
03/3/21- P4. Cyber Security Review
Authored by Michelle Aiken
Instructional Technology
6th - 8th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Christina is on social media. She sees that many other students from her school are targeting the new foreign exchange student, who is also on the same social media. They are making fun of his clothes, haircut and accent. She decides to stand-up for the student hoping that the other students realize that they are cyberbullying. What are Christina's actions an example of?
Upstander
Bystander
Netiquette
Observer
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This past week, you posted a comment on a friend's social network page, you tweeted an update about your work schedule, and you chatted with a new friend in an online chat room. How long can the information you posted and sent be stored online?
Forever
1 day
1 week
It does not save the information at all
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Pamela is a popular student in high school and known for her open social life. She posts everything she does online, including inappropriate pictures and private intimate details. Which of the following consequences is most likely to occur?
Nothing. It will go unnoticed.
Her parents are proud of her and throw her a big, wild graduation party.
Her college application or future job is denied because her behavior and judgment are questionable.
She meets famous people who are impressed by her activities and want to be her friends.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cecilia has been told that anything she posts online is traceable. Her teacher explains that the information about herself that she posts for anyone to obtain could be damaging to her:
social media
login information
popularity at school
digital footprint
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following information is appropriate to share while playing games online?
Home address
Gaming scores
Phone number
Parents credit card information
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which online activity is one of the most popular and also poses the greatest risk to personal privacy?
Online gaming
Cyber bullying
Mobile Texting
Social networking
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Mario has purchased a new computer. He wants to be sure that it remains in good condition. He also does not want the computer to become infected with any malware. What would be the most common activity to cause Mario's computer to become infected with malware?
Downloading images
Using chat rooms
Downloading software
Playing online games
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?