Search Header Logo

CyberSecurity Review: Personal Identification & Protecting Your System

Authored by Lisa Armstead

Computers

6th - 8th Grade

Used 60+ times

CyberSecurity Review: Personal Identification & Protecting Your System
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes a set of rules for appropriate behavior while on the Internet?

Identity

Netiquette

CyberSecurity

Social Network

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One of the most popular online activities — and one that poses the greatest risk to your privacy — is:

Online Gaming

Social Networking

Watching Movies

Checking email messages

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is a good way to keep your online privacy?

Make your posts visible to everyone, all the time. .

Make your hometown, school, and sports team visible in your profile.

Post your cell phone number online.

Use an avator

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is: “The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs; freedom to be let alone”

CyberSecurity

Netiquette

Freedom

Privacy

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are: files stored on your computer (cell phone) that tell browsers how to remember your favorites and your previous searches, and can fill in fields for you

Identity

Cookies

Dossier

Status

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are: Settings on social networks that allow users to control who sees what they post, and they can either be

adjusted post by post, or set to a default setting.

Privacy settings

Screen name

Profile picture

Safety

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any program or file that is designed to damage a computer, tablet, or smartphone, or to gain unauthorized access to a device.

Trojans

Phishing

Pharming

Malware

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?