Search Header Logo

CyberSecurity Cumulative

Computers

5th - 8th Grade

Used 64+ times

CyberSecurity Cumulative
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the one thing James can do to be sure he is practicing cyber-safety?

He should only connect to networks that he knows are secured.

He should use the same secure password for all social media accounts.

He should never harass others on the Internet.

He should never disclose personal information.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any game that you can connect to and play through the Internet is known as:

entertainment.

video game rental.

social networking.

online gaming.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is cyberbullying?

Threatening to punch someone if they don't do your homework.

Doing something to stop a situation that is threatening someone else.

Doing something online to embarass, threaten or hurt someone.

Sending revealing pictures of yourself to another person via text messaging.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You've downloaded a new game to your mobile phone, and it asks you for a credit card. What risk is associated with providing this information?

Your card will be charged for excess minutes or data.

Your device may become infected with computer malware, virus or worms.

Your credit card information will be provided to other game publishers.

Your card may be charged for additional components of the game that you did not request.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cecilia has been told that anything she posts online is traceable. Her teacher explains that the information about herself that she posts for anyone to obtain could be damaging to her:

social media.

digital footprint.

cyberbullies.

log-in information.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes an upstander?

a person who pretends to be someone else online

a person who threatens or embarasses others using online technology

a person who tries to stop a bullying situation

a person who ignores a bullying situation and minds his own business

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is malware dangerous?

It can install hidden applications that share your personal information without your permission.

It can keep you from accessing Web sites you want to see.

It can lock you out of your computer, until you pay a ransom fee.

It can track your personal preferences and passwords.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?