Computers 7 Internet Safety Review: Question Preview (ID: 20911)

Below is a preview of the questions contained within the game titled COMPUTERS 7 INTERNET SAFETY REVIEW: Internet Safety Review .To play games using this data set, follow the directions below. Good luck and have fun. Enjoy! [print these questions]

Play games to reveal the correct answers. Click here to play a game and get the answers.

Identity theft is
a) when someone uses your private information and pretends to be you in order to get things like money or services
b) when someone hacks your account.
c) when someone makes a fake profile.
d) when someone steals your purse/wallet and your ID is in it.

Phishing is
a) when a virus is downloaded.
b) when someone asks you for a lot of information.
c) when you and your dad go to the creek to catch some fish.
d) when you receive an email, and it requests private information like passwords, etc.

Setting your social network site like Facebook as private will ensure your privacy.
a) True
b) False

Once you place information online, you can get it back if you change your mind.
a) True
b) False

Malware is
a) software that is intended to damage or disable computers and computer systems.
b) software that you purchased on your computer that doesn't work properly.
c) Micosoft's newest software to be released this year.
d) software that combines email and file sharing on your computer.

An invisible audience is
a) the friends who like your posts online but don't leave comments.
b) the people you didn't think would see the information you posted online.
c) the people who post comments but don't have a profile picture.
d) the total numbers of friends on your account.

If you are in a gaming room, and someone that you do not know asks you about personal information (same age as you-or close), what should you do?
a) Answer them only if they answer your questions first.
b) Tell them just a little bit about yourself.
c) Don't ever give out personal information.
d) Tell them everything they want to know.

If you feel uncomfortable in any chat room, social networking site, or receive a disturbing e-mail, you should...
a) notify a trusted adult or parent.
b) delete your page or account immediately.
c) do nothing, and ignore it.
d) tell the person who offended you to leave you alone.

What should you eliminate from photos that you post online?
a) Any recognizable landmarks
b) Nudity
c) Illegal activities
d) All of the above

Which of the items should NOT be shared online?
a) your favorite color
b) the name of your dog
c) your phone number
d) what you ate for dinner

Your computer's IP address is always private.
a) True
b) False

Individuals who use the Internet to bully other students
a) cannot be identified
b) could be charged with a crime
c) can only get in trouble with their school
d) are protected by the First Amendment

If a person you met in a chat room asks to meet with you, you should
a) only agree to meet him/her if you talk to him/her on the phone first
b) agree to meet with him/her at the mall or some other public place
c) never agree to meet with someone you do not know
d) have a good friend meet him/her with you

Which of the following are ways to avoid becoming a victim of cyberbullying?
a) Always report contacts that upset you.
b) Use an anti-virus program or some other internet program.
c) Don't post pictures of yourself online.
d) Accept everyone's friend requests.

If someone sends me an inappropriate message or material, I should
a) tell a trusted adult or parent.
b) ignore him/her.
c) tell him/her to stop sending me things.
d) tell a friend and delete it.

Information on the Internet is always proven by research.
a) True
b) False

Anything I send in private e-mail, IM, or chat cannot be seen by others.
a) True
b) False

Students should use the same password for all of their account so that they don't forget their log-in information.
a) True
b) False

The passwords you create should
a) include at least 8 characters
b) include capital letters
c) include numbers and symbols
d) All of the above

Worms are...
a) small software programs designed to harm computer systems
b) viruses that can hack your computer just by being connected to the Internet and duplicate several times to harm your computer
c) a virus that is hidden within another executed file and uses a computer's resources to slow it down or even shut it down
d) e-mails that are made to look normal but are trying to steal information related to your identity

Play Games with the Questions above at
To play games using the questions from the data set above, visit and enter game ID number: 20911 in the upper right hand corner at or simply click on the link above this text.

Log In
| Sign Up / Register