
internet safety
Quiz by Kris Gerald O. Valdeavilla
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
22 questions
Show answers
- Q1it refers to the online security or safety of people and their information when using internet.PhisingNetiquetteOnline Security/SafetyFlaming30s
- Q2It is network etiquette, the do's and don'ts of online communication.PhisingFlamingNetiquetteOnline Security/Safety30s
- Q3It is a piece of malicious computer code that attaches itself to a software program, email or computer file without your permission. It can transfers through the internet and local networks or data storage like flash drives and CD’sSPAMTrojanVirusMalware30s
- Q4tricks that the user use in posting a security software. It asks the user to pay to improve his/her security but in reality that are not protected at all.VirusWormRogue Security SoftwareTrojan30s
- Q5It is a malicious program that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.SpywareTrojanSPAMWorm30s
- Q6It is a malicious program that transfers from one computer to another by any type of means. It uses computer network to spread itself. Ex. ILOVEYOU worm Love Bug Worm created by FilipinoRogue Security SoftwareVirusWormTrojan30s
- Q7It is a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through keylogging.SpywareKeyloggersTrojanVirus30s
- Q8used to record the keystroke done by the user. This is done to steal their password or any other sensitive information. It can record email, messages or any information you type using your keyboard.SpywareMalwareTrojanKeyloggers30s
- Q9A program designed to send your advertisement, mostly as pop-upsKeyloggersAdwareTrojanSPAM30s
- Q10Refers to the transmission of unsolicited messages from various origins using electric messaging systemsKeyloggersMalwareVirusSPAM30s
- Q11It is more complicated way of phishing where it exploits the DNS (Domain Name Service) systemPharmingTrojanSPAMPhishing30s
- Q12It is a software or a program used by an attacker to obtain personal information. It targets the passwords to hack and take control of a user account.FlamingPhishingVirusSPAM30s
- Q13Treat others as you would like to be treatedBe HonestNo FlamingObey Copyright LawsGolden Rule30s
- Q14It is a personal insult communicated through the internetNo FlamingVirusPhishingSPAM30s
- Q15people may misinterpretPhishingGolden RuleNo FlamingDon't type in ALL CAPS30s