit to the original creator, but if you don’t have permission to use another person’s work, giving
credit isn’t enough.
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
2
RESPECTING CREATIVE WORK > COPYRIGHTS AND WRONGS
Lesson Assessment
Name
STUDENT VERSION
Class
Date
1. Decide which kind of license is best for each student’s work. Write the letter of each
answer in the chart below.
Copyright
Creative Commons
Public Domain
a) An original song that Janelle doesn’t want anyone to copy or distribute without her permission
b) A digital illustration that Sasha wants credit for but doesn’t mind if others use without
her permission
c) An original documentary that Dom wants complete ownership of in case the documentary
makes money
d) An article that Ryan finds in a government database
e) A collection of photos that Artie wants credit for but doesn’t care if others use
f) A photo that Marcus wants others to share and use however they want for the purpose of creating
new artwork
2. Read the following scenario. Then answer the question below.
Lola takes a photo of the mountains near her home. She uploads the photo to the
Internet with “Copyright 2011 Lola Dominguez” next to the image. About a week
later, she checks one of her favorite blogs and sees that the blogger has posted her
photo on the blog and has posted a creative writing story to go with it.
True or false: If the blogger doesn’t ask Lola’s permission to use the photo but still
gives her credit, the blogger can post Lola’s photo with his story.
a) True. Copyright is pretty relaxed, so even though Lola put “Copyright” on her photo the blogger
can do what he wants.
b) False. When you copyright something, the only way that others can use the work without your
permission is if they change the original meaning of the work. Adding a story to the photo doesn’t
change the original photo, so the blogger can’t use it.
c) False. When you copyright something, others have to ask your permission before using it.
d) True. Even though Lola put “Copyright” on her photo, the blogger doesn’t have to ask permission
because he posted his own original story to go with it.
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
RESPECTING CREATIVE WORK > COPYRIGHTS AND WRONGS
Lesson Assessment
STUDENT VERSION
3. What is the safest way to use someone else’s creative work, no matter what kind of
license it has (copyright, Creative Commons, etc.)?
a) Assume that it’s in the public domain and use it however you want
b) Give credit to the creator
c) Ask permission to use the work
d) Check who owns the work
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
2
RESPECTING CREATIVE WORK >
RIGHTS, REMIXES, AND RESPECT
Lesson Assessment
TEACHER VERSION
1. _________________ is to use someone else’s creative work to make something new, often
without their permission.
a) Appropriation
b) Fair use
c) Copyright
d) Public domain
Answer feedback
The correct answer is a. Appropriation is to use someone else’s creative work to make something
new, often without their permission.
2. There is a difference between inspiration and appropriation. It is considered acceptable
to use others’ work for inspiration, but it is often considered unacceptable to use,
or appropriate, others’ work without their permission. Put the actions below in the
right category.
Inspiration
Appropriation
c) Writing a paper based on an article
you read
a) Using a song as the soundtrack to a video
you have made
b) Writing a song in the same style as your
favorite band, but with different notes
d) Adding someone else’s photos to your
social networking profile
Answer feedback
The difference between inspiration and appropriation is in how you use the original work. If you
change someone else’s work or idea to create something of your own, that’s using the work for
inspiration. If you use someone else’s work and simply add it to something you made (like using a
song as the soundtrack to a video), that’s considered appropriating the work without permission.
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
RESPECTING CREATIVE WORK >
RIGHTS, REMIXES, AND RESPECT
Lesson Assessment
TEACHER VERSION
3. Read the following scenario. Then answer the “true or false” question.
Top40 is a popular DJ who takes the first 10 seconds from the 40 most popular songs
on the radio each week and blends them together to create one long song. Top40
does not change the parts of the songs he uses, and he does not ask permission
from the original artists.
True or false: Top40 violates copyright law every time he uses a song from the radio
without asking permission.
a) True. If Top40 does not ask, then he does not have permission to use the songs.
b) False. Even though Top40 does not ask for permission, no one cares, so it isn’t a big deal.
c) False. Because what Top40 does helps the original artists, copyright law does not matter.
d) Both b and c
Answer feedback
The correct answer is a. Even though the artists don’t mind, Top40 breaks copyright law if he doesn’t
first ask permission before using the first 10 seconds of the songs.
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
2
RESPECTING CREATIVE WORK >
RIGHTS, REMIXES, AND RESPECT
Lesson Assessment
Name
STUDENT VERSION
Class
Date
1. _________________ is to use someone else’s creative work to make something new, often
without their permission.
a) Appropriation
b) Fair use
c) Copyright
d) Public domain
2. There is a difference between inspiration and appropriation. It is considered acceptable
to use others’ work for inspiration, but it is often considered unacceptable to use,
or appropriate, others’ work without their permission. Put the actions below in the
right category.
