The Internet Safety MCQ Test: Quiz!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Mfischer
M
Mfischer
Community Contributor
Quizzes Created: 1 | Total Attempts: 159
| Attempts: 159 | Questions: 13
Please wait...
Question 1 / 13
0 %
0/100
Score 0/100
1. You can help prevent viruses by:

Explanation

Using antivirus software is an effective measure to prevent viruses. Antivirus software is specifically designed to detect and eliminate viruses, malware, and other malicious threats from a computer system. It scans files and programs, identifies potential threats, and removes them before they can cause harm. By regularly updating and running antivirus software, users can significantly reduce the risk of their devices being infected by viruses.

Submit
Please wait...
About This Quiz
The Internet Safety MCQ Test: Quiz! - Quiz

Test your knowledge on Internet safety! This quiz covers topics like email identity, password strength, online predators, and spam emails.

2. Anyone met online is:

Explanation

The correct answer is a stranger because meeting someone online does not automatically make them a friend or someone you can confide in. It is important to be cautious and recognize that online interactions can often involve individuals who are unknown and unfamiliar. Therefore, it is crucial to exercise caution and not immediately trust or share personal information with someone met online.

Submit
3. Copy and pasting information from the internet into papers and projects is plagiarism.

Explanation

Copying and pasting information from the internet into papers and projects without proper citation or acknowledgement is considered plagiarism. Plagiarism is the act of presenting someone else's work or ideas as your own, which is a serious academic offense. To avoid plagiarism, it is important to properly cite and give credit to the original source of information.

Submit
4. Another name commonly used for junk email is:

Explanation

Spam is the correct answer because it is a commonly used term for junk email. Spam refers to unsolicited and unwanted emails that are sent in bulk to a large number of recipients. It is often used for advertising purposes or to spread malware. The term "spam" originated from a Monty Python sketch where the word was repetitively used, similar to how unwanted emails can flood an inbox.

Submit
5. Which is NOT an example of Cyberbullying?

Explanation

Calling someone names during recess is not an example of cyberbullying because it does not involve the use of electronic communication or technology. Cyberbullying refers to the act of using digital devices or platforms to harass, intimidate, or harm others. Sending harassing messages, posting someone else's personal information, and posting private or doctored pictures about another person are all examples of cyberbullying as they involve the use of technology to target and harm someone.

Submit
6. Predators can be a friends if you get to know them.

Explanation

The statement suggests that predators can be friends if you get to know them. However, this is not true. Predators are animals that hunt and kill other animals for food. While it is possible to have a mutual understanding or respect for predators in certain situations, they are ultimately driven by their instinct to hunt and survive. Therefore, it is not accurate to say that predators can be friends.

Submit
7. The name that you select to identify yourself in e-mail,chats,etc. is called:

Explanation

A screen name is the name that an individual chooses to use when identifying themselves in online platforms such as email and chats. It is a pseudonym or alias that allows individuals to maintain a level of anonymity while still being able to communicate with others. Unlike a first and last name, a screen name does not necessarily reveal a person's true identity and can be customized to reflect their personal preferences or interests.

Submit
8. You receive the following email: You have been chosen by the Chase Manhattan Bank online department to take part in our quick and easy 5 question survey. In return we will credit $20 to your account - Just for your time! Helping us better understand how our customers feel benefits everyone. This is an example of......

Explanation

This email is an example of spam because it is unsolicited and attempts to deceive the recipient into providing personal information or taking part in a survey for a monetary reward. The mention of a well-known bank like Chase Manhattan Bank is likely a tactic to gain the recipient's trust and make them more likely to engage with the email. However, legitimate banks typically do not send unsolicited emails offering monetary rewards for participating in surveys.

Submit
9. A good password should:

Explanation

A good password should be lengthy, at least eight characters, because longer passwords are generally more secure than shorter ones. They provide a larger pool of possible combinations, making it harder for hackers to guess or crack the password. This increases the overall security of the account or system being protected.

Submit
10. ______________ refers to a set of unwritten rules for social interactions on the Internet.

Explanation

Netiquette refers to a set of unwritten rules for social interactions on the Internet. It encompasses proper online behavior, such as being polite, respectful, and considerate towards others. Netiquette guides individuals on how to communicate effectively in online forums, chat rooms, social media platforms, and email. It promotes a positive and inclusive online environment by discouraging spamming, trolling, cyberbullying, and other disruptive behaviors. Following netiquette ensures that online interactions are productive, respectful, and enjoyable for all participants.

Submit
11. All of the following are examples of inappropriate screen names EXCEPT:

Explanation

The given options are all screen names, but only "funnyface" does not appear to be inappropriate. While the other options include personal information or suggestive language, "funnyface" is a more neutral and lighthearted choice for a screen name.

Submit
12. Whish of the following is not one of the four "R"s of online safety?

Explanation

The four "R"s of online safety are Recognize, Refuse, Respond, and Report. Redirect is not one of the four "R"s of online safety. Redirecting refers to redirecting or forwarding a user to a different website or webpage, which is not directly related to online safety practices.

Submit
13. All are ways that a predator tries to "groom" their victim EXCEPT:

Explanation

The given options describe different tactics used by predators to groom their victims. Building trust, making threats, and asking the victim to keep the relationship a secret are all ways predators manipulate their victims. However, the option "never asks to meet in person" does not align with typical grooming behavior. Predators often try to establish physical contact with their victims as part of their grooming process. Therefore, this option is the exception and does not fit the pattern of grooming behavior.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 18, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 22, 2008
    Quiz Created by
    Mfischer
Cancel
  • All
    All (13)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
You can help prevent viruses by:
Anyone met online is:
Copy and pasting information from the internet into papers and...
Another name commonly used for junk email is:
Which is NOT an example of Cyberbullying?
Predators can be a friends if you get to know them.
The name that you select to identify yourself in...
You receive the following email:...
A good password should:
______________ refers to a set of unwritten rules for social...
All of the following are examples of inappropriate screen names...
Whish of the following is not one of the four "R"s of online...
All are ways that a predator tries to "groom" their victim...
Alert!

Advertisement