Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Computers 7 Internet Safety Review
Test Description: Internet Safety Review
Instructions: Answer all questions to get your test result.
1) Identity theft is
A
when someone hacks your account.
B
when someone uses your private information and pretends to be you in order to get things like money or services
C
when someone steals your purse/wallet and your ID is in it.
D
when someone makes a fake profile.
2) Phishing is
A
when someone asks you for a lot of information.
B
when you and your dad go to the creek to catch some fish.
C
when a virus is downloaded.
D
when you receive an email, and it requests private information like passwords, etc.
3) Setting your social network site like Facebook as private will ensure your privacy.
A
True
B
False
4) Once you place information online, you can get it back if you change your mind.
A
True
B
False
5) Malware is
A
software that is intended to damage or disable computers and computer systems.
B
software that combines email and file sharing on your computer.
C
Microsoft's newest software to be released this year.
D
software that you purchased on your computer that doesn't work properly.
6) An invisible audience is
A
the friends who like your posts online but don't leave comments.
B
the people who post comments but don't have a profile picture.
C
the people you didn't think would see the information you posted online.
D
the total numbers of friends on your account.
7) If you are in a gaming room, and someone that you do not know asks you about personal information (same age as you-or close), what should you do?
A
Tell them just a little bit about yourself.
B
Tell them everything they want to know.
C
Answer them only if they answer your questions first.
D
Don't ever give out personal information.
8) If you feel uncomfortable in any chat room, social networking site, or receive a disturbing e-mail, you should...
A
do nothing, and ignore it.
B
delete your page or account immediately.
C
notify a trusted adult or parent.
D
tell the person who offended you to leave you alone.
9) What should you eliminate from photos that you post online?
A
Illegal activities
B
All of the above
C
Any recognizable landmarks
D
Nudity
10) Which of the items should NOT be shared online?
A
your phone number
B
the name of your dog
C
what you ate for dinner
D
your favorite color
11) Your computer's IP address is always private.
A
True
B
False
12) Individuals who use the Internet to bully other students
A
can only get in trouble with their school
B
are protected by the First Amendment
C
could be charged with a crime
D
cannot be identified
13) If a person you met in a chat room asks to meet with you, you should
A
never agree to meet with someone you do not know
B
have a good friend meet him/her with you
C
agree to meet with him/her at the mall or some other public place
D
only agree to meet him/her if you talk to him/her on the phone first
14) Which of the following are ways to avoid becoming a victim of cyberbullying?
A
Use an anti-virus program or some other internet program.
B
Always report contacts that upset you.
C
Don't post pictures of yourself online.
D
Accept everyone's friend requests.
15) If someone sends me an inappropriate message or material, I should
A
tell a friend and delete it.
B
tell him/her to stop sending me things.
C
tell a trusted adult or parent.
D
ignore him/her.
16) Information on the Internet is always proven by research.
A
True
B
False
17) Anything I send in private e-mail, IM, or chat cannot be seen by others.
A
True
B
False
18) Students should use the same password for all of their account so that they don't forget their log-in information.
A
True
B
False
19) The passwords you create should
A
include numbers and symbols
B
All of the above
C
include capital letters
D
include at least 8 characters
20) Worms are...
A
small software programs designed to harm computer systems
B
viruses that can hack your computer just by being connected to the Internet and duplicate several times to harm your computer
C
e-mails that are made to look normal but are trying to steal information related to your identity
D
a virus that is hidden within another executed file and uses a computer's resources to slow it down or even shut it down
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?