Safe & Responsible use of ICT

Safe & Responsible use of ICT

7th - 8th Grade

10 Qs

quiz-placeholder

Similar activities

Cyber Security–Encryption & Prevention Measures Homework

Cyber Security–Encryption & Prevention Measures Homework

7th - 9th Grade

15 Qs

Password + Safety

Password + Safety

7th Grade

11 Qs

Computing Y7 Level 1

Computing Y7 Level 1

8th Grade

15 Qs

Password Do's and Don'ts

Password Do's and Don'ts

6th - 8th Grade

12 Qs

Password Security

Password Security

6th - 8th Grade

10 Qs

ICT 8 - Chapter 2 - Privacy Q&A

ICT 8 - Chapter 2 - Privacy Q&A

8th Grade

15 Qs

Year 7 October

Year 7 October

7th Grade

15 Qs

Python Inputs

Python Inputs

7th - 8th Grade

10 Qs

Safe & Responsible use of ICT

Safe & Responsible use of ICT

Assessment

Quiz

Computers

7th - 8th Grade

Medium

Created by

Gabriel Aloisio

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who should know your password?

My household pet.

Only me.

The staff member of a website I use, of whom has just emailed me asking for my login details to fix something wrong with my profile.

Close friends and family, in case I forget.

Answer explanation

Even if your pet is incapable of human speech, the correct answer is always you, and only you.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "doxxing"?

Sharing someone's private details online.

Hacking into someone's profile.

Impersonating somebody else on social media.

Using somebody else's credit card to buy things online.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which these are outright examples of "Doxxing"?

Leaking someone's bank details online.

Posting a photo of someone else's family.

Publishing a video with another user's home address.

Sharing an email address in a comment.

Answer explanation

While posting a photo of someone else's family is weird and could be considered doxxing under certain circumstances, these two answers are considered outright examples.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following passwords are considered "strong"?

Graeme123#

NsW-22

password

d5WxzLi81G#!

Answer explanation

For the sake of security, please don't use this any of these examples as a password.

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

How often should you backup and update your devices?

As often as possible.

Weekly, monthly, half-yearly... As long as it's regular!

Never. I live life on the edge.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Multi-Factor Authentication (MFA)?

Using a really strong password.

Authenticating your identity via an app or separate service.

Providing two or more factors to verify a login.

I have no idea because I didn't read the resource and I should go back and read it.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes the use of Multi-Factor Authentication (MFA)?

All of these are legitimate uses of MFA.

Logging into a site with both a password and a fingerprint.

Signing in with a password, and then confirming with a push notification on your phone.

Inputting your password and a separately issued code for confirmation.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?