Trivia: Internet Safety MCQ Quiz!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Jasmine
J
Jasmine
Community Contributor
Quizzes Created: 7 | Total Attempts: 6,844
Questions: 27 | Attempts: 823

SettingsSettingsSettings
Trivia: Internet Safety MCQ Quiz! - Quiz

.


Questions and Answers
  • 1. 

    _____________can mess up your system, slow computer performance, and steal any personal passwords and information you use and keep on the computer or on the web.

    • A.

      Viruses

    • B.

      Spyware

    • C.

      Adware

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    Viruses, spyware, and adware can all cause various issues with a computer system. Viruses are malicious programs that can replicate and spread, causing damage to files and software. Spyware is designed to collect information without the user's knowledge, including personal passwords and sensitive data. Adware, on the other hand, displays unwanted advertisements and can slow down computer performance. Therefore, all of these can mess up a system, slow down performance, and steal personal information.

    Rate this question:

  • 2. 

    Use a firewall to prevent hackers from attacking your computer remotely.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Using a firewall is an effective measure to protect your computer from remote attacks by hackers. A firewall acts as a barrier between your computer and the internet, monitoring incoming and outgoing network traffic. It analyzes the data packets and blocks any unauthorized or suspicious connections, preventing hackers from gaining access to your computer. By enabling a firewall, you can enhance the security of your system and reduce the risk of remote attacks.

    Rate this question:

  • 3. 

    It is okay to open emails from a contact that you don’t know.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Opening emails from a contact that you don't know is not okay. It can be risky as these emails could potentially contain harmful attachments or links that could lead to malware or phishing attacks. It is always recommended to exercise caution and avoid opening emails from unknown contacts to protect your personal information and computer security.

    Rate this question:

  • 4. 

    It is okay to forward another individual’s email without permission.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Forwarding another individual's email without permission is not okay because it violates the sender's privacy and trust. It is important to respect others' privacy and seek their consent before sharing their personal or confidential information.

    Rate this question:

  • 5. 

    You should set all social media to "private"

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Setting all social media to "private" is a recommended practice for maintaining online privacy and security. By setting social media accounts to "private," users have control over who can view their posts, photos, and personal information. This helps to prevent unauthorized access, protect personal data, and reduce the risk of privacy breaches or identity theft. Additionally, setting social media to "private" allows users to carefully manage their online presence and only share content with a select group of trusted individuals.

    Rate this question:

  • 6. 

    How often should you change passwords?

    • A.

      Every week

    • B.

      Every 2-3 months

    • C.

      Once a year

    • D.

      Twice a year

    Correct Answer
    B. Every 2-3 months
    Explanation
    Changing passwords every 2-3 months is recommended for maintaining good security practices. Regularly updating passwords helps to minimize the risk of unauthorized access to accounts and sensitive information. This frequency strikes a balance between ensuring passwords are changed frequently enough to deter potential threats, while also allowing users enough time to remember and manage their passwords effectively.

    Rate this question:

  • 7. 

    It is okay to meet up with a person you met online alone.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Meeting up with a person you met online alone is not okay because it can be dangerous. Online interactions can be deceiving, and there is a risk of meeting someone with ill intentions. It is always recommended to meet people in public places and inform someone you trust about the meeting. This ensures safety and reduces the chances of any potential harm.

    Rate this question:

  • 8. 

    Why should you avoid putting personal information online?

    • A.

      Identify theft

    • B.

      Fraud

    • C.

      Privacy

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    Putting personal information online should be avoided because it can lead to identity theft, where someone can steal your personal details and use them for malicious purposes. It can also make you vulnerable to fraud, as scammers can use your information to deceive you or others. Additionally, sharing personal information online compromises your privacy, as it can be accessed by anyone and used without your consent. Therefore, it is important to avoid putting personal information online to protect yourself from these risks.

    Rate this question:

  • 9. 

    Which email should you avoid opening by reading the subject?

    • A.

      "You won $1,000 dollars"

    • B.

      "Head Corporate, Important"

    • C.

      "Thanks again..."

    • D.

      "Upcoming meeting"

    Correct Answer
    A. "You won $1,000 dollars"
    Explanation
    The email with the subject "You won $1,000 dollars" should be avoided because it is likely to be a scam or phishing email. Emails claiming that you have won a large sum of money are often used to trick people into providing personal information or sending money. It is important to be cautious and not open or respond to such emails to protect yourself from potential fraud.

    Rate this question:

  • 10. 

    You are playing an online game with your school friend Tara. Suddenly a message pops up on your computer that says Click here to win a free trip to New York! What do you do?

    • A.

      Open the message

    • B.

      Ask Tara what to do?

    • C.

      Close/Delete the window

    • D.

