Year 7 IT - Quiz 2 - Cybersafety And Animation

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Jameslee1979
J
Jameslee1979
Community Contributor
Quizzes Created: 2 | Total Attempts: 1,526
Questions: 21 | Attempts: 1,042

SettingsSettingsSettings
Cyber Safety Quizzes & Trivia

ICT Quiz 2 - Cybersafety and Animation


Questions and Answers
  • 1. 

    A predator online who pretends to be a friend and tries to meet you in person is known as:

    • A.

      Cyberbullying

    • B.

      Cyberstalking

    • C.

      Cybergrooming

    • D.

      Cybermeeting

    Correct Answer
    C. Cybergrooming
    Explanation
    Cybergrooming refers to the act of an online predator who pretends to be a friend in order to establish a relationship with the intention of meeting the victim in person. This behavior is a form of online manipulation where the predator gains the trust of the victim before exploiting them offline. It is important to be aware of this type of online threat and take necessary precautions to protect oneself from such predators.

    Rate this question:

  • 2. 

    A predator online who goes through all your details on the internet to find you is called:

    • A.

      Cyberbullying

    • B.

      Cyberstalking

    • C.

      Cybergrooming

    • D.

      Cybermeeting

    Correct Answer
    B. Cyberstalking
    Explanation
    Cyberstalking refers to the act of an online predator who meticulously searches and gathers personal information about an individual on the internet with the intention of locating and potentially harming them. This behavior involves persistent and unwanted attention, often leading to fear and distress for the victim. It is important to be aware of cyberstalking and take necessary precautions to protect oneself online.

    Rate this question:

  • 3. 

    Being sent SMS, email or online groups message threatening and teasing you is called:

    • A.

      Cyberbullying

    • B.

      Cyberstalking

    • C.

      Cybergrooming

    • D.

      Cybermeeting

    Correct Answer
    A. Cyberbullying
    Explanation
    Cyberbullying refers to the act of sending threatening or teasing messages through SMS, email, or online groups. It involves the use of technology to harass, intimidate, or humiliate someone. This can include sending abusive or derogatory messages, spreading rumors, or sharing embarrassing photos or videos. Cyberbullying can have serious emotional and psychological effects on the victim, and it is important to address and report such behavior to ensure the safety and well-being of individuals online.

    Rate this question:

  • 4. 

    Someone sends you a message threatening they are going to kill you. What do you do?

    • A.

      Ignore it

    • B.

      Delete it

    • C.

      Show it to parents/police

    • D.

      Reply back

    Correct Answer
    C. Show it to parents/police
    Explanation
    The correct answer is to show the threatening message to parents or the police. This is the most appropriate action to take when receiving a serious threat. By involving trusted adults or authorities, they can assess the situation, provide guidance, and take necessary steps to ensure your safety. Ignoring or deleting the message may not address the potential danger and could put you at risk. Replying back to the sender might escalate the situation further.

    Rate this question:

  • 5. 

    What ONE of the following is OK to put online?

    • A.

      Your first name

    • B.

      Your full name

    • C.

      Your phone number

    • D.

      Your address

    Correct Answer
    A. Your first name
    Explanation
    It is generally considered safe to put your first name online as it is a common practice and does not reveal too much personal information. Providing your first name allows others to address you without compromising your privacy or security. However, sharing your full name, phone number, or address online can potentially lead to identity theft, harassment, or other security risks. It is important to be cautious and mindful of the information we share online to protect ourselves.

    Rate this question:

  • 6. 

    What ONE of the following is OK to put online?

    • A.

      A photo of yourself in school uniform

    • B.

      A photo of yourself in front of your house

    • C.

      A photo of yourself in front of your local park

    • D.

      A photo of yourself inside someone's house

    Correct Answer
    D. A photo of yourself inside someone's house
    Explanation
    A photo of yourself inside someone's house may be considered acceptable to put online because it does not reveal any personal or sensitive information about yourself or others. However, it is important to consider the privacy of the person whose house it is and obtain their consent before posting such a photo.

    Rate this question:

  • 7. 

    The internet is made up of:

    • A.

      One big computer somewhere

    • B.

      Computers and Broadband

    • C.

      Computers and Satellites

    • D.

      Computers and Servers

    Correct Answer
    D. Computers and Servers
    Explanation
    The internet is made up of computers and servers. Computers are the devices that individuals use to access the internet, while servers are powerful computers that store and distribute information across the internet. Servers handle requests from computers, store website data, and facilitate communication between different devices. Without servers, the internet would not be able to function as it does, allowing users to access and share information globally.

