
Year 7 Recap Term 2
Quiz by Paul Cummins
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
17 questions
Show answers
- Q1Which of the following is the best way to find reliable information for a school project?Searching random websites on GoogleAsking friends for their opinionsReading social media postsUsing a library database30s
- Q2What type of source is considered the most reliable for academic research?Peer-reviewed journal articlesWikipedia articlesInstagram postsPersonal blogs30s
- Q3What is a good practice when gathering information from multiple sources?Copying information without citationsOnly using the first source you findRelying on only one viewpointCross-checking facts across sources30s
- Q4Which of the following is a type of malicious software that can steal personal information from your computer?SpywareWeb browserAntivirusFirewall30s
- Q5What type of malicious software is often disguised as legitimate software but is harmful to your computer?Trojan horseWormRootkitAdware30s
- Q6What type of malicious software replicates itself to spread to other computers?SpywareRansomwareWormAdware30s
- Q7Which type of malicious software encrypts your files and demands payment to unlock them?Trojan horseRansomwareSpywareWorm30s
- Q8What is a type of malware that displays unwanted advertisements on your computer?SpywareMalwareRansomwareAdware30s
- Q9What type of malicious software replicates itself and spreads from one computer to another through networks?Trojan horseRansomwareVirusWorm30s
- Q10Which type of malicious software can manipulate your web browser to show you fake login pages?AdwareWormTrojan horsePhishing malware30s
- Q11Which of the following is a good practice for creating a strong password?Using the same password for all accountsUsing your name and birthdateUsing a mix of letters, numbers, and symbolsChoosing a short and simple word30s
- Q12What should you do if you receive a message from someone you don’t know online?Reply and ask who they areIgnore it and carry on without concernDo not respond and report the messageClick on any links they send30s
- Q13What is a common sign of a phishing attempt?A notification about a software updateA message from a friendAn invitation to a gaming eventAn email that asks for your personal information30s
- Q14Why is it important to keep your personal information private when using social media?To make more friends easilyTo avoid having too many followersTo protect yourself from identity theft and online predatorsTo get more likes on your posts30s
- Q15What should you do if you see something online that makes you uncomfortable?Share it with your friendsTry to handle it on your ownKeep it to yourselfTell a trusted adult about it30s