      Ignore the message

    Correct Answer
    C. Close/Delete the window
    Explanation
    In this scenario, the correct answer is to close/delete the window. Clicking on the message could potentially lead to a scam or a virus being installed on your computer. Asking Tara for advice is a good option, but since the message could be time-sensitive, it is better to take immediate action and close/delete the window. Ignoring the message is also not recommended as it could still pose a potential threat.

    Rate this question:

  • 11. 

    You have just seen a video online that was very violent and it has upset you. What would you choose to do about it?

    • A.

      Close out

    • B.

      Tell a trusted adult

    • C.

      Share it on your page to show other people

    • D.

      None of the above

    Correct Answer
    B. Tell a trusted adult
    Explanation
    Telling a trusted adult is the best choice when encountering a violent video online that has upset you. By confiding in a responsible adult, you can seek guidance and support to process your emotions and potentially find ways to prevent further exposure to such content. Sharing the video on your page may not be appropriate as it could potentially harm others or perpetuate violence. Closing out or ignoring the video without addressing your feelings may also lead to unresolved distress.

    Rate this question:

  • 12. 

    Which one is okay to post on internet sites/ social media?

    • A.

      First name

    • B.

      First & last name

    • C.

      Address

    • D.

      Phone number

    Correct Answer
    A. First name
    Explanation
    Posting just the first name on internet sites or social media is considered okay because it provides some level of identification without revealing too much personal information. This allows individuals to maintain a certain level of privacy and security while still engaging in online activities. Sharing the full name, address, or phone number on the internet can potentially lead to identity theft, harassment, or other security risks. Therefore, it is important to exercise caution and only share necessary information online.

    Rate this question:

  • 13. 

     In a company meeting, you should have your cell phone on:

    • A.

      Silent

    • B.

      Ring

    • C.

      Beep once

    • D.

      Speaker

    Correct Answer
    A. Silent
    Explanation
    In a company meeting, it is important to have your cell phone on silent. This is to ensure that it does not disrupt the meeting or distract others with loud ringing or beeping sounds. Having your phone on silent shows respect for the speaker and allows everyone to focus on the discussion at hand. It also helps to maintain a professional and attentive environment during the meeting.

    Rate this question:

  • 14. 

    When following the rules of email etiquette, typing the email in ALL CAPITALS is not recommended because it indicates what?

    • A.

      Anger

    • B.

      Low vision

    • C.

      Copyrighted material

    • D.

      Carelessness

    Correct Answer
    A. Anger
    Explanation
    Typing an email in ALL CAPITALS is not recommended because it indicates anger. Using all capital letters in written communication is often perceived as shouting or yelling, which can come across as aggressive or confrontational. It is important to follow email etiquette guidelines and use proper formatting, such as using sentence case or bolding certain words for emphasis, to convey the intended tone and avoid misinterpretation.

    Rate this question:

  • 15. 

    The telephone remains an important element of a customer service strategy.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The telephone remains an important element of a customer service strategy because it allows for direct and immediate communication between customers and service representatives. It provides a personal touch and enables customers to ask questions, seek assistance, and receive real-time support. Additionally, the telephone allows for better understanding of customer needs and concerns through verbal communication, which can lead to more effective problem-solving and customer satisfaction.

    Rate this question:

  • 16. 

    The increasing sophistication of smartphones makes mobile telecommunication an integral part of a wider communication capability.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement suggests that smartphones are becoming more advanced, which in turn makes mobile telecommunication an essential component of a broader communication capability. This implies that smartphones are not just limited to basic phone calls but also encompass various communication features such as messaging, internet access, video calls, and social media platforms. Therefore, the statement is true as it highlights the growing importance of smartphones in facilitating communication.

    Rate this question:

  • 17. 

    ______________________________is the telephonic transmission of scanned printed material (both text and images), normally to a telephone number connected to a printer or other output device.

    • A.

      Cell phone

    • B.

      Blue tooth

    • C.

      Fax machine

    • D.

      None of the above

    Correct Answer
    C. Fax machine
    Explanation
    Fax machine is the correct answer because it is a device used for telephonic transmission of scanned printed material, both text and images, to a telephone number connected to a printer or other output device. This technology has been widely used for many years to send and receive documents over long distances.

    Rate this question:

  • 18. 

    Why is it beneficial to have multiple phone lines/numbers for your company?

    • A.

      So multiple people can answer phone calls

    • B.

      Incase one line is busy, customers can call another line

    • C.

      To decrease customer wait time

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    Having multiple phone lines/numbers for a company is beneficial because it allows multiple people to answer phone calls, ensuring that all customer inquiries are addressed promptly. Additionally, in case one line is busy, customers can call another line, preventing them from being unable to reach the company. This helps to decrease customer wait time and improves overall customer satisfaction. Therefore, all of the above reasons make it advantageous to have multiple phone lines/numbers for a company.

