Computers 1 Internet Safety Review Question Preview (ID: 21118)


Internet Safety Review Study Guide. TEACHERS: click here for quick copy question ID numbers.

Identity theft is
a) when someone uses your private information and pretends to be you in order to get things like money or services
b) when someone hacks your account
c) when someone makes a fake profile
d) when someone steals your purse/wallet and your ID is in it

How can you decide if a website is a reliable source?
a) It has an author, and its information can be verified.
b) It was a top Google search result.
c) It offers a lot of pictures and information.
d) It ends with a .com in the domain name.

Is there such a thing as private on the Internet?
a) No, once you post anything, anyone can repost and use it anyway they want.
b) Yes, just adjust the privacy settings.
c) Yes, you just have to be careful not to send your information to the wrong friends.
d) No, all sites have a disclaimer that requires users to forfeit their privacy.

SPAM is the electronic equivalent of
a) junk mail
b) lunch meat
c) Bitcoin currency
d) passing notes

Hacking is defined as
a) the process of breaking into a computer or network
b) using a computer for personal reasons
c) using tools to open up a computer
d) installing programs on a computer

You can report online predators to
a) the police or other adults
b) FBI Crime Stoppers
c) National Center for Missing and Exploited Children
d) All of the above

A predator is
a) someone who victimizes someone else
b) a stranger online
c) a worm that attached onto a file and causes computer problems
d) used to sort files on your computer

Which of the following is true?
a) There are limits and exceptions to what we can say or post on the Internet.
b) The 1st Amendment to the Constitution protects all speech.
c) The 1st Amendment to the Constitution protects all speech, except what one posts on the Internet.
d) Anything posted on the Internet is protected under the Constitution as long as it's posted in a chatroom, blog, or profile.

_______ is publishing statements about someone that you know are untrue.
a) Libel
b) Slander
c)
d)

A firewall
a) is a system to help protect you from hackers gaining access to your computer and data.
b) is a circuit breaker or power surge used to protect your computer and printer from overheating and starting a fire.
c) is good for life; it never needs to be updated or replaced.
d) is not necessary as long as you have an anti-virus program

Phishing is
a) when you receive an email that appears to be from an institution you know, and it requests private information
b) when a virus is downloaded.
c) when someone asks you for a lot of information.
d) when you and your dad go to the creek to catch some fish.

Malware is
a) software that is intended to damage or disable computers and computer systems.
b) software that you purchased on your computer that doesn't work properly.
c) Micosoft's newest software to be released this year.
d) software that combines email and file sharing on your computer.

An invisible audience is
a) the people you didn't think would see the information you posted online.
b) the friends who like your posts online but don't leave comments.
c) the people who post comments but don't have a profile picture.
d) the total numbers of friends on your account.

If you feel uncomfortable in any chat room, social networking site, or receive a disturbing e-mail, you should...
a) notify a trusted adult or parent.
b) delete your page or account immediately.
c) do nothing, and ignore it.
d) tell the person who offended you to leave you alone.

What should you eliminate from photos that you post online?
a) All of the above
b) Illegal activities
c) Nudity
d) Recognizable landmarks

Your computer's IP address is always private.
a) True
b) False
c)
d)

Cyberbullying is illegal.
a) True
b) False
c)
d)

a virus that is hidden within another executed file and uses a computer's resources to slow it down or even shut it down
a) trojan horses
b) adware
c) SPAM
d) worms

small software programs designed to harm computer systems
a) viruses
b) worms
c) trojan horses
d) phishing

viruses that can hack your computer just by being connected to the Internet and duplicate several times to harm your computer
a) worms
b) adware
c) phishing
d) trojan horses

Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 21118 in the upper right hand corner or click here.

TEACHERS / EDUCATORS
Log In
| Sign Up / Register