Search Header Logo

03/3/21- P4. Cyber Security Review

Authored by Michelle Aiken

Instructional Technology

6th - 8th Grade

Used 2+ times

03/3/21- P4. Cyber Security Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Christina is on social media. She sees that many other students from her school are targeting the new foreign exchange student, who is also on the same social media. They are making fun of his clothes, haircut and accent. She decides to stand-up for the student hoping that the other students realize that they are cyberbullying. What are Christina's actions an example of?

Upstander

Bystander

Netiquette

Observer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This past week, you posted a comment on a friend's social network page, you tweeted an update about your work schedule, and you chatted with a new friend in an online chat room. How long can the information you posted and sent be stored online?

Forever

1 day

1 week

It does not save the information at all

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Pamela is a popular student in high school and known for her open social life. She posts everything she does online, including inappropriate pictures and private intimate details. Which of the following consequences is most likely to occur?

Nothing. It will go unnoticed.

Her parents are proud of her and throw her a big, wild graduation party.

Her college application or future job is denied because her behavior and judgment are questionable.

She meets famous people who are impressed by her activities and want to be her friends.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cecilia has been told that anything she posts online is traceable. Her teacher explains that the information about herself that she posts for anyone to obtain could be damaging to her:

social media

login information

popularity at school

digital footprint

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following information is appropriate to share while playing games online?

Home address

Gaming scores

Phone number

Parents credit card information

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which online activity is one of the most popular and also poses the greatest risk to personal privacy?

Online gaming

Cyber bullying

Mobile Texting

Social networking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mario has purchased a new computer. He wants to be sure that it remains in good condition. He also does not want the computer to become infected with any malware. What would be the most common activity to cause Mario's computer to become infected with malware?

Downloading images

Using chat rooms

Downloading software

Playing online games

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?