IGCSE ICT Revision Notes – E-Safety

IGCSE ICT Revision Notes – E-Safety

8th Grade

80 Qs

quiz-placeholder

Similar activities

Coding Unit 1

Coding Unit 1

6th - 8th Grade

80 Qs

 Day 5 Practice 1 CompTIA IT Fundamentals+ Certification Quiz

Day 5 Practice 1 CompTIA IT Fundamentals+ Certification Quiz

8th Grade

80 Qs

The Inevitable End-of-Year Quiz

The Inevitable End-of-Year Quiz

1st - 12th Grade

79 Qs

KELAS 2-LATIHAN SOAL SAT INFORMATIKA SM2

KELAS 2-LATIHAN SOAL SAT INFORMATIKA SM2

2nd Grade - University

80 Qs

simulasi 2

simulasi 2

1st - 12th Grade

75 Qs

rappers drippy ice🥶

rappers drippy ice🥶

KG - Professional Development

81 Qs

ASAS TIK K7

ASAS TIK K7

7th Grade - University

76 Qs

Microsoft Word

Microsoft Word

6th - 8th Grade

83 Qs

IGCSE ICT Revision Notes – E-Safety

IGCSE ICT Revision Notes – E-Safety

Assessment

Quiz

Computers

8th Grade

Practice Problem

Hard

Created by

Shervon Yak

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

80 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is E-Safety? Fill in the blank: E-Safety is protecting people and information from online risks such as ________, identity theft, cyberbullying, and inappropriate content.

fraud

weather

exercise

cooking

Answer explanation

E-Safety involves protecting individuals from various online threats. The correct answer, 'fraud', fits as it is a significant online risk alongside identity theft, cyberbullying, and inappropriate content.

2.

MATCH QUESTION

30 sec • 1 pt

Match the following online risks to their examples:

Fake email asking for bank info

Identity Theft

Harassment on social media

Cyberbullying

Virus, worm, spyware

Malware

Using someone’s details online

Hacking

Unauthorized access

Phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a prevention method for cyberbullying?

Block/report users; don’t reply; tell an adult

Use firewalls, antivirus, strong passwords

Enable content filters and parental controls

Update OS, don’t open unknown attachments

Answer explanation

The correct choice, 'Block/report users; don’t reply; tell an adult', directly addresses how to prevent cyberbullying by encouraging users to take action against bullies and seek help from trusted adults.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: To prevent phishing, you should check sender, don’t click links, and look for _______.

HTTPS

pop-ups

attachments

emojis

Answer explanation

To prevent phishing, it's crucial to check for HTTPS in the URL, as it indicates a secure connection. This helps ensure that the website is legitimate and protects your data, unlike pop-ups, attachments, or emojis.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which prevention method helps protect against identity theft?

Keep passwords private; use MFA

Avoid sharing personal info/photos

Enable content filters and parental controls

Use firewalls, antivirus, strong passwords

Answer explanation

Keeping passwords private and using multi-factor authentication (MFA) significantly enhances security, making it harder for identity thieves to access personal information.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: To prevent malware, you should update OS and don’t open _______ attachments.

unknown

trusted

official

secure

Answer explanation

To prevent malware, it's crucial to avoid opening attachments from unknown sources. Trusted, official, or secure attachments are generally safe, but unknown attachments can contain harmful software.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a recommended action to prevent grooming online?

Avoid sharing personal info/photos

Use firewalls, antivirus, strong passwords

Block/report users; don’t reply; tell an adult

Enable content filters and parental controls

Answer explanation

Avoiding sharing personal info/photos is crucial to prevent grooming online, as it limits the information potential groomers can exploit. Keeping personal details private helps protect against unwanted attention.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers