
Module 2 : Pre -Test Online Safety, Security, Ethics, and Etiquette
Quiz by Lira Rosales Amansec- Poblete
Grade 11-12
Empowerment Technologies
Philippines Curriculum: SHS Applied Subjects (MELC)
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
15 questions
Show answers
- Q1You received a comment from an unknown friend in one of your posts inSocial Media saying “YOU IDIOT!”. What do you call this kind of act?BullyingFlamingActingBlogging30s
- Q2It is an internet threat that acquires sensitive personal information like passwords and credit card credentials.PhishingSpamPhishingMalware30s
- Q3It refers to a set of rules for an acceptable online behaviour.NetiquetteGood MoralNethicsEthics30s
- Q4This is one form of internet advertising used by advertisers to get the attention of web users but sometimes has obscene or offensive content.Pop-adsAdvertsCardsInfographics30s
- Q5It is a software that can see all the things you are doing in your computer.SpywareAttackerTrackerHacker30s
- Q6It is a deceitful practice of getting your personal information using email or text messages.BloggingFlamingPhishingPharming30s
- Q7It is a small program or script that can negatively affect the health of your computer.VirusSpamPhisherMalware30s
- Q8He is a clever or expert programmer who can gain unauthorized access to other computers.SpywareHackerTrackerAttacker30s
- Q9It is an act of following, secret surveillance, persistent and manipulative calling and texting, and other means of approaching the victim unexpectedly using online technology.TrackingCyber-crimeCyberbullyingCyberstalking30s
- Q10It is an act of engaging an underage minor into inappropriate sexual relationships through the internet.Online PredationFlamingCyberstalkingCyberbullying30s
- Q11It focuses on the acceptable use of online resources in an online social environment.Online EthicsGood MoralNethicsNetiquette30s
- Q12Dan has finished all the written reports. He saved it in a flash drive and he submitted it to his manager. The manager called him and said that his flash drive is empty. Dan’s flash drive was infected with ____________.MalwareSpamComputer VirusPhisher30s
- Q13Precy has received an email from the bank asking her to update her personal information for security purposes. She clicked the link and signed in. Unknowingly, Precy is already a victim of ____________.FlamingPhishingBloggingPharming30s
- Q14Devon is fund of taking photos. While they are practicing their play, he takes an embarrassing photo of Lori who is a very shy girl. He then posts the photo on social media and spread it to his friends. Lori is a victim of ___________________.FlamingCyberstalkingOnline PredationCyberbullying30s
- Q15Lily knows that the website of BPI Bank is www.bpibank.com so she typed it in the address bar and log in to the system. Unknowingly upon signing in, Lily’s username and password has already been compromised and is now a victim of ___________.PhishingBloggingPharmingFlaming30s