E-safety, networks, The Cloud
Quiz by KS3 IT
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
12 questions
Show answers
- Q1What does the acronym VPN stand for?Visible Public NetworkVirtual Private NetworkVirtual Public NetworkVirtual Proxy Network30s
- Q2What is phishing?A type of computer virusA method of encrypting dataA form of cyber attack that uses deceptive techniques to trick individuals into revealing sensitive informationA technique used to improve network security30s
- Q3What is two-factor authentication?A security measure that requires users to provide two different forms of identification to access an account or systemA type of computer virus that spreads through email attachmentsA method of securely storing passwordsA technique used to speed up internet connection30s
- Q4What is malware?Malicious software designed to harm or exploit computer systems and networksA type of computer hardwareA technique for improving internet speedA method of backing up data30s
- Q5What is a cookie in the context of internet browsing?A small piece of data stored on a user's device by a website, used to track and remember information about the user's interactions and preferencesA type of computer virusA tool for blocking website accessA method of encrypting internet traffic30s
- Q6What is a firewall?A cloud-based storage serviceA security system that monitors and controls incoming and outgoing network traffic based on predetermined security rulesA software for managing social media accountsA type of computer virus30s
- Q7Which of the following is a wireless method of connecting devices to a network?The internetAn ethernet cableWIFIFibre optic30s
- Q8Which of the following is NOT a good practice for creating a secure password?Using a long password with more than 20 characters.Using a randomly generated password.Using a combination of uppercase and lowercase letters.Using a common word or phrase as a password.30s
- Q9Which of the following is an example of cyber bullying?Excluding someone from a group chatSharing a funny meme with friendsCreating a fake social media account to mock and harass someoneTeasing someone in person30s
- Q10What is the most common platform for cyber bullying?Social mediaText messagingOnline gamingEmail30s
- Q11What is an example of indirect cyber bullying?Sharing a funny videoParticipating in an online quizSending a friendly message to someoneSpreading rumors about someone onlineLiking someone's photo on social media30s
- Q12What is the legal term for cyber bullying?Digital prankingSocial media addictionOnline harassmentOnline stalkingInternet trolling30s