Year 7 IT - Quiz 2 - Cybersafety And Animation

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jameslee1979
J
Jameslee1979
Community Contributor
Quizzes Created: 2 | Total Attempts: 1,753
| Attempts: 1,082 | Questions: 21
Please wait...
Question 1 / 21
0 %
0/100
Score 0/100
1. Someone sends you a message threatening they are going to kill you. What do you do?

Explanation

The correct answer is to show the threatening message to parents or the police. This is the most appropriate action to take when receiving a serious threat. By involving trusted adults or authorities, they can assess the situation, provide guidance, and take necessary steps to ensure your safety. Ignoring or deleting the message may not address the potential danger and could put you at risk. Replying back to the sender might escalate the situation further.

Submit
Please wait...
About This Quiz
Internet Security Quizzes & Trivia

Year 7 IT Quiz 2 explores critical aspects of online safety, including recognizing threats like cybergrooming, cyberstalking, and cyberbullying. Students are taught appropriate responses to online threats and... see moreeducated on safe online behavior, crucial for protecting personal information. see less

2. What ONE of the following is OK to put online?

Explanation

It is generally considered safe to put your first name online as it is a common practice and does not reveal too much personal information. Providing your first name allows others to address you without compromising your privacy or security. However, sharing your full name, phone number, or address online can potentially lead to identity theft, harassment, or other security risks. It is important to be cautious and mindful of the information we share online to protect ourselves.

Submit
3. What can you do if you are cyberbullied?

Explanation

If you are cyberbullied, it is important to tell your parents or school about the situation. They can provide support and guidance on how to handle the situation effectively. Ignoring the cyberbullying may not make it go away and could potentially escalate the problem. Fighting the cyberbullies or cyberbullying them back is not a recommended solution as it could lead to further harm and legal consequences. Seeking help from trusted adults is the best way to address cyberbullying and ensure your safety.

Submit
4. Being sent SMS, email or online groups message threatening and teasing you is called:

Explanation

Cyberbullying refers to the act of sending threatening or teasing messages through SMS, email, or online groups. It involves the use of technology to harass, intimidate, or humiliate someone. This can include sending abusive or derogatory messages, spreading rumors, or sharing embarrassing photos or videos. Cyberbullying can have serious emotional and psychological effects on the victim, and it is important to address and report such behavior to ensure the safety and well-being of individuals online.

Submit
5. How do you prevent being CYBERSTALKED?

Explanation

The best way to prevent being cyberstalked is to not put any personal information about yourself online. Cyberstalkers often gather personal information from social media profiles, online forums, or other websites, which they then use to harass or stalk their victims. By refraining from sharing personal details such as your full name, address, phone number, or specific location, you can minimize the risk of becoming a target for cyberstalkers. It is crucial to maintain privacy and be cautious about what information you share on the internet to protect yourself from potential harm.

Submit
6. What is the shortcut key for paste?

Explanation

The shortcut key for paste is CTRL + V. This combination of keys allows the user to paste copied or cut content into a document or application. The "CTRL" key is commonly used in keyboard shortcuts to perform various actions, and the "V" key is specifically associated with the paste function. By pressing these keys simultaneously, the user can quickly and easily paste content without the need to navigate through menus or use the mouse.

Submit
7. A predator online who goes through all your details on the internet to find you is called:

Explanation

Cyberstalking refers to the act of an online predator who meticulously searches and gathers personal information about an individual on the internet with the intention of locating and potentially harming them. This behavior involves persistent and unwanted attention, often leading to fear and distress for the victim. It is important to be aware of cyberstalking and take necessary precautions to protect oneself online.

Submit
8. A firewall:

Explanation

A firewall is a security measure that prevents unauthorized access to a computer or network. It acts as a barrier between the internal network and the external network (usually the internet), monitoring and controlling incoming and outgoing network traffic. By stopping certain websites and information from being uploaded or downloaded, a firewall helps to protect the computer or network from potential threats, such as malware, hackers, or unauthorized data transfers.

Submit
9. ISP stands for:

Explanation

An ISP, or Internet Service Provider, is a company that provides internet access to individuals and businesses. They offer various types of internet connections, such as dial-up, DSL, cable, or fiber optic, and typically charge a monthly fee for their services. ISPs also offer additional services like email accounts, web hosting, and virtual private networks (VPNs). They play a crucial role in connecting users to the internet and enabling them to access websites, send emails, stream videos, and perform other online activities.

Submit
10. The internet is made up of:

Explanation

The internet is made up of computers and servers. Computers are the devices that individuals use to access the internet, while servers are powerful computers that store and distribute information across the internet. Servers handle requests from computers, store website data, and facilitate communication between different devices. Without servers, the internet would not be able to function as it does, allowing users to access and share information globally.

Submit
11. What kind of animation is Pivot?

