The Internet Safety MCQ Test: Quiz!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Mfischer
M
Mfischer
Community Contributor
Quizzes Created: 1 | Total Attempts: 158
Questions: 13 | Attempts: 158

SettingsSettingsSettings
The Internet Safety MCQ Test: Quiz! - Quiz

.


Questions and Answers
  • 1. 

    The name that you select to identify yourself in e-mail,chats,etc. is called:

    • A.

      Nickname

    • B.

      Screen name

    • C.

      Personal code

    • D.

      First and last name

    Correct Answer
    B. Screen name
    Explanation
    A screen name is the name that an individual chooses to use when identifying themselves in online platforms such as email and chats. It is a pseudonym or alias that allows individuals to maintain a level of anonymity while still being able to communicate with others. Unlike a first and last name, a screen name does not necessarily reveal a person's true identity and can be customized to reflect their personal preferences or interests.

    Rate this question:

  • 2. 

    All of the following are examples of inappropriate screen names EXCEPT:

    • A.

      Ronkonkoma13

    • B.

      Nickybabygirl

    • C.

      Funnyface

    • D.

      Yankeeloverfrankie

    Correct Answer
    C. Funnyface
    Explanation
    The given options are all screen names, but only "funnyface" does not appear to be inappropriate. While the other options include personal information or suggestive language, "funnyface" is a more neutral and lighthearted choice for a screen name.

    Rate this question:

  • 3. 

    A good password should:

    • A.

      Never be changed.

    • B.

      Be something you can easily remember, like your birthdate.

    • C.

      Be shared with your best friend.

    • D.

      Be lengthly, at least eight characters.

    Correct Answer
    D. Be lengthly, at least eight characters.
    Explanation
    A good password should be lengthy, at least eight characters, because longer passwords are generally more secure than shorter ones. They provide a larger pool of possible combinations, making it harder for hackers to guess or crack the password. This increases the overall security of the account or system being protected.

    Rate this question:

  • 4. 

    All are ways that a predator tries to "groom" their victim EXCEPT:

    • A.

      Builds trust

    • B.

      Makes threats

    • C.

      Never asks to meet in person

    • D.

      Asks you to keep the relationship a secret

    Correct Answer
    C. Never asks to meet in person
    Explanation
    The given options describe different tactics used by predators to groom their victims. Building trust, making threats, and asking the victim to keep the relationship a secret are all ways predators manipulate their victims. However, the option "never asks to meet in person" does not align with typical grooming behavior. Predators often try to establish physical contact with their victims as part of their grooming process. Therefore, this option is the exception and does not fit the pattern of grooming behavior.

    Rate this question:

  • 5. 

    Another name commonly used for junk email is:

    • A.

      Pop-up

    • B.

      IM

    • C.

      Spam

    • D.

      Spagetti

    • E.

      Router

    Correct Answer
    C. Spam
    Explanation
    Spam is the correct answer because it is a commonly used term for junk email. Spam refers to unsolicited and unwanted emails that are sent in bulk to a large number of recipients. It is often used for advertising purposes or to spread malware. The term "spam" originated from a Monty Python sketch where the word was repetitively used, similar to how unwanted emails can flood an inbox.

    Rate this question:

  • 6. 

    Whish of the following is not one of the four "R"s of online safety?

    • A.

      Recognize

    • B.

      Refuse

    • C.

      Redirect

    • D.

      Respond

    • E.

      Report

    Correct Answer
    C. Redirect
    Explanation
    The four "R"s of online safety are Recognize, Refuse, Respond, and Report. Redirect is not one of the four "R"s of online safety. Redirecting refers to redirecting or forwarding a user to a different website or webpage, which is not directly related to online safety practices.

    Rate this question:

  • 7. 

    Anyone met online is:

    • A.

      A friend.

    • B.

      A goldfish.

    • C.

      A stranger.

    • D.

      Someone you can confide in.

