placeholder image to represent content

Homework 3 - Fake Images

Quiz by KS3 IT

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
28 questions
Show answers
  • Q1
    What is cyberbullying?
    Ignoring someone in class
    Using electronic devices to harass or intimidate someone
    Writing a mean note on paper
    Physical bullying at school
    30s
  • Q2
    What should you do if you witness cyberbullying?
    Join in and make fun of the victim
    Confront the bully online yourself
    Ignore it and hope it stops
    Report it to a trusted adult or authority
    30s
  • Q3
    Which of the following actions can help prevent cyberbullying?
    Sharing personal information publicly
    Accepting friend requests from everyone
    Using privacy settings on social media
    Posting as much as possible online
    30s
  • Q4
    Why is it important to keep evidence of cyberbullying?
    It allows you to retaliate
    It makes the bully stop immediately
    It can help prove what happened if you report it
    It helps you forget about the situation
    30s
  • Q5
    What role do bystanders play in cyberbullying situations?
    They can help stop the bullying by speaking out or reporting it
    They should ignore it to avoid problems
    They should blame the victim for being bullied
    They can encourage the bully to continue
    30s
  • Q6
    What can you do if you are being cyberbullied?
    Change your identity online
    Stop using the internet completely
    Respond with more hurtful messages
    Block the bully and seek help from someone you trust
    30s
  • Q7
    What is the purpose of sending packets of data over the internet?
    To create a backup of the message
    To break down large messages into smaller pieces for easier transmission
    To send data in one large block
    To store data permanently
    30s
  • Q8
    What role does a router play in sending packets of data over the internet?
    It encrypts the packets for security
    It directs packets between different networks
    It converts the packets into a hard copy
    It stores the packets until they are needed
    30s
  • Q9
    Which of the following best describes how data packets are sent over the internet?
    They are stored in a central database
    They are printed and mailed physically
    They are sent individually and reassembled at the destination
    They are sent all at once as a single file
    30s
  • Q10
    What is the purpose of using packets instead of sending a full message in one piece?
    To reduce the size of the message
    To improve speed and reliability of data transmission
    To make the message look nicer
    To make it easier to write the message
    30s
  • Q11
    What are fake images often created using advanced technology called?
    Photoshops
    Imposter Images
    Fake News
    Deepfakes
    30s
  • Q12
    What type of software is often used to create fake images or videos?
    Web browsers
    Word processors
    Editing software
    Spreadsheets
    30s
  • Q13
    Which of the following is a sign that an image might be fake?
    Normal colors
    High resolution
    Inconsistent lighting or shadows
    Clear focus
    30s
  • Q14
    What is one way to verify the authenticity of an image you find online?
    Adding filters
    Color adjustment
    Downloading the image
    Reverse image search
    30s
  • Q15
    What is the primary purpose of creating fake images in media?
    To showcase photography skills
    To entertain audiences
    To mislead or manipulate viewers
    To enhance storytelling
    30s

Teachers give this quiz to your class