    Rate this question:

  • 19. 

    You can conduct an interview virtually.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Conducting an interview virtually refers to conducting an interview remotely, using technology such as video conferencing software. This allows the interviewer and interviewee to communicate and interact without being physically present in the same location. With advancements in technology and the increasing popularity of remote work, virtual interviews have become a common practice for many companies. Therefore, the statement "You can conduct an interview virtually" is true.

    Rate this question:

  • 20. 

    Brian sends an email out to Steven, Mark, and Lilly about his Holiday party and states in the email they can each invite one guest. Steven reads it and wants to share the information from the email with Miranda.  What is the most convenient way to share the information with her? 

    • A.

      Forward Miranda the email

    • B.

      Type the email over and send it to Miranda

    • C.

      Exit out the email, and call Miranda

    • D.

      Blind Carbon Copy Miranda in the email

    Correct Answer
    A. Forward Miranda the email
    Explanation
    The most convenient way to share the information with Miranda would be to forward her the email. This allows Miranda to receive the same email directly from Brian, ensuring that she has all the necessary information about the Holiday party and the invitation to bring a guest.

    Rate this question:

  • 21. 

    It is okay to open emails from contacts that are not familiar.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Opening emails from unfamiliar contacts can be risky as they may contain malicious links or attachments that can harm your device or compromise your personal information. It is always recommended to exercise caution and avoid opening emails from unknown sources to protect yourself from potential cyber threats.

    Rate this question:

  • 22. 

    Log off from all websites and shut down your computer when not in use.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    It is important to log off from all websites and shut down your computer when not in use to ensure the security of your personal information and prevent unauthorized access. Leaving your computer logged in and connected to websites increases the risk of someone accessing your accounts and potentially stealing sensitive data. Shutting down the computer also helps conserve energy and prolong the lifespan of your device.

    Rate this question:

  • 23. 

    What is slander?

    • A.

      The action or crime of making a false spoken statement damaging to a person's reputation.

    • B.

      To accuse someone of using social media in a negative manner

    Correct Answer
    A. The action or crime of making a false spoken statement damaging to a person's reputation.
    Explanation
    The correct answer is the action or crime of making a false spoken statement damaging to a person's reputation. Slander refers to the act of spreading false information about someone through spoken words, which can harm their reputation. It is a form of defamation and can have legal consequences. Accusing someone of using social media in a negative manner is not the definition of slander.

    Rate this question:

  • 24. 

    When you are filling out forms or surveys online, you should:

    • A.

      Answer all the questions truthfully.

    • B.

      Before you answer any questions, you should get your parents' approval.

    • C.

      Make up funny answers to all the questions.

    Correct Answer
    B. Before you answer any questions, you should get your parents' approval.
    Explanation
    When filling out forms or surveys online, it is important to get your parents' approval before answering any questions. This is because some questions may ask for personal information or sensitive details that should not be shared without parental consent. Getting approval ensures that you are following safety guidelines and protecting your privacy online.

    Rate this question:

  • 25. 

    Hector unlocks his smartphone and notices he has 12 apps that need to be updated. What should he do?

    • A.

      Ignore the updates

    • B.

      Update his phone

    Correct Answer
    B. Update his phone
    Explanation
    Hector should update his phone because he has noticed that he has 12 apps that need to be updated. Updating the phone will ensure that he has the latest versions of the apps, which may include bug fixes, security patches, and new features. Ignoring the updates may lead to potential issues with the apps, such as crashes or vulnerabilities. Therefore, it is advisable for Hector to update his phone.

    Rate this question:

  • 26. 

    You receive an email from a person that identifies themselves as your friend John. They want to meet you in the park after school. Do you:

    • A.

      Tell your parents about the email and ignore the request.

    • B.

      Ask the person a question only John would know to make sure it is John.

    • C.

      Go to the park and meet your friend John.

    • D.

      Option 4

    Correct Answer
    A. Tell your parents about the email and ignore the request.
    Explanation
    It is important to prioritize safety and take precautions when receiving emails or messages from unknown sources, even if they claim to be a friend. By telling your parents about the email and ignoring the request, you are involving trusted adults who can help assess the situation and ensure your safety. It is better to be cautious and verify the authenticity of the email before taking any action.

    Rate this question:

  • 27. 

    You posted a picture online, but soon decided to take it down. You are worried your friend may see it, but then soon remember that person DOES NOT have a computer. Your friend will never see the photo.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The explanation for the answer being False is that even though the friend does not have a computer, it does not necessarily mean that they will never see the photo. They could still have access to a computer through other means, such as using a friend's computer or going to an internet café. Therefore, there is still a possibility that the friend may see the photo despite not having a computer.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 14, 2016
    Quiz Created by
    Jasmine
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.