
eSafety Review
Quiz by Myran Teasdale
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
54 questions
Show answers
- Q1Also known as electronic safety. Refers to the importance of being aware of threats when using technology.e-safety30s
- Q2Connecting to others using the internet.social networking30s
- Q3Protecting yourself when using something that could be harmful or dangerous to you.security30s
- Q4A program that will detect, protect and fix your computer if it has viruses.anti-virus software30s
- Q5Bullying that takes place over the internet or through mobile phone communicationcyberbullying30s
- Q6Computer software that secretly records information about the way you use your computerspyware30s
- Q7A type of security that protects a computer from harmful outside connections.firewall30s
- Q8A 24 hour counselling service for children to help and advise on a range of issues.childline30s
- Q9The use of science to invent useful things or to solve problems.technology30s
- Q10Electronic Mail: A method of sending digital messages from one person to another person.email30s
- Q11This is process of copying/transferring data from one computer to another.downloading30s
- Q12A program that copies itself and spreads to other computers through networks.Computer Worm30s
- Q13Software that pretends to be something fun or useful, so the user downloads it, but actually provides authorized access to the user's computer.Trojan horse30s
- Q14A system of computers and other devices that are connected to each other.Network30s
- Q15When all the keys you press on your keyboard is recorded and sent back to somebody like a hacker.Key logging30s