placeholder image to represent content

Module 2: Online Safety, Security, Ethics, and Etiquette Quiz No. 2

Quiz by Louiegene Donato

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
15 questions
Show answers
  • Q1
    It is an act of engaging an underage minor into inappropriate sexual relationships through the internet.
    Flaming
    Online Predation
    Cyberstalking
    Cyberbullying
    30s
  • Q2
    It focuses on the acceptable use of online resources in an online social environment.
    Good Moral
    Netiquette
    Nethics
    Online Ethics
    30s
  • Q3
    Dan has finished all the written reports. He saved it in a flash drive and he submitted it to his manager. The manager called him and said that his flash drive is empty. Dan’s flash drive was infected with ____________.
    Computer Virus
    Malware
    Spam
    Phisher
    30s
  • Q4
    Precy has received an email from the bank asking her to update her personal information for security purposes. She clicked the link and signed in. Unknowingly, Precy is already a victim of ____________.
    Flaming
    Blogging
    Phishing
    Pharming
    30s
  • Q5
    You received a comment from an unknown friend in one of your posts in Social Media saying “YOU IDIOT!”. What do you call this kind of act?
    Blogging
    Acting
    Flaming
    Bullying
    30s
  • Q6
    It is an internet threat that acquires sensitive personal information like passwords and credit card credentials.
    Phishing
    Malware
    Spam
    Virus
    30s
  • Q7
    It refers to a set of rules for an acceptable online behaviour.
    Ethics
    Good Moral
    Netiquette
    Nethics
    30s
  • Q8
    This is one form of an internet advertising used by advertisers to get the attention of web users but sometimes has an obscene or an offensive content
    Infographics
    Adverts
    Cards
    Pop-ads
    30s
  • Q9
    It is a software that can see all the things you are doing in your computer.
    Tracker
    Hacker
    Attacker
    Spyware
    30s
  • Q10
    It is an act of following, secret surveillance, persistent and manipulative calling and texting, and other means of approaching the victim unexpectedly using an online technology.
    Cyberbullying
    Cyberstalking
    Cyber-crime
    Tracking
    30s
  • Q11
    Devon is fund of taking photos. While they are practicing their play, he takes an embarrassing photo of Lori who is a very shy girl. He then posts the photo on social media and spread it to his friends. Lori is a victim of ___________________.
    Online Predation
    Flaming
    Cyberbullying
    Cyberstalking
    30s
  • Q12
    Lily knows that the website of BPI Bank is www.bpibank.com so she typed it in the address bar and log in to the system. Unknowingly upon signing in, Lily’s username and password has already been compromised and is now a victim of ___________.
    Flaming
    Phishing
    Blogging
    Pharming
    30s
  • Q13
    It is a deceitful practice of getting your personal information using email or text messages.
    Pharming
    Flaming
    Blogging
    Phishing
    30s
  • Q14
    It is a small program or script that can negatively affect the health of your computer.
    Phisher
    Virus
    Malware
    Spam
    30s
  • Q15
    He is a clever or expert programmer who can gain unauthorized access to other computers.
    Spyware
    Hacker
    Tracker
    Attacker
    30s

Teachers give this quiz to your class