
Digital Safety for Students
Quiz by Sherry Potter
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
10 questions
Show answers
- Q1What is phishing?A method used to protect sensitive informationA type of fishing for actual fishA type of computer virusA method used to trick people into revealing sensitive information30s
- Q2Which of the following is a good practice for creating strong passwords?Reusing the same password for multiple accountsUsing a single word as the passwordUsing a combination of letters, numbers, and symbolsUsing your name as the password30s
- Q3What does the term 'cyberbullying' refer to?Exchanging friendly messages onlineSharing informative contentEngaging in physical bullyingUsing technology to harass, intimidate, or humiliate others30s
- Q4What does the term 'phishing' refer to?A method used to trick people into revealing sensitive informationA type of fishing for actual fishA type of computer virusA method used to protect sensitive information30s
- Q5What is malware?Software that improves computer performanceA type of computer hardwareA programming languageMalicious software designed to harm or exploit computers or networks30s
- Q6What is online luring?When someone uses technology to find friends for a child or youth.When someone uses technology to communicate with a child or youth in order to sexually harm them.When someone uses technology to help a child or youth with their homework.When someone uses technology to play games with a child or youth.30s
- Q7What are red flag behaviours that signal an unsafe situation?Apologizing for their actions, respecting the youth's boundaries, being open and honest about their intentions.Encouraging the youth to communicate with their parents, supporting their education and personal growth.Falsely identifying themselves as a peer, inappropriate affection, excessive attention, keeping secrets, flattering/complimenting/supporting the youth, promising gifts/money/drugs/alcohol, pitting the parents against the youth, sending sexual pictures, taking pictures without the youth's knowledge, threatening/intimidating/harassing the youth.Treating the youth with kindness and respect, showing genuine interest in their hobbies and interests.30s
- Q8Why is the internet not set up for children and youth?Because children and youth are not interested in using the internet.It is not regulated and can expose them to dangerous people and information.Because children and youth are not allowed to access the internet.Because the internet is only used by adults.30s
- Q9What is one tactic used by someone looking to sexually harm children and youth?Sending sexual pictures to make the youth more comfortable sending sexual pictures/videos in return.Sending pictures of their favorite places to encourage the youth to visit.Sending pictures of themselves to build trust with the youth.Sending pictures of cute animals to make the youth happy.30s
- Q10What can someone do to support the youth if they suspect online luring?Report the situation to a trusted adult or authority figure.Try to handle the situation without involving anyone else.Confront the person engaging in online luring directly.Ignore the situation and hope it goes away on its own.30s