Inspriration
Appropriation
a) Using a song as the soundtrack to a video you have made
b) Writing a song in the same style as your favorite band, but with different lyrics and with
different notes
c) Writing a paper based on an article you read
d) Adding someone else’s photos to your social networking profile
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
RESPECTING CREATIVE WORK >
RIGHTS, REMIXES, AND RESPECT
Lesson Assessment
STUDENT VERSION
3. Read the following scenario. Then answer the “true or false” question.
Top40 is a popular DJ who takes the first 10 seconds from the 40 most popular songs
on the radio each week and blends them together to create one long song. Top40
does not change the parts of the songs he uses, and he does not ask permission
from the original artists.
True or false: Top40 violates copyright law every time he uses a song from the radio
without asking permission.
a) True. If Top40 does not ask, then he does not have permission to use the songs.
b) False. Even though Top40 does not ask for permission, no one cares, so it isn’t a big deal.
c) False. Because what Top40 does helps the original artists, copyright law does not matter.
d) Both b and c
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
2
SEARCHING > STRATEGIC SEARCHING
Lesson Assessment
TEACHER VERSION
1. A strategy is:
a) A course of action designed to help you reach a goal or result
b) A fraction of a larger amount
c) A word that helps you search online
Answer feedback
The correct answer is a. Having a search strategy, for example, means that you have a specific plan
for carrying out your online search.
2. Cindy heard a new song on the radio. She wants to search for it online, but she can
only remember one line of the song. Which of the following strategies should Cindy
use to search for this song?
a) Include the date she heard the song on the radio
b) Add synonyms to a few of the words she remembers
c) Use quotation marks around the line she remembers
Answer feedback
The correct answer is c. When you use quotation marks around a search term, you are telling a
search engine to look for that exact phrase.
3. What is the first step you should take when you want to conduct an online search?
a) Select research questions
b) Extract keywords and terms
c) Run your search
Answer feedback
The correct answer is a. Before you do a search, you should think of a question about what you are
looking for. You can then use this question to help you choose your keywords.
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
SEARCHING > STRATEGIC SEARCHING
Lesson Assessment
Name
STUDENT VERSION
Class
Date
1. A strategy is:
a) A course of action designed to help you reach a goal or result
b) A fraction of a larger amount
c) A word that helps you search online
2. Cindy heard a new song on the radio. She wants to search for it online, but she can
only remember one line of the song. Which of the following strategies should Cindy
use to search for this song?
a) Include the date she heard the song on the radio
b) Add synonyms to a few of the words she remembers
c) Use quotation marks around the line she remembers
3. What is the first step you should take when you want to conduct an online search?
a) Select research questions
b) Extract keywords and terms
c) Run your search
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
RESEARCH AND EVALUATION > RETOUCHING REALITY
Lesson Assessment
TEACHER VERSION
1. The word retouching means:
a) To mislead someone into believing something that’s not true
b) To improve a photo by adding or changing small details
c) To give a photographer credit for his work
Answer feedback
The correct answer is b. When you retouch a photo, you try to “touch up” or improve parts of it.
2. Tyler is editing a photo of the basketball team for the yearbook. Which of the
following photo alterations would probably be considered deceptive?
a) Making some of the players look taller
b) Cropping the photo to fit on the yearbook page
c) Adding the team’s name at the top of the image
Answer feedback
The correct answer is a. People might feel deceived, or tricked, if they find out that someone looks
different in a photo than in real life.
3. True or false: Changing an image in any way is always a bad thing to do.
a) True
b) False
Answer feedback
The correct answer is b, False. An edited photo can be considered creative or artistic. It all depends
on the purpose of an edited photo and how it’s shared.
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1
RESEARCH AND EVALUATION > RETOUCHING REALITY
Lesson Assessment
Name
STUDENT VERSION
Class
Date
1. The word retouching means:
a) To mislead someone into believing something that’s not true
b) To improve a photo by adding or changing small details
c) To give a photographer credit for his work
2. Tyler is editing a photo of the basketball team for the yearbook. Which of the
following photo alterations would probably be considered deceptive?
a) Making some of the players look taller
b) Cropping the photo to fit on the yearbook page
c) Adding the team’s name at the top of the image
3. True or false: Changing an image in any way is always a bad thing to do.
a) True
b) False
DIGITAL LITERACY AND CITIZENSHIP IN A CONNECTED CULTURE © 2011 www.commonsense.org
1