    Rate this question:

  • 8. 

    A firewall:

    • A.

      Stops fires from burning your computer

    • B.

      Stops certain websites and information being uploaded/downloaded

    • C.

      Connects your computer to your ISP

    • D.

      Removes viruses from your computer

    Correct Answer
    B. Stops certain websites and information being uploaded/downloaded
    Explanation
    A firewall is a security measure that prevents unauthorized access to a computer or network. It acts as a barrier between the internal network and the external network (usually the internet), monitoring and controlling incoming and outgoing network traffic. By stopping certain websites and information from being uploaded or downloaded, a firewall helps to protect the computer or network from potential threats, such as malware, hackers, or unauthorized data transfers.

    Rate this question:

  • 9. 

    ISP stands for:

    • A.

      Internet Systems Protocol

    • B.

      Internal Service Procedure

    • C.

      Internet Service Provider

    • D.

      It's So Pretty

    Correct Answer
    C. Internet Service Provider
    Explanation
    An ISP, or Internet Service Provider, is a company that provides internet access to individuals and businesses. They offer various types of internet connections, such as dial-up, DSL, cable, or fiber optic, and typically charge a monthly fee for their services. ISPs also offer additional services like email accounts, web hosting, and virtual private networks (VPNs). They play a crucial role in connecting users to the internet and enabling them to access websites, send emails, stream videos, and perform other online activities.

    Rate this question:

  • 10. 

    To save Pivot animations into a format you can import into Windows Movie Maker, you save it as a:

    • A.

      .piv file

    • B.

      .gif file

    • C.

      .avi file

    • D.

      .mp3 file

    Correct Answer
    B. .gif file
    Explanation
    To save Pivot animations into a format that can be imported into Windows Movie Maker, you would save it as a .gif file. The .gif file format is commonly used for animations and supports multiple frames, making it suitable for saving Pivot animations.

    Rate this question:

  • 11. 

    When finishing your movie, to get it suitable for YouTube, you need to use the video setting:

    • A.

      Video for Youtube

    • B.

      Video for Shockwave Flash

    • C.

      Video for Broadband (512)

    • D.

      Video for Internet

    Correct Answer
    C. Video for Broadband (512)
    Explanation
    To make a movie suitable for YouTube, the correct video setting to use is "Video for Broadband (512)". This setting ensures that the video is optimized for streaming on the internet and is compatible with YouTube's platform. It is specifically designed for broadband connections and provides a balance between video quality and file size, making it ideal for online video sharing.

    Rate this question:

  • 12. 

    Pivot crashes a lot. :( Stupid Pivot. What can you do to reduce losing work?

    • A.

      Save copies on your USB or Y:/

    • B.

      Keep animations small

    • C.

      Make new pivot files for different scenes

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    The best way to reduce losing work in Pivot is to follow all of the given options. Saving copies on your USB or Y:/ ensures that you have backup copies of your work in case of crashes. Keeping animations small helps to minimize the chances of crashes. Making new pivot files for different scenes allows you to work on separate files, reducing the risk of losing all your progress if one file crashes. By following all of these options, you can effectively reduce the chances of losing work in Pivot.

    Rate this question:

  • 13. 

    What can you do if you are cyberbullied?

    • A.

      Fight them

    • B.

      Ignore it and hope it goes away

    • C.

      Tell your parents/school

    • D.

      Cyberbully people back

    Correct Answer
    C. Tell your parents/school
    Explanation
    If you are cyberbullied, it is important to tell your parents or school about the situation. They can provide support and guidance on how to handle the situation effectively. Ignoring the cyberbullying may not make it go away and could potentially escalate the problem. Fighting the cyberbullies or cyberbullying them back is not a recommended solution as it could lead to further harm and legal consequences. Seeking help from trusted adults is the best way to address cyberbullying and ensure your safety.

    Rate this question:

  • 14. 

    How do you prevent being CYBERSTALKED?

    • A.

      Don't put photos of yourself on the internet

    • B.

      Pretend you are a police officer

    • C.

      Don't put any personal information about yourself online

    • D.

      Use chat sites only once a month

    Correct Answer
    C. Don't put any personal information about yourself online
    Explanation
    The best way to prevent being cyberstalked is to not put any personal information about yourself online. Cyberstalkers often gather personal information from social media profiles, online forums, or other websites, which they then use to harass or stalk their victims. By refraining from sharing personal details such as your full name, address, phone number, or specific location, you can minimize the risk of becoming a target for cyberstalkers. It is crucial to maintain privacy and be cautious about what information you share on the internet to protect yourself from potential harm.

