Computers 1 Internet Safety Review: Question Preview (ID: 21118)

Below is a preview of the questions contained within the game titled COMPUTERS 1 INTERNET SAFETY REVIEW: Internet Safety Review Study Guide .To play games using this data set, follow the directions below. Good luck and have fun. Enjoy! [print these questions]

Play games to reveal the correct answers. Click here to play a game and get the answers.

Your computer's IP address is always private.
a) True
b) False

Cyberbullying is illegal.
a) True
b) False

What should you eliminate from photos that you post online?
a) All of the above
b) Illegal activities
c) Nudity
d) Recognizable landmarks

If you feel uncomfortable in any chat room, social networking site, or receive a disturbing e-mail, you should...
a) notify a trusted adult or parent.
b) delete your page or account immediately.
c) do nothing, and ignore it.
d) tell the person who offended you to leave you alone.

An invisible audience is
a) the people you didn't think would see the information you posted online.
b) the friends who like your posts online but don't leave comments.
c) the people who post comments but don't have a profile picture.
d) the total numbers of friends on your account.

Malware is
a) software that is intended to damage or disable computers and computer systems.
b) software that you purchased on your computer that doesn't work properly.
c) Micosoft's newest software to be released this year.
d) software that combines email and file sharing on your computer.

Phishing is
a) when you receive an email that appears to be from an institution you know, and it requests private information
b) when a virus is downloaded.
c) when someone asks you for a lot of information.
d) when you and your dad go to the creek to catch some fish.

A firewall
a) is a system to help protect you from hackers gaining access to your computer and data.
b) is a circuit breaker or power surge used to protect your computer and printer from overheating and starting a fire.
c) is good for life; it never needs to be updated or replaced.
d) is not necessary as long as you have an anti-virus program

_______ is publishing statements about someone that you know are untrue.
a) Libel
b) Slander

Which of the following is true?
a) There are limits and exceptions to what we can say or post on the Internet.
b) The 1st Amendment to the Constitution protects all speech.
c) The 1st Amendment to the Constitution protects all speech, except what one posts on the Internet.
d) Anything posted on the Internet is protected under the Constitution as long as it's posted in a chatroom, blog, or profile.

You can report online predators to
a) the police or other adults
b) FBI Crime Stoppers
c) National Center for Missing and Exploited Children
d) All of the above

A predator is
a) someone who victimizes someone else
b) a stranger online
c) a worm that attached onto a file and causes computer problems
d) used to sort files on your computer

Hacking is defined as
a) the process of breaking into a computer or network
b) using a computer for personal reasons
c) using tools to open up a computer
d) installing programs on a computer

SPAM is the electronic equivalent of
a) junk mail
b) lunch meat
c) Bitcoin currency
d) passing notes

Is there such a thing as private on the Internet?
a) No, once you post anything, anyone can repost and use it anyway they want.
b) Yes, just adjust the privacy settings.
c) Yes, you just have to be careful not to send your information to the wrong friends.
d) No, all sites have a disclaimer that requires users to forfeit their privacy.

How can you decide if a website is a reliable source?
a) It has an author, and its information can be verified.
b) It was a top Google search result.
c) It offers a lot of pictures and information.
d) It ends with a .com in the domain name.

Identity theft is
a) when someone uses your private information and pretends to be you in order to get things like money or services
b) when someone hacks your account
c) when someone makes a fake profile
d) when someone steals your purse/wallet and your ID is in it

a virus that is hidden within another executed file and uses a computer's resources to slow it down or even shut it down
a) trojan horses
b) adware
d) worms

small software programs designed to harm computer systems
a) viruses
b) worms
c) trojan horses
d) phishing

viruses that can hack your computer just by being connected to the Internet and duplicate several times to harm your computer
a) worms
b) adware
c) phishing
d) trojan horses

Play Games with the Questions above at
To play games using the questions from the data set above, visit and enter game ID number: 21118 in the upper right hand corner at or simply click on the link above this text.

Log In
| Sign Up / Register