placeholder image to represent content

Digital Safety for Students

Quiz by Sherry Potter

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
10 questions
Show answers
  • Q1
    What is phishing?
    A method used to protect sensitive information
    A type of fishing for actual fish
    A type of computer virus
    A method used to trick people into revealing sensitive information
    30s
  • Q2
    Which of the following is a good practice for creating strong passwords?
    Reusing the same password for multiple accounts
    Using a single word as the password
    Using a combination of letters, numbers, and symbols
    Using your name as the password
    30s
  • Q3
    What does the term 'cyberbullying' refer to?
    Exchanging friendly messages online
    Sharing informative content
    Engaging in physical bullying
    Using technology to harass, intimidate, or humiliate others
    30s
  • Q4
    What does the term 'phishing' refer to?
    A method used to trick people into revealing sensitive information
    A type of fishing for actual fish
    A type of computer virus
    A method used to protect sensitive information
    30s
  • Q5
    What is malware?
    Software that improves computer performance
    A type of computer hardware
    A programming language
    Malicious software designed to harm or exploit computers or networks
    30s
  • Q6
    What is online luring?
    When someone uses technology to find friends for a child or youth.
    When someone uses technology to communicate with a child or youth in order to sexually harm them.
    When someone uses technology to help a child or youth with their homework.
    When someone uses technology to play games with a child or youth.
    30s
  • Q7
    What are red flag behaviours that signal an unsafe situation?
    Apologizing for their actions, respecting the youth's boundaries, being open and honest about their intentions.
    Encouraging the youth to communicate with their parents, supporting their education and personal growth.
    Falsely identifying themselves as a peer, inappropriate affection, excessive attention, keeping secrets, flattering/complimenting/supporting the youth, promising gifts/money/drugs/alcohol, pitting the parents against the youth, sending sexual pictures, taking pictures without the youth's knowledge, threatening/intimidating/harassing the youth.
    Treating the youth with kindness and respect, showing genuine interest in their hobbies and interests.
    30s
  • Q8
    Why is the internet not set up for children and youth?
    Because children and youth are not interested in using the internet.
    It is not regulated and can expose them to dangerous people and information.
    Because children and youth are not allowed to access the internet.
    Because the internet is only used by adults.
    30s
  • Q9
    What is one tactic used by someone looking to sexually harm children and youth?
    Sending sexual pictures to make the youth more comfortable sending sexual pictures/videos in return.
    Sending pictures of their favorite places to encourage the youth to visit.
    Sending pictures of themselves to build trust with the youth.
    Sending pictures of cute animals to make the youth happy.
    30s
  • Q10
    What can someone do to support the youth if they suspect online luring?
    Report the situation to a trusted adult or authority figure.
    Try to handle the situation without involving anyone else.
    Confront the person engaging in online luring directly.
    Ignore the situation and hope it goes away on its own.
    30s

Teachers give this quiz to your class