Search Header Logo

Online Safety

Authored by Tammy Muna

Computers

6th - 8th Grade

Used 144+ times

Online Safety
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Is "WS1979" a strong password? 

Yes
No
Maybe

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Protecting what is added to your digital footprint is important because potentially embarrassing information can remain on-line ___________.

Forever
Until its forgotten
Up to 6 months
Until its removed

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of identity theft occurs when a thief uses someone else's identity to gain medical treatment or commit insurance fraud?

Criminal
Governmental
Financial
Medical

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which type of identity theft occurs when a thief uses someone else's identity to commit a crime? 

Governmental
Medical
Criminal
Financial

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A __________ attaches itself to a file or program, enabling it to spread from one computer to another. 

Computer virus
Worm
Snake
Scam

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The primary goal of an Internet scam is to gain access to someone's personal information or their finances

True
False

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Email attachments, fictitious websites, pop-up ads, and spam are all ways malware can be shared. 

True
Maybe
False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?