Search Header Logo

Social Media Safety

Authored by Charlotte Williams

Computers

6th - 8th Grade

Used 10+ times

Social Media Safety
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is personal information?

Date of birth, Passwords

School, Year level

Home address, Full name

All of the above

Answer explanation

Any information that can identify you is considered personal, however it is up to you how much you keep private! Certain information, such as your passwords and home address, should never be shared, simply because the consequences of someone using that information maliciously are much greater than if you shared less important information, such as your height.

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A strong password should be..

very easy to remember

related to your personal information

a mix of numbers, letters, and special characters

unrelated to your personal information

Answer explanation

Passwords that are related to your personal information are far easier for hackers to guess than those that are completely random!

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is the strongest password of the following?

Sun$h1n3

Sunshine5533

1tsA$unnyD4Y!

Sunshine

Sun$hine

Answer explanation

Passwords with numbers, special characters, and upper and lower-case letters are the strongest! The longer and more abstract it is also helps, as well as being unrelated to any of your personal information.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

How can hackers get your information?

Blocking you

Guessing passwords

Reporting you

Phishing scams

Answer explanation

Blocking and reporting any suspicious accounts you come across can stop hackers from targeting you and others! They have many methods to access your information, however if hackers can’t see or contact you online, it becomes far more difficult for them and you are much safer.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common scam used by hackers to steal your information?

Phone calls

Phishing

Text messages

E-mails

Answer explanation

Phishing relies on people falling for scams, such as fake prizes, security checks, or bank statements. These can be carried out via text message, email, or phone calls, however are all still forms of phishing.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

These scams get delivered straight to your inbox..

Malware-laced emails

Terms of Service

Online friends

Spear phishing

Answer explanation

These scams are highly effective when they reference your real-life friends, family, organisations, and workplaces, as they become more believable. They often use disguised links that download ‘malware’, which is software such as viruses that allows hackers to gain access to your information, accounts, and even complete control of your device.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a trojan horse?

A virus

A worm

A program that copies itself

Malware that appears safe to trick you into downloading it

Answer explanation

Trojan Horse scams use disguised links, which download malware when clicked on and are hidden in ‘Download’, ‘Close Ad’, ‘Call now’, and other buttons. You may not even know the software is downloading until your device is no longer working!

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?