NAME

Question types


Start with


Question limit

of 20 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. Cyber Bullying
  2. Spam
  3. Privacy Settings
  4. Virus
  5. Sprite
  1. a Originating from the name of Hormel's canned meat, "spam" now also refers to junk e-mail or irrelevant postings to a newsgroup or bulletin board.
  2. b An imaginary character/object that takes the place of an actual photo/image; a sprite is used to increase your privacy online.
  3. c A software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer.
  4. d The ability to control access of information about oneself.
  5. e Bullying that takes place by email, instant messaging, text messages o.r web sites

5 Multiple choice questions

  1. A secret series of characters that enables a user to access a file, computer, or program.
  2. Provides nearly unlimited access to predators and hackers who can then steal your financial, medical, and other personal information.
  3. A technique often used to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail and/or social networking "questionaires".
  4. A confidential website where you can report inappropriate behavior or concerns.
  5. Malicious software designed to infiltrate or damage a computer system without the user's informed consent.

5 True/False questions

  1. FlamingThe act of posting or sending offensive messages over the Internet; "telling someone off" using text, chat, or social networking postings.

          

  2. ShoutingTyping an entire sentence in "all caps."

          

  3. Digital FootprintInformation gathered by "googling" someone, or something. Once online . . . ALWAYS online!

          

  4. WormA software program capable of reproducing itself that can spread from one computer to the next over a network.

          

  5. SpywareMalicious software designed to infiltrate or damage a computer system without the user's informed consent.

          

Create Set