Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Computers 1 Internet Safety Review
Test Description: Internet Safety Review Study Guide
Instructions: Answer all questions to get your test result.
1) Identity theft is
A
when someone makes a fake profile
B
when someone uses your private information and pretends to be you in order to get things like money or services
C
when someone hacks your account
D
when someone steals your purse/wallet and your ID is in it
2) How can you decide if a website is a reliable source?
A
It has an author, and its information can be verified.
B
It offers a lot of pictures and information.
C
It ends with a .com in the domain name.
D
It was a top Google search result.
3) Is there such a thing as private on the Internet?
A
Yes, you just have to be careful not to send your information to the wrong friends.
B
No, once you post anything, anyone can repost and use it anyway they want.
C
No, all sites have a disclaimer that requires users to forfeit their privacy.
D
Yes, just adjust the privacy settings.
4) SPAM is the electronic equivalent of
A
lunch meat
B
Bitcoin currency
C
passing notes
D
junk mail
5) Hacking is defined as
A
the process of breaking into a computer or network
B
using a computer for personal reasons
C
installing programs on a computer
D
using tools to open up a computer
6) You can report online predators to
A
All of the above
B
FBI Crime Stoppers
C
National Center for Missing and Exploited Children
D
the police or other adults
7) A predator is
A
a stranger online
B
someone who victimizes someone else
C
used to sort files on your computer
D
a worm that attached onto a file and causes computer problems
8) Which of the following is true?
A
There are limits and exceptions to what we can say or post on the Internet.
B
Anything posted on the Internet is protected under the Constitution as long as it's posted in a chatroom, blog, or profile.
C
The 1st Amendment to the Constitution protects all speech, except what one posts on the Internet.
D
The 1st Amendment to the Constitution protects all speech.
9) _______ is publishing statements about someone that you know are untrue.
A
Libel
B
Slander
10) A firewall
A
is not necessary as long as you have an anti-virus program
B
is a system to help protect you from hackers gaining access to your computer and data.
C
is a circuit breaker or power surge used to protect your computer and printer from overheating and starting a fire.
D
is good for life; it never needs to be updated or replaced.
11) Phishing is
A
when you and your dad go to the creek to catch some fish.
B
when a virus is downloaded.
C
when you receive an email that appears to be from an institution you know, and it requests private information
D
when someone asks you for a lot of information.
12) Malware is
A
Micosoft's newest software to be released this year.
B
software that combines email and file sharing on your computer.
C
software that you purchased on your computer that doesn't work properly.
D
software that is intended to damage or disable computers and computer systems.
13) An invisible audience is
A
the people who post comments but don't have a profile picture.
B
the friends who like your posts online but don't leave comments.
C
the people you didn't think would see the information you posted online.
D
the total numbers of friends on your account.
14) If you feel uncomfortable in any chat room, social networking site, or receive a disturbing e-mail, you should...
A
tell the person who offended you to leave you alone.
B
notify a trusted adult or parent.
C
delete your page or account immediately.
D
do nothing, and ignore it.
15) What should you eliminate from photos that you post online?
A
Nudity
B
Illegal activities
C
Recognizable landmarks
D
All of the above
16) Your computer's IP address is always private.
A
False
B
True
17) Cyberbullying is illegal.
A
False
B
True
18) a virus that is hidden within another executed file and uses a computer's resources to slow it down or even shut it down
A
trojan horses
B
SPAM
C
adware
D
worms
19) small software programs designed to harm computer systems
A
trojan horses
B
viruses
C
worms
D
phishing
20) viruses that can hack your computer just by being connected to the Internet and duplicate several times to harm your computer
A
trojan horses
B
phishing
C
worms
D
adware
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2023
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?