
Online Safety Pre-Assessment
Quiz by Alexandra Larson
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
19 questions
Show answers
- Q1Is "WS1979" a strong password?YesNo60s
- Q2Julia receives an email from an unknown source. The subject of the email looks strange and it has an attachment. What should Julia do?Open the attachmentRespond to the emailForward the emailDelete the email60s
- Q3A __________ attaches itself to a file or program, enabling it to spread from one computer to another.wormcomputer virus60s
- Q4A digital asset can contain textual content, images, and multimedia.TrueFalse60s
- Q5What type of identity theft occurs when a thief uses someone else's identity to gain medical treatment or commit insurance fraud?FinancialMedicalGovernmentalCriminal60s
- Q6Free Wi-Fi is typically offered on a(n) __________ network.openunencryptedencryptedprivate60s
- Q7Protecting what is added to your digital footprint is important because potentially embarrassing information can remain on-line ___________.up to 6 monthsuntil removeduntil it is forgottenforever60s
- Q8A digital footprint is all of the information on-line about a person posted by that person or others, ____________.recklesslyintentionally or unintentionallyintentionallyunintentionally or accidentally60s
- Q9Identity theft is when someone wrongfully obtains and uses another person's personal data, typically for economic gain.FalseTrue60s
- Q10A ___________ spreads from one machine to another, rapidly, without human action.wormcomputer virus60s
- Q11Hiring managers and college admissions officers are some of the people who use social media and other Internet resources to research candidates for employment.FalseTrue60s
- Q12Which type of identity theft occurs when a thief uses someone else's identity to commit a crime?MedicalCriminalFinancialGovernmental60s
- Q13In order to protect your passwords, don't use easy-to-guess information, don't share your passwords, and NEVER change your passwords.FalseTrue60s
- Q14Email attachments, fictitious websites, pop-up ads, and spam are all ways malware can be shared.TrueFalse60s
- Q15_____________ is the act of breaking into a computer to steal information.LiftingHackingIdentity theftSafe-cracking60s