Cyber Safety Assessment

Cyber Safety Assessment

5th Grade

15 Qs

quiz-placeholder

Similar activities

KLIK DENGAN BIJAK

KLIK DENGAN BIJAK

5th Grade - University

20 Qs

BÀI 3_THƯ ĐIỆN TỬ (EMAIL)_TIN HỌC 5

BÀI 3_THƯ ĐIỆN TỬ (EMAIL)_TIN HỌC 5

5th Grade

10 Qs

Dijital Vatandaşlık

Dijital Vatandaşlık

5th Grade

17 Qs

Miss Wood's Quiz - Keeping safe online

Miss Wood's Quiz - Keeping safe online

4th - 7th Grade

11 Qs

Tìm kiếm thông tin

Tìm kiếm thông tin

5th Grade

13 Qs

Sistem de operare - Recapitulare

Sistem de operare - Recapitulare

5th Grade

19 Qs

ETİK BİLGİ VE SİBER SUÇLAR

ETİK BİLGİ VE SİBER SUÇLAR

1st - 12th Grade

16 Qs

M2L3 Review Grade 5th

M2L3 Review Grade 5th

5th Grade

10 Qs

Cyber Safety Assessment

Cyber Safety Assessment

Assessment

Quiz

Computers

5th Grade

Medium

Created by

JOANNA RICHARDSON

Used 15+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Session 1 (Reading #3: Cyber Safety Glossary from Internet Safety 101) 

http://internetsafety101.org/glossaryofterms?id=glossaryofterms  

A location online that allows multiple users to communicate electronically with each other in real time, as opposed to delayed time as with e-mail is called a _______________.

Cookie 

Firewall

Chatroom

Spyware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Session 1 (Reading #3: Cyber Safety Glossary from Internet Safety 101) 

http://internetsafety101.org/glossaryofterms?id=glossaryofterms  

Online communities where people share information about themselves, music files, photos, etc. Is called __________________________. 

Skype 

Social Media or Social Network

Real-Time

Texting

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Session 1 (Optional Reading #2: How to Project Your Child from Identity Theft from the Federal Trade Commission) 

https://www.consumer.ftc.gov/articles/0040-child-identity-theft  

Child identity theft happens when someone takes a child’s sensitive personal information and uses it to get services or benefits, or to commit fraud. What information is at risk of being stolen if identity theft should happen? 

Social Security Number 

Name and Address

Date of Birth

All of the Above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Session 2 (Reading #2: Scams and Safety by the Federal Bureau of Investigation) 

https://www.fbi.gov/scams-and-safety/common-scams-and-crimes  

When elderly Americans fall victim to some type of financial fraud or confidence scheme, including romance, lottery, and sweepstakes scams, to name a few it is called ____________________________. 

Elder Fraud 

Consumer Fraud Schemes

Business and Investment Fraud

Romance Scams

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Session 2 (Reading #4: Top 10 Scams from Consumer Fraud Reporting) 

http://www.consumerfraudreporting.org/current_top_10_scam_list.php  

What is it called when you get a friend request from someone on Facebook who you are already friends with? 

Click Bait Scam 

Phishing Scam

Facebook Fake Friend Scam

This is not a scam

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Session 2: (Optional Reading #3:10 Tips for Spotting a Phishing Email from TechRepublic) 

http://www.techrepublic.com/blog/10-things/10-tips-for-spotting-a-phishing-email/  

True or False: If a message or email is filled with poor grammar or spelling mistakes, it probably didn’t come from a major corporation’s legal department and could most likely be considered a phishing scam. 

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Session 3: (Reading #2: What Faculty Need to Know About Copyright for Teaching from the American University Library)   

 

Under U.S. Copyright Law, the copyright owner has the exclusive right to do or authorize the following: 

reproduce their works in copies or phonorecords

distribute copies or phonorecords to the public by sale or transfer of ownership 

perform publicly literary, musical, dramatic, and choreographic works, pantomimes 

All of the Above 

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?