Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Computers 7 Internet Safety Review
Test Description: Internet Safety Review
Instructions: Answer all questions to get your test result.
1) Identity theft is
A
when someone steals your purse/wallet and your ID is in it.
B
when someone makes a fake profile.
C
when someone uses your private information and pretends to be you in order to get things like money or services
D
when someone hacks your account.
2) Phishing is
A
when a virus is downloaded.
B
when you and your dad go to the creek to catch some fish.
C
when you receive an email, and it requests private information like passwords, etc.
D
when someone asks you for a lot of information.
3) Setting your social network site like Facebook as private will ensure your privacy.
A
False
B
True
4) Once you place information online, you can get it back if you change your mind.
A
False
B
True
5) Malware is
A
Microsoft's newest software to be released this year.
B
software that combines email and file sharing on your computer.
C
software that is intended to damage or disable computers and computer systems.
D
software that you purchased on your computer that doesn't work properly.
6) An invisible audience is
A
the people you didn't think would see the information you posted online.
B
the people who post comments but don't have a profile picture.
C
the total numbers of friends on your account.
D
the friends who like your posts online but don't leave comments.
7) If you are in a gaming room, and someone that you do not know asks you about personal information (same age as you-or close), what should you do?
A
Don't ever give out personal information.
B
Tell them just a little bit about yourself.
C
Tell them everything they want to know.
D
Answer them only if they answer your questions first.
8) If you feel uncomfortable in any chat room, social networking site, or receive a disturbing e-mail, you should...
A
delete your page or account immediately.
B
do nothing, and ignore it.
C
notify a trusted adult or parent.
D
tell the person who offended you to leave you alone.
9) What should you eliminate from photos that you post online?
A
Nudity
B
All of the above
C
Illegal activities
D
Any recognizable landmarks
10) Which of the items should NOT be shared online?
A
your phone number
B
what you ate for dinner
C
the name of your dog
D
your favorite color
11) Your computer's IP address is always private.
A
True
B
False
12) Individuals who use the Internet to bully other students
A
can only get in trouble with their school
B
could be charged with a crime
C
cannot be identified
D
are protected by the First Amendment
13) If a person you met in a chat room asks to meet with you, you should
A
agree to meet with him/her at the mall or some other public place
B
have a good friend meet him/her with you
C
never agree to meet with someone you do not know
D
only agree to meet him/her if you talk to him/her on the phone first
14) Which of the following are ways to avoid becoming a victim of cyberbullying?
A
Accept everyone's friend requests.
B
Always report contacts that upset you.
C
Don't post pictures of yourself online.
D
Use an anti-virus program or some other internet program.
15) If someone sends me an inappropriate message or material, I should
A
ignore him/her.
B
tell a friend and delete it.
C
tell a trusted adult or parent.
D
tell him/her to stop sending me things.
16) Information on the Internet is always proven by research.
A
True
B
False
17) Anything I send in private e-mail, IM, or chat cannot be seen by others.
A
False
B
True
18) Students should use the same password for all of their account so that they don't forget their log-in information.
A
True
B
False
19) The passwords you create should
A
include capital letters
B
All of the above
C
include at least 8 characters
D
include numbers and symbols
20) Worms are...
A
small software programs designed to harm computer systems
B
a virus that is hidden within another executed file and uses a computer's resources to slow it down or even shut it down
C
viruses that can hack your computer just by being connected to the Internet and duplicate several times to harm your computer
D
e-mails that are made to look normal but are trying to steal information related to your identity
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?