Computers 7 Internet Safety Review Question Preview (ID: 20911)


Internet Safety Review. TEACHERS: click here for quick copy question ID numbers.

Identity theft is
a) when someone uses your private information and pretends to be you in order to get things like money or services
b) when someone hacks your account.
c) when someone makes a fake profile.
d) when someone steals your purse/wallet and your ID is in it.

Phishing is
a) when a virus is downloaded.
b) when someone asks you for a lot of information.
c) when you and your dad go to the creek to catch some fish.
d) when you receive an email, and it requests private information like passwords, etc.

Setting your social network site like Facebook as private will ensure your privacy.
a) True
b) False
c)
d)

Once you place information online, you can get it back if you change your mind.
a) True
b) False
c)
d)

Malware is
a) software that is intended to damage or disable computers and computer systems.
b) software that you purchased on your computer that doesn't work properly.
c) Microsoft's newest software to be released this year.
d) software that combines email and file sharing on your computer.

An invisible audience is
a) the friends who like your posts online but don't leave comments.
b) the people you didn't think would see the information you posted online.
c) the people who post comments but don't have a profile picture.
d) the total numbers of friends on your account.

If you are in a gaming room, and someone that you do not know asks you about personal information (same age as you-or close), what should you do?
a) Answer them only if they answer your questions first.
b) Tell them just a little bit about yourself.
c) Don't ever give out personal information.
d) Tell them everything they want to know.

If you feel uncomfortable in any chat room, social networking site, or receive a disturbing e-mail, you should...
a) notify a trusted adult or parent.
b) delete your page or account immediately.
c) do nothing, and ignore it.
d) tell the person who offended you to leave you alone.

What should you eliminate from photos that you post online?
a) Any recognizable landmarks
b) Nudity
c) Illegal activities
d) All of the above

Which of the items should NOT be shared online?
a) your favorite color
b) the name of your dog
c) your phone number
d) what you ate for dinner

Your computer's IP address is always private.
a) True
b) False
c)
d)

Individuals who use the Internet to bully other students
a) cannot be identified
b) could be charged with a crime
c) can only get in trouble with their school
d) are protected by the First Amendment

If a person you met in a chat room asks to meet with you, you should
a) only agree to meet him/her if you talk to him/her on the phone first
b) agree to meet with him/her at the mall or some other public place
c) never agree to meet with someone you do not know
d) have a good friend meet him/her with you

Which of the following are ways to avoid becoming a victim of cyberbullying?
a) Always report contacts that upset you.
b) Use an anti-virus program or some other internet program.
c) Don't post pictures of yourself online.
d) Accept everyone's friend requests.

If someone sends me an inappropriate message or material, I should
a) tell a trusted adult or parent.
b) ignore him/her.
c) tell him/her to stop sending me things.
d) tell a friend and delete it.

Information on the Internet is always proven by research.
a) True
b) False
c)
d)

Anything I send in private e-mail, IM, or chat cannot be seen by others.
a) True
b) False
c)
d)

Students should use the same password for all of their account so that they don't forget their log-in information.
a) True
b) False
c)
d)

The passwords you create should
a) include at least 8 characters
b) include capital letters
c) include numbers and symbols
d) All of the above

Worms are...
a) small software programs designed to harm computer systems
b) viruses that can hack your computer just by being connected to the Internet and duplicate several times to harm your computer
c) a virus that is hidden within another executed file and uses a computer's resources to slow it down or even shut it down
d) e-mails that are made to look normal but are trying to steal information related to your identity

Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 20911 in the upper right hand corner or click here.

TEACHERS / EDUCATORS
Log In
| Sign Up / Register