Search Header Logo

Safe & Responsible use of ICT

Authored by Gabriel Aloisio

Computers

7th - 8th Grade

Used 4+ times

Safe & Responsible use of ICT
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who should know your password?

My household pet.

Only me.

The staff member of a website I use, of whom has just emailed me asking for my login details to fix something wrong with my profile.

Close friends and family, in case I forget.

Answer explanation

Even if your pet is incapable of human speech, the correct answer is always you, and only you.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "doxxing"?

Sharing someone's private details online.

Hacking into someone's profile.

Impersonating somebody else on social media.

Using somebody else's credit card to buy things online.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which these are outright examples of "Doxxing"?

Leaking someone's bank details online.

Posting a photo of someone else's family.

Publishing a video with another user's home address.

Sharing an email address in a comment.

Answer explanation

While posting a photo of someone else's family is weird and could be considered doxxing under certain circumstances, these two answers are considered outright examples.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following passwords are considered "strong"?

Graeme123#

NsW-22

password

d5WxzLi81G#!

Answer explanation

For the sake of security, please don't use this any of these examples as a password.

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

How often should you backup and update your devices?

As often as possible.

Weekly, monthly, half-yearly... As long as it's regular!

Never. I live life on the edge.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Multi-Factor Authentication (MFA)?

Using a really strong password.

Authenticating your identity via an app or separate service.

Providing two or more factors to verify a login.

I have no idea because I didn't read the resource and I should go back and read it.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes the use of Multi-Factor Authentication (MFA)?

All of these are legitimate uses of MFA.

Logging into a site with both a password and a fingerprint.

Signing in with a password, and then confirming with a push notification on your phone.

Inputting your password and a separately issued code for confirmation.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?