placeholder image to represent content

Online Safety Pre-Assessment

Quiz by Alexandra Larson

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
19 questions
Show answers
  • Q1
    Is "WS1979" a strong password?
    Yes
    No
    60s
  • Q2
    Julia receives an email from an unknown source. The subject of the email looks strange and it has an attachment. What should Julia do?
    Open the attachment
    Respond to the email
    Forward the email
    Delete the email
    60s
  • Q3
    A __________ attaches itself to a file or program, enabling it to spread from one computer to another.
    worm
    computer virus
    60s
  • Q4
    A digital asset can contain textual content, images, and multimedia.
    True
    False
    60s
  • Q5
    What type of identity theft occurs when a thief uses someone else's identity to gain medical treatment or commit insurance fraud?
    Financial
    Medical
    Governmental
    Criminal
    60s
  • Q6
    Free Wi-Fi is typically offered on a(n) __________ network.
    open
    unencrypted
    encrypted
    private
    60s
  • Q7
    Protecting what is added to your digital footprint is important because potentially embarrassing information can remain on-line ___________.
    up to 6 months
    until removed
    until it is forgotten
    forever
    60s
  • Q8
    A digital footprint is all of the information on-line about a person posted by that person or others, ____________.
    recklessly
    intentionally or unintentionally
    intentionally
    unintentionally or accidentally
    60s
  • Q9
    Identity theft is when someone wrongfully obtains and uses another person's personal data, typically for economic gain.
    False
    True
    60s
  • Q10
    A ___________ spreads from one machine to another, rapidly, without human action.
    worm
    computer virus
    60s
  • Q11
    Hiring managers and college admissions officers are some of the people who use social media and other Internet resources to research candidates for employment.
    False
    True
    60s
  • Q12
    Which type of identity theft occurs when a thief uses someone else's identity to commit a crime?
    Medical
    Criminal
    Financial
    Governmental
    60s
  • Q13
    In order to protect your passwords, don't use easy-to-guess information, don't share your passwords, and NEVER change your passwords.
    False
    True
    60s
  • Q14
    Email attachments, fictitious websites, pop-up ads, and spam are all ways malware can be shared.
    True
    False
    60s
  • Q15
    _____________ is the act of breaking into a computer to steal information.
    Lifting
    Hacking
    Identity theft
    Safe-cracking
    60s

Teachers give this quiz to your class