    Correct Answer
    C. A stranger.
    Explanation
    The correct answer is a stranger because meeting someone online does not automatically make them a friend or someone you can confide in. It is important to be cautious and recognize that online interactions can often involve individuals who are unknown and unfamiliar. Therefore, it is crucial to exercise caution and not immediately trust or share personal information with someone met online.

    Rate this question:

  • 8. 

    Predators can be a friends if you get to know them.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement suggests that predators can be friends if you get to know them. However, this is not true. Predators are animals that hunt and kill other animals for food. While it is possible to have a mutual understanding or respect for predators in certain situations, they are ultimately driven by their instinct to hunt and survive. Therefore, it is not accurate to say that predators can be friends.

    Rate this question:

  • 9. 

    Which is NOT an example of Cyberbullying?

    • A.

      Sending harassing messages

    • B.

      Posting someone elses’ personal information

    • C.

      Calling someone names during recess

    • D.

      Posting private or doctored pictures about another person

    Correct Answer
    C. Calling someone names during recess
    Explanation
    Calling someone names during recess is not an example of cyberbullying because it does not involve the use of electronic communication or technology. Cyberbullying refers to the act of using digital devices or platforms to harass, intimidate, or harm others. Sending harassing messages, posting someone else's personal information, and posting private or doctored pictures about another person are all examples of cyberbullying as they involve the use of technology to target and harm someone.

    Rate this question:

  • 10. 

    ______________ refers to a set of unwritten rules for social interactions on the Internet.

    • A.

      Spam

    • B.

      Netiquette

    • C.

      Chatting

    • D.

      IM's

    Correct Answer
    B. Netiquette
    Explanation
    Netiquette refers to a set of unwritten rules for social interactions on the Internet. It encompasses proper online behavior, such as being polite, respectful, and considerate towards others. Netiquette guides individuals on how to communicate effectively in online forums, chat rooms, social media platforms, and email. It promotes a positive and inclusive online environment by discouraging spamming, trolling, cyberbullying, and other disruptive behaviors. Following netiquette ensures that online interactions are productive, respectful, and enjoyable for all participants.

    Rate this question:

  • 11. 

    You can help prevent viruses by:

    • A.

      Opening email messages from strangers.

    • B.

      Using antivirus software

    • C.

      There is no way to prevent viruses

    Correct Answer
    B. Using antivirus software
    Explanation
    Using antivirus software is an effective measure to prevent viruses. Antivirus software is specifically designed to detect and eliminate viruses, malware, and other malicious threats from a computer system. It scans files and programs, identifies potential threats, and removes them before they can cause harm. By regularly updating and running antivirus software, users can significantly reduce the risk of their devices being infected by viruses.

    Rate this question:

  • 12. 

    You receive the following email: You have been chosen by the Chase Manhattan Bank online department to take part in our quick and easy 5 question survey. In return we will credit $20 to your account - Just for your time! Helping us better understand how our customers feel benefits everyone. This is an example of......

    • A.

      An online contest

    • B.

      Spam

    • C.

      Filtering

    • D.

      Eggs

    Correct Answer
    B. Spam
    Explanation
    This email is an example of spam because it is unsolicited and attempts to deceive the recipient into providing personal information or taking part in a survey for a monetary reward. The mention of a well-known bank like Chase Manhattan Bank is likely a tactic to gain the recipient's trust and make them more likely to engage with the email. However, legitimate banks typically do not send unsolicited emails offering monetary rewards for participating in surveys.

    Rate this question:

  • 13. 

    Copy and pasting information from the internet into papers and projects is plagiarism.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Copying and pasting information from the internet into papers and projects without proper citation or acknowledgement is considered plagiarism. Plagiarism is the act of presenting someone else's work or ideas as your own, which is a serious academic offense. To avoid plagiarism, it is important to properly cite and give credit to the original source of information.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 22, 2008
    Quiz Created by
    Mfischer
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.