Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Computers 1 Internet Safety Review
Test Description: Internet Safety Review Study Guide
Instructions: Answer all questions to get your test result.
1) Identity theft is
A
when someone steals your purse/wallet and your ID is in it
B
when someone uses your private information and pretends to be you in order to get things like money or services
C
when someone makes a fake profile
D
when someone hacks your account
2) How can you decide if a website is a reliable source?
A
It ends with a .com in the domain name.
B
It offers a lot of pictures and information.
C
It has an author, and its information can be verified.
D
It was a top Google search result.
3) Is there such a thing as private on the Internet?
A
No, all sites have a disclaimer that requires users to forfeit their privacy.
B
No, once you post anything, anyone can repost and use it anyway they want.
C
Yes, you just have to be careful not to send your information to the wrong friends.
D
Yes, just adjust the privacy settings.
4) SPAM is the electronic equivalent of
A
junk mail
B
Bitcoin currency
C
passing notes
D
lunch meat
5) Hacking is defined as
A
the process of breaking into a computer or network
B
installing programs on a computer
C
using tools to open up a computer
D
using a computer for personal reasons
6) You can report online predators to
A
National Center for Missing and Exploited Children
B
All of the above
C
the police or other adults
D
FBI Crime Stoppers
7) A predator is
A
a worm that attached onto a file and causes computer problems
B
used to sort files on your computer
C
a stranger online
D
someone who victimizes someone else
8) Which of the following is true?
A
Anything posted on the Internet is protected under the Constitution as long as it's posted in a chatroom, blog, or profile.
B
There are limits and exceptions to what we can say or post on the Internet.
C
The 1st Amendment to the Constitution protects all speech, except what one posts on the Internet.
D
The 1st Amendment to the Constitution protects all speech.
9) _______ is publishing statements about someone that you know are untrue.
A
Libel
B
Slander
10) A firewall
A
is good for life; it never needs to be updated or replaced.
B
is not necessary as long as you have an anti-virus program
C
is a circuit breaker or power surge used to protect your computer and printer from overheating and starting a fire.
D
is a system to help protect you from hackers gaining access to your computer and data.
11) Phishing is
A
when someone asks you for a lot of information.
B
when you and your dad go to the creek to catch some fish.
C
when a virus is downloaded.
D
when you receive an email that appears to be from an institution you know, and it requests private information
12) Malware is
A
software that you purchased on your computer that doesn't work properly.
B
Micosoft's newest software to be released this year.
C
software that is intended to damage or disable computers and computer systems.
D
software that combines email and file sharing on your computer.
13) An invisible audience is
A
the people who post comments but don't have a profile picture.
B
the total numbers of friends on your account.
C
the friends who like your posts online but don't leave comments.
D
the people you didn't think would see the information you posted online.
14) If you feel uncomfortable in any chat room, social networking site, or receive a disturbing e-mail, you should...
A
notify a trusted adult or parent.
B
do nothing, and ignore it.
C
tell the person who offended you to leave you alone.
D
delete your page or account immediately.
15) What should you eliminate from photos that you post online?
A
Recognizable landmarks
B
All of the above
C
Illegal activities
D
Nudity
16) Your computer's IP address is always private.
A
False
B
True
17) Cyberbullying is illegal.
A
True
B
False
18) a virus that is hidden within another executed file and uses a computer's resources to slow it down or even shut it down
A
trojan horses
B
SPAM
C
adware
D
worms
19) small software programs designed to harm computer systems
A
worms
B
phishing
C
viruses
D
trojan horses
20) viruses that can hack your computer just by being connected to the Internet and duplicate several times to harm your computer
A
worms
B
adware
C
trojan horses
D
phishing
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?