Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Computers 1 Internet Safety Review
Test Description: Internet Safety Review Study Guide
Instructions: Answer all questions to get your test result.
1) Identity theft is
A
when someone makes a fake profile
B
when someone steals your purse/wallet and your ID is in it
C
when someone uses your private information and pretends to be you in order to get things like money or services
D
when someone hacks your account
2) How can you decide if a website is a reliable source?
A
It has an author, and its information can be verified.
B
It was a top Google search result.
C
It ends with a .com in the domain name.
D
It offers a lot of pictures and information.
3) Is there such a thing as private on the Internet?
A
No, all sites have a disclaimer that requires users to forfeit their privacy.
B
Yes, just adjust the privacy settings.
C
No, once you post anything, anyone can repost and use it anyway they want.
D
Yes, you just have to be careful not to send your information to the wrong friends.
4) SPAM is the electronic equivalent of
A
Bitcoin currency
B
passing notes
C
junk mail
D
lunch meat
5) Hacking is defined as
A
the process of breaking into a computer or network
B
installing programs on a computer
C
using tools to open up a computer
D
using a computer for personal reasons
6) You can report online predators to
A
the police or other adults
B
All of the above
C
National Center for Missing and Exploited Children
D
FBI Crime Stoppers
7) A predator is
A
a worm that attached onto a file and causes computer problems
B
a stranger online
C
used to sort files on your computer
D
someone who victimizes someone else
8) Which of the following is true?
A
There are limits and exceptions to what we can say or post on the Internet.
B
Anything posted on the Internet is protected under the Constitution as long as it's posted in a chatroom, blog, or profile.
C
The 1st Amendment to the Constitution protects all speech.
D
The 1st Amendment to the Constitution protects all speech, except what one posts on the Internet.
9) _______ is publishing statements about someone that you know are untrue.
A
Libel
B
Slander
10) A firewall
A
is a system to help protect you from hackers gaining access to your computer and data.
B
is not necessary as long as you have an anti-virus program
C
is good for life; it never needs to be updated or replaced.
D
is a circuit breaker or power surge used to protect your computer and printer from overheating and starting a fire.
11) Phishing is
A
when you and your dad go to the creek to catch some fish.
B
when a virus is downloaded.
C
when you receive an email that appears to be from an institution you know, and it requests private information
D
when someone asks you for a lot of information.
12) Malware is
A
software that combines email and file sharing on your computer.
B
Micosoft's newest software to be released this year.
C
software that you purchased on your computer that doesn't work properly.
D
software that is intended to damage or disable computers and computer systems.
13) An invisible audience is
A
the people who post comments but don't have a profile picture.
B
the friends who like your posts online but don't leave comments.
C
the people you didn't think would see the information you posted online.
D
the total numbers of friends on your account.
14) If you feel uncomfortable in any chat room, social networking site, or receive a disturbing e-mail, you should...
A
tell the person who offended you to leave you alone.
B
do nothing, and ignore it.
C
notify a trusted adult or parent.
D
delete your page or account immediately.
15) What should you eliminate from photos that you post online?
A
All of the above
B
Nudity
C
Recognizable landmarks
D
Illegal activities
16) Your computer's IP address is always private.
A
False
B
True
17) Cyberbullying is illegal.
A
False
B
True
18) a virus that is hidden within another executed file and uses a computer's resources to slow it down or even shut it down
A
worms
B
SPAM
C
adware
D
trojan horses
19) small software programs designed to harm computer systems
A
phishing
B
worms
C
viruses
D
trojan horses
20) viruses that can hack your computer just by being connected to the Internet and duplicate several times to harm your computer
A
worms
B
adware
C
trojan horses
D
phishing
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?