NAME

Question types


Start with


Question limit

of 20 available terms

Print test

5 Written questions

5 Matching questions

  1. Cyber Bullying
  2. Password
  3. Virus
  4. Spyware
  5. Sprite
  1. a Program placed on a computer without the user's knowledge that secretly collects information about the user.
  2. b An imaginary character/object that takes the place of an actual photo/image; a sprite is used to increase your privacy online.
  3. c A secret series of characters that enables a user to access a file, computer, or program.
  4. d Bullying that takes place by email, instant messaging, text messages o.r web sites
  5. e A software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer.

5 Multiple choice questions

  1. Defines the URL of a "secure" site.
  2. Provides nearly unlimited access to predators and hackers who can then steal your financial, medical, and other personal information.
  3. A confidential website where you can report inappropriate behavior or concerns.
  4. Typing an entire sentence in "all caps."
  5. Malicious software designed to infiltrate or damage a computer system without the user's informed consent.

5 True/False questions

  1. PhishingTyping an entire sentence in "all caps."

          

  2. ScoutsAn imaginary character/object that takes the place of an actual photo/image; a sprite is used to increase your privacy online.

          

  3. Digital FootprintInformation gathered by "googling" someone, or something. Once online . . . ALWAYS online!

          

  4. SpamA software program capable of reproducing itself that can spread from one computer to the next over a network.

          

  5. FlamingThe act of posting or sending offensive messages over the Internet; "telling someone off" using text, chat, or social networking postings.