Explanation

Pivot is a type of 2D animation. This means that the animation is created using two-dimensional graphics, such as drawings or images, and is displayed on a two-dimensional plane. Unlike 3D animation, which creates a sense of depth and realism, 2D animation focuses on creating movement and storytelling using flat, two-dimensional visuals. Pivot is a popular software used for creating simple stick figure animations, where characters are represented by basic lines and shapes.

Submit
12. Which of these computer parts stores all your files?

Explanation

The hard disk is the computer part that stores all your files. It is a non-volatile storage device that retains data even when the computer is turned off. Unlike RAM, which is volatile and temporary, the hard disk provides long-term storage for files, programs, and operating systems. The CPU and motherboard are essential components of a computer but do not directly store files.

Submit
13. What do you need to reduce getting viruses or hacked into?

Explanation

To reduce the risk of getting viruses or being hacked, it is important to have multiple layers of protection. Antivirus software helps detect and remove viruses, antimalware software protects against malicious software, and a firewall acts as a barrier between a computer network and external threats. By having all of these measures in place, the chances of getting viruses or being hacked are significantly reduced.

Submit
14. When inserting YouTube into PowerPoint, which two things do you do to the link?

Explanation

To insert a YouTube video into PowerPoint, you need to modify the link by removing "watch?" and replacing "=" with "/". This is because the YouTube link format includes a "watch?" parameter followed by the video ID, which needs to be changed to "/embed/" in order to embed the video correctly. The "=" sign is replaced with "/" to separate the video ID from the rest of the link. By making these modifications, the YouTube video will be properly inserted into the PowerPoint presentation.

Submit
15. What ONE of the following is OK to put online?

Explanation

A photo of yourself inside someone's house may be considered acceptable to put online because it does not reveal any personal or sensitive information about yourself or others. However, it is important to consider the privacy of the person whose house it is and obtain their consent before posting such a photo.

Submit
16. To save Pivot animations into a format you can import into Windows Movie Maker, you save it as a:

Explanation

To save Pivot animations into a format that can be imported into Windows Movie Maker, you would save it as a .gif file. The .gif file format is commonly used for animations and supports multiple frames, making it suitable for saving Pivot animations.

Submit
17. Pivot crashes a lot. :( Stupid Pivot. What can you do to reduce losing work?

Explanation

The best way to reduce losing work in Pivot is to follow all of the given options. Saving copies on your USB or Y:/ ensures that you have backup copies of your work in case of crashes. Keeping animations small helps to minimize the chances of crashes. Making new pivot files for different scenes allows you to work on separate files, reducing the risk of losing all your progress if one file crashes. By following all of these options, you can effectively reduce the chances of losing work in Pivot.

Submit
18. A predator online who pretends to be a friend and tries to meet you in person is known as:

Explanation

Cybergrooming refers to the act of an online predator who pretends to be a friend in order to establish a relationship with the intention of meeting the victim in person. This behavior is a form of online manipulation where the predator gains the trust of the victim before exploiting them offline. It is important to be aware of this type of online threat and take necessary precautions to protect oneself from such predators.

Submit
19. Netspace is a:

Explanation

Netspace is an ISP (Internet Service Provider). ISPs are companies that provide internet access to customers, allowing them to connect to the internet through various means such as dial-up, DSL, cable, or fiber optic. They offer services like internet connectivity, email, web hosting, and more. Netspace, in this context, refers to a specific ISP that provides internet services to its customers.

Submit
20. When finishing your movie, to get it suitable for YouTube, you need to use the video setting:

Explanation

To make a movie suitable for YouTube, the correct video setting to use is "Video for Broadband (512)". This setting ensures that the video is optimized for streaming on the internet and is compatible with YouTube's platform. It is specifically designed for broadband connections and provides a balance between video quality and file size, making it ideal for online video sharing.

Submit
21. What is blocking Facebook at school?

Explanation

The correct answer is "The ISP's Firewall." The ISP's Firewall refers to the internet service provider's firewall, which is a security measure put in place by the ISP to block certain websites or content. In this case, it is blocking Facebook at school, indicating that the ISP has implemented restrictions on accessing Facebook through their network.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 14, 2010
    Quiz Created by
    Jameslee1979
Cancel
  • All
    All (21)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Someone sends you a message threatening they are going to kill you....
What ONE of the following is OK to put online?
What can you do if you are cyberbullied?
Being sent SMS, email or online groups message threatening and teasing...
How do you prevent being CYBERSTALKED?
What is the shortcut key for paste?
A predator online who goes through all your details on the internet to...
A firewall:
ISP stands for:
The internet is made up of:
What kind of animation is Pivot?
Which of these computer parts stores all your files?
What do you need to reduce getting viruses or hacked into?
When inserting YouTube into PowerPoint, which two things do you do to...
What ONE of the following is OK to put online?
To save Pivot animations into a format you can import into Windows...
Pivot crashes a lot. :( Stupid Pivot. What can you do to reduce...
A predator online who pretends to be a friend and tries to meet you in...
Netspace is a:
When finishing your movie, to get it suitable for YouTube, you need to...
What is blocking Facebook at school?
Alert!

Advertisement