Stay Safe Online Campaign

Stay Safe Online Campaign

University

25 Qs

quiz-placeholder

Similar activities

HỘI THI TÌM HIỂU VỀ CHƯƠNG TRÌNH GIÁO DỤC PHỔ THÔNG TỔNG THỂ

HỘI THI TÌM HIỂU VỀ CHƯƠNG TRÌNH GIÁO DỤC PHỔ THÔNG TỔNG THỂ

1st Grade - University

20 Qs

JMSK DAY Session 2

JMSK DAY Session 2

University

20 Qs

IOT CSE B Quiz 1

IOT CSE B Quiz 1

University

20 Qs

Gordonton School Quiz Week 4 Term 2

Gordonton School Quiz Week 4 Term 2

4th Grade - University

20 Qs

EVENTO

EVENTO

University - Professional Development

20 Qs

MUN QUIZ#2

MUN QUIZ#2

7th Grade - Professional Development

20 Qs

Pre Test Workshop EWS Code Blue - 20

Pre Test Workshop EWS Code Blue - 20

University

20 Qs

Posttest Modul 2 Bahasa Inggris Niaga

Posttest Modul 2 Bahasa Inggris Niaga

University

20 Qs

Stay Safe Online Campaign

Stay Safe Online Campaign

Assessment

Quiz

Education

University

Hard

Created by

M PRAGATHESH

Used 16+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a digital footprint refers to?

A scanned image of your foot

A photograph of your shoe

All the information online about a person that is stored online

Having a blog, facebook or twitter page

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is an example of phishing?

An email directing the recipient to enter personal details on a fake website

An email warning the recipient of a computer virus threat

An email directing the recipient to forward the email to friends

An email directing the recipient to download an attachment

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following best in terms of cyber safety describes why bluetooth device settings should be adjusted ?

To increase the range of device

To prevent the risk of unauthorised access

To reduce interference from other devices

To improve the quality of reception

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is the appropriate definition of spamming ?

Gathering information about a person or organisation without their knowledge

Performing an unauthorised usually malicious action such as erasing files

Putting unnecessary load on the network by making copies of files

Sending unwanted bulk messages

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following describes a Public Network?

A network where devices outside the network cannot see or communicate directly with Computers on the network

A network where devices outside the network can see but not communicate directly with Computers on the network

A network where devices outside the network can see and communicate directly with Computers on the network

A network where devices outside the network cannot see but can communicate directly with Computers on the network

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The letter 's' in "https://" at the beginning of the URL stands for

Safe

Secure

Special

Site

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Criminals access someone's computer and encrypt the user's personal files and data. The user is unable to access this data unless they pay the criminals to decrypt the files. This is called as

Botnet

Vishing

Phishing

Ransomware

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?