Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Computers 1 Internet Safety Review
Test Description: Internet Safety Review Study Guide
Instructions: Answer all questions to get your test result.
1) Identity theft is
A
when someone uses your private information and pretends to be you in order to get things like money or services
B
when someone hacks your account
C
when someone steals your purse/wallet and your ID is in it
D
when someone makes a fake profile
2) How can you decide if a website is a reliable source?
A
It offers a lot of pictures and information.
B
It was a top Google search result.
C
It ends with a .com in the domain name.
D
It has an author, and its information can be verified.
3) Is there such a thing as private on the Internet?
A
Yes, you just have to be careful not to send your information to the wrong friends.
B
Yes, just adjust the privacy settings.
C
No, all sites have a disclaimer that requires users to forfeit their privacy.
D
No, once you post anything, anyone can repost and use it anyway they want.
4) SPAM is the electronic equivalent of
A
Bitcoin currency
B
junk mail
C
lunch meat
D
passing notes
5) Hacking is defined as
A
installing programs on a computer
B
using a computer for personal reasons
C
using tools to open up a computer
D
the process of breaking into a computer or network
6) You can report online predators to
A
the police or other adults
B
National Center for Missing and Exploited Children
C
FBI Crime Stoppers
D
All of the above
7) A predator is
A
someone who victimizes someone else
B
a stranger online
C
used to sort files on your computer
D
a worm that attached onto a file and causes computer problems
8) Which of the following is true?
A
The 1st Amendment to the Constitution protects all speech, except what one posts on the Internet.
B
The 1st Amendment to the Constitution protects all speech.
C
Anything posted on the Internet is protected under the Constitution as long as it's posted in a chatroom, blog, or profile.
D
There are limits and exceptions to what we can say or post on the Internet.
9) _______ is publishing statements about someone that you know are untrue.
A
Libel
B
Slander
10) A firewall
A
is good for life; it never needs to be updated or replaced.
B
is not necessary as long as you have an anti-virus program
C
is a system to help protect you from hackers gaining access to your computer and data.
D
is a circuit breaker or power surge used to protect your computer and printer from overheating and starting a fire.
11) Phishing is
A
when someone asks you for a lot of information.
B
when a virus is downloaded.
C
when you and your dad go to the creek to catch some fish.
D
when you receive an email that appears to be from an institution you know, and it requests private information
12) Malware is
A
software that combines email and file sharing on your computer.
B
software that you purchased on your computer that doesn't work properly.
C
software that is intended to damage or disable computers and computer systems.
D
Micosoft's newest software to be released this year.
13) An invisible audience is
A
the friends who like your posts online but don't leave comments.
B
the total numbers of friends on your account.
C
the people you didn't think would see the information you posted online.
D
the people who post comments but don't have a profile picture.
14) If you feel uncomfortable in any chat room, social networking site, or receive a disturbing e-mail, you should...
A
do nothing, and ignore it.
B
notify a trusted adult or parent.
C
delete your page or account immediately.
D
tell the person who offended you to leave you alone.
15) What should you eliminate from photos that you post online?
A
All of the above
B
Nudity
C
Illegal activities
D
Recognizable landmarks
16) Your computer's IP address is always private.
A
True
B
False
17) Cyberbullying is illegal.
A
False
B
True
18) a virus that is hidden within another executed file and uses a computer's resources to slow it down or even shut it down
A
worms
B
SPAM
C
adware
D
trojan horses
19) small software programs designed to harm computer systems
A
worms
B
trojan horses
C
phishing
D
viruses
20) viruses that can hack your computer just by being connected to the Internet and duplicate several times to harm your computer
A
trojan horses
B
worms
C
phishing
D
adware
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?