Safe & Responsible use of ICT

Safe & Responsible use of ICT

7th - 8th Grade

10 Qs

quiz-placeholder

Similar activities

KONSEP DASAR INTERNET DAN KEAMANAN DATA KELAS 8

KONSEP DASAR INTERNET DAN KEAMANAN DATA KELAS 8

8th Grade - University

10 Qs

Computer Lab Rules

Computer Lab Rules

5th - 11th Grade

10 Qs

Cyber - Safety

Cyber - Safety

3rd - 12th Grade

7 Qs

Collaborating Online Assessment

Collaborating Online Assessment

6th - 8th Grade

15 Qs

Safe online shopping

Safe online shopping

5th Grade - Professional Development

6 Qs

The Internet

The Internet

6th Grade - Professional Development

14 Qs

Password & security

Password & security

7th - 8th Grade

15 Qs

Conducting Online Research

Conducting Online Research

7th Grade

10 Qs

Safe & Responsible use of ICT

Safe & Responsible use of ICT

Assessment

Quiz

Computers

7th - 8th Grade

Medium

Created by

Gabriel Aloisio

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who should know your password?

My household pet.

Only me.

The staff member of a website I use, of whom has just emailed me asking for my login details to fix something wrong with my profile.

Close friends and family, in case I forget.

Answer explanation

Even if your pet is incapable of human speech, the correct answer is always you, and only you.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "doxxing"?

Sharing someone's private details online.

Hacking into someone's profile.

Impersonating somebody else on social media.

Using somebody else's credit card to buy things online.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which these are outright examples of "Doxxing"?

Leaking someone's bank details online.

Posting a photo of someone else's family.

Publishing a video with another user's home address.

Sharing an email address in a comment.

Answer explanation

While posting a photo of someone else's family is weird and could be considered doxxing under certain circumstances, these two answers are considered outright examples.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following passwords are considered "strong"?

Graeme123#

NsW-22

password

d5WxzLi81G#!

Answer explanation

For the sake of security, please don't use this any of these examples as a password.

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

How often should you backup and update your devices?

As often as possible.

Weekly, monthly, half-yearly... As long as it's regular!

Never. I live life on the edge.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Multi-Factor Authentication (MFA)?

Using a really strong password.

Authenticating your identity via an app or separate service.

Providing two or more factors to verify a login.

I have no idea because I didn't read the resource and I should go back and read it.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes the use of Multi-Factor Authentication (MFA)?

All of these are legitimate uses of MFA.

Logging into a site with both a password and a fingerprint.

Signing in with a password, and then confirming with a push notification on your phone.

Inputting your password and a separately issued code for confirmation.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?