Search Header Logo

Digital Citizenship and Cybersecurity

Authored by Kelly Lavertu

Computers

9th - 12th Grade

Used 3+ times

Digital Citizenship and Cybersecurity
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A person’s digital footprint is:

Public, but not usually permanent

Only public to people whom a person shares things with, but what’s there is permanent

Public and permanent to anyone

Private and temporary

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following people can access your digital footprint?

I. Teachers, colleges, and scholarship committees

II. Potential employers

III. Family, friends, and acquaintances

I only

I and II only

III only

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you are a victim of cyberbullying?

I. Respond to the bully

II. Keep a record of messages received (print or take screenshots)

III. Reach out to parents, teachers, counselors, and school administrators

IV. Block communication from the bully (if possible)

I only

II, III, and IV

II and III

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you be an upstander if you witness cyberbullying?

Reach out to the victim–let them know that you care and encourage them to seek help

Tell a teacher, parent, or counselor about the bullying

Report bullying to the website admin

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, even if you change your settings.

True. This is always the case.

True. Changing your settings does not affect the privacy policy.

False. It depends if the privacy policy allows you to opt in or out of sharing data.

False. Companies do not give you the option to update your settings.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of two factor authentication?

You are asked to factor a large prime number in order to gain access to sensitive data.

You are asked to reset your password every other time you enter a secure website.

After inputting your password, you are asked to enter it again.

After inputting your password, you receive a text message with a unique pin.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following pieces of information would be safe to include in an online username?

School mascot

Favorite sport

Year of birth

City of residence

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?