
Safe & Responsible use of ICT
Authored by Gabriel Aloisio
Computers
7th - 8th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Who should know your password?
My household pet.
Only me.
The staff member of a website I use, of whom has just emailed me asking for my login details to fix something wrong with my profile.
Close friends and family, in case I forget.
Answer explanation
Even if your pet is incapable of human speech, the correct answer is always you, and only you.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is "doxxing"?
Sharing someone's private details online.
Hacking into someone's profile.
Impersonating somebody else on social media.
Using somebody else's credit card to buy things online.
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which these are outright examples of "Doxxing"?
Leaking someone's bank details online.
Posting a photo of someone else's family.
Publishing a video with another user's home address.
Sharing an email address in a comment.
Answer explanation
While posting a photo of someone else's family is weird and could be considered doxxing under certain circumstances, these two answers are considered outright examples.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following passwords are considered "strong"?
Graeme123#
NsW-22
password
d5WxzLi81G#!
Answer explanation
For the sake of security, please don't use this any of these examples as a password.
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
How often should you backup and update your devices?
As often as possible.
Weekly, monthly, half-yearly... As long as it's regular!
Never. I live life on the edge.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Multi-Factor Authentication (MFA)?
Using a really strong password.
Authenticating your identity via an app or separate service.
Providing two or more factors to verify a login.
I have no idea because I didn't read the resource and I should go back and read it.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes the use of Multi-Factor Authentication (MFA)?
All of these are legitimate uses of MFA.
Logging into a site with both a password and a fingerprint.
Signing in with a password, and then confirming with a push notification on your phone.
Inputting your password and a separately issued code for confirmation.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?