    Rate this question:

  • 15. 

    What kind of animation is Pivot?

    • A.

      Anime

    • B.

      2D

    • C.

      3D

    • D.

      Machinima

    Correct Answer
    B. 2D
    Explanation
    Pivot is a type of 2D animation. This means that the animation is created using two-dimensional graphics, such as drawings or images, and is displayed on a two-dimensional plane. Unlike 3D animation, which creates a sense of depth and realism, 2D animation focuses on creating movement and storytelling using flat, two-dimensional visuals. Pivot is a popular software used for creating simple stick figure animations, where characters are represented by basic lines and shapes.

    Rate this question:

  • 16. 

    What do you need to reduce getting viruses or hacked into?

    • A.

      Antivirus

    • B.

      Antimalware

    • C.

      Firewall

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    To reduce the risk of getting viruses or being hacked, it is important to have multiple layers of protection. Antivirus software helps detect and remove viruses, antimalware software protects against malicious software, and a firewall acts as a barrier between a computer network and external threats. By having all of these measures in place, the chances of getting viruses or being hacked are significantly reduced.

    Rate this question:

  • 17. 

    Netspace is a:

    • A.

      Computer

    • B.

      ISP

    • C.

      Firewall

    • D.

      Website

    Correct Answer
    B. ISP
    Explanation
    Netspace is an ISP (Internet Service Provider). ISPs are companies that provide internet access to customers, allowing them to connect to the internet through various means such as dial-up, DSL, cable, or fiber optic. They offer services like internet connectivity, email, web hosting, and more. Netspace, in this context, refers to a specific ISP that provides internet services to its customers.

    Rate this question:

  • 18. 

    What is blocking Facebook at school?

    • A.

      The school Firewall

    • B.

      The ISP's Firewall

    • C.

      The computers Firewall

    • D.

      Facebook

    Correct Answer
    B. The ISP's Firewall
    Explanation
    The correct answer is "The ISP's Firewall." The ISP's Firewall refers to the internet service provider's firewall, which is a security measure put in place by the ISP to block certain websites or content. In this case, it is blocking Facebook at school, indicating that the ISP has implemented restrictions on accessing Facebook through their network.

    Rate this question:

  • 19. 

    What is the shortcut key for paste?

    • A.

      CTRL + X

    • B.

      CTRL + V

    • C.

      CTRL + P

    • D.

      CTRL + C

    Correct Answer
    B. CTRL + V
    Explanation
    The shortcut key for paste is CTRL + V. This combination of keys allows the user to paste copied or cut content into a document or application. The "CTRL" key is commonly used in keyboard shortcuts to perform various actions, and the "V" key is specifically associated with the paste function. By pressing these keys simultaneously, the user can quickly and easily paste content without the need to navigate through menus or use the mouse.

    Rate this question:

  • 20. 

    When inserting YouTube into PowerPoint, which two things do you do to the link?

    • A.

      Remove "watch?" and replace "=" with "/"

    • B.

      Remove "watch?" and replace "/" with "="

    • C.

      Remove "?" and replace "/" with "="

    • D.

      Remove "watch" and replace "=" with "?"

    Correct Answer
    A. Remove "watch?" and replace "=" with "/"
    Explanation
    To insert a YouTube video into PowerPoint, you need to modify the link by removing "watch?" and replacing "=" with "/". This is because the YouTube link format includes a "watch?" parameter followed by the video ID, which needs to be changed to "/embed/" in order to embed the video correctly. The "=" sign is replaced with "/" to separate the video ID from the rest of the link. By making these modifications, the YouTube video will be properly inserted into the PowerPoint presentation.

    Rate this question:

  • 21. 

    Which of these computer parts stores all your files?

    • A.

      RAM

    • B.

      CPU

    • C.

      Hard disk

    • D.

      Motherboard

    Correct Answer
    C. Hard disk
    Explanation
    The hard disk is the computer part that stores all your files. It is a non-volatile storage device that retains data even when the computer is turned off. Unlike RAM, which is volatile and temporary, the hard disk provides long-term storage for files, programs, and operating systems. The CPU and motherboard are essential components of a computer but do not directly store files.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 14, 2010
    Quiz Created by
    Jameslee1979

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.