placeholder image to represent content

Year 8 Homework 2

Quiz by KS3 IT

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
12 questions
Show answers
  • Q1
    What does the acronym VPN stand for?
    Visible Public Network
    Virtual Private Network
    Virtual Public Network
    Virtual Proxy Network
    30s
  • Q2
    What is phishing?
    A type of computer virus
    A method of encrypting data
    A form of cyber attack that uses deceptive techniques to trick individuals into revealing sensitive information
    A technique used to improve network security
    30s
  • Q3
    What is two-factor authentication?
    A security measure that requires users to provide two different forms of identification to access an account or system
    A type of computer virus that spreads through email attachments
    A method of securely storing passwords
    A technique used to speed up internet connection
    30s
  • Q4
    What is malware?
    Malicious software designed to harm or exploit computer systems and networks
    A type of computer hardware
    A technique for improving internet speed
    A method of backing up data
    30s
  • Q5
    What is a cookie in the context of internet browsing?
    A small piece of data stored on a user's device by a website, used to track and remember information about the user's interactions and preferences
    A type of computer virus
    A tool for blocking website access
    A method of encrypting internet traffic
    30s
  • Q6
    What is a firewall?
    A cloud-based storage service
    A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
    A software for managing social media accounts
    A type of computer virus
    30s
  • Q7
    Which of the following is a wireless method of connecting devices to a network?
    The internet
    An ethernet cable
    WIFI
    Fibre optic
    30s
  • Q8
    Which of the following is NOT a good practice for creating a secure password?
    Using a long password with more than 20 characters.
    Using a randomly generated password.
    Using a combination of uppercase and lowercase letters.
    Using a common word or phrase as a password.
    30s
  • Q9
    Which of the following is an example of cyber bullying?
    Excluding someone from a group chat
    Sharing a funny meme with friends
    Creating a fake social media account to mock and harass someone
    Teasing someone in person
    30s
  • Q10
    What is the most common platform for cyber bullying?
    Social media
    Text messaging
    Online gaming
    Email
    30s
  • Q11
    What is an example of indirect cyber bullying?
    Sharing a funny video
    Participating in an online quiz
    Sending a friendly message to someone
    Spreading rumors about someone online
    Liking someone's photo on social media
    30s
  • Q12
    What is the legal term for cyber bullying?
    Digital pranking
    Social media addiction
    Online harassment
    Online stalking
    Internet trolling
    30s

Teachers give this quiz to your class