Basic Internet Safety Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Drmicm
D
Drmicm
Community Contributor
Quizzes Created: 1 | Total Attempts: 4,250
| Attempts: 4,250 | Questions: 20
Please wait...
Question 1 / 20
0 %
0/100
Score 0/100
1.  What is cyberbullying?

Explanation

Cyberbullying refers to the act of bullying that takes place through electronic means such as emails, instant messaging, websites, and cell phones. It involves using technology to harass, intimidate, or harm someone, often repeatedly and intentionally. Unlike traditional bullying which may occur in physical locations like playgrounds or bus stops, cyberbullying occurs in the virtual world, making it easier for the perpetrator to remain anonymous and for the victim to be targeted 24/7. This form of bullying can have severe psychological and emotional effects on the victim.

Submit
Please wait...
About This Quiz
Basic Internet Safety Quiz - Quiz

The Internet has opened up a whole new world of opportunity for people of all ages. You can shop, plan a holiday, send pictures and videos to family... see moreand friends, chat with others and even study online. But the Internet has slew of risks associated with it, if safety precautions are not implemented. See how well do you know about basic Internet safety.
see less

2. Which of the following would provide the strongest password?

Explanation

A mix of letters, numbers, or symbols would provide the strongest password because it increases the complexity and makes it harder for hackers to guess or crack. Using personal information like birthdate, pet's name, or screen name can be easily guessed or obtained through social engineering. However, a combination of letters, numbers, and symbols creates a more random and unique password that is harder to guess or crack using brute force methods.

Submit
3. Who can you trust online?

Explanation

The correct answer is someone you know well offline. This is because offline relationships are typically built on trust and familiarity, whereas online relationships can be more easily manipulated or misrepresented. Knowing someone well offline means that you have had the opportunity to establish trust and gauge their character in person, making them a more reliable source of trust online.

Submit
4. Birthday, school name, full name, phone number are all examples of:

Explanation

The given correct answer is "Too much online personal information." This is because birthday, school name, full name, and phone number are all examples of personal information that should not be shared freely online. Revealing such details can pose a risk to one's privacy and security, as they can be exploited by malicious individuals for identity theft or other harmful activities. It is important to be cautious and mindful of the information we share online to protect ourselves from potential risks.

Submit
5. Facebook, MySpace, Twitter are examples of:

Explanation

Facebook, MySpace, and Twitter are all examples of social networking platforms. These websites allow users to create profiles, connect with friends, and share information, photos, and updates with their network. Users can also join groups, participate in discussions, and interact with others through comments and messages. Social networking platforms have become popular for both personal and professional use, providing a means for people to stay connected, share interests, and engage with others online.

Submit
6. If you or someone else posts something about you online, it will probably go away:

Explanation

Once something is posted online, it becomes part of the digital world and can be difficult to completely erase. Even if you delete it, there is a possibility that it has already been saved or shared by someone else. Additionally, online content can be archived or indexed by search engines, making it accessible even after a long period of time. Therefore, it is unlikely that something posted online will ever completely go away.

Submit
7. What things should you look for on a website to determine if the data is appropriate or accurate?

Explanation

To determine if the data on a website is appropriate or accurate, it is important to look for the contributor or author's name, the date when the data was last updated, and an email address. The contributor or author's name helps establish credibility and expertise, while the date of the last update ensures that the information is current and relevant. Additionally, an email address allows users to contact the website owner for further clarification or verification. Considering all of these factors together helps to ensure the accuracy and appropriateness of the data on a website.

Submit
8. What is SPAM?

Explanation

SPAM refers to unwanted email that is typically sent in bulk to a large number of recipients. It often contains unsolicited advertisements or promotional messages. This type of email is considered spam because it is sent without the consent of the recipients and is usually irrelevant or unwanted. Spam emails can be a nuisance and may also pose security risks, such as phishing attempts or the spread of malware.

Submit
9. All of the following are things to do about a cyberbully EXCEPT:

Explanation

The correct answer is "Respond to the bully and make threats." This option is not a recommended action to take when dealing with a cyberbully. Responding to the bully and making threats can escalate the situation and potentially make it worse. It is important to avoid engaging with the bully and instead focus on seeking help from a trusted adult, saving evidence of the bullying, and not responding to the bully's messages.

Submit
10. What is "grooming"?

Explanation

Grooming refers to the process where an individual, usually an adult, builds an emotional connection with a child or young person online with the intention of gaining their trust and potentially exploiting them. This can involve pretending to be someone else, manipulating the child into sharing personal information or engaging in inappropriate activities. It is important for individuals, especially children, to be aware of the dangers of online grooming and take necessary precautions to protect themselves.

Submit
11. Which of the following personal information is okay to put online?

Explanation

It is okay to put your favorite food online because it is a personal preference and does not reveal any sensitive or personally identifiable information. Sharing your full name, school, or birthdate online can potentially compromise your privacy and put you at risk of identity theft or other harmful consequences. Therefore, it is advised to refrain from sharing such personal information online.

Submit
12. Which of the following probably gives the most accurate data about "atoms"?

Explanation

The website www.wextoncollege.edu/science/atoms is likely to provide the most accurate data about "atoms" because it is a specific educational institution's website that focuses on science and specifically mentions atoms in the URL. This suggests that the website is dedicated to providing credible and reliable information about atoms.

Submit
13. Who are the most likely targets of on line predators?

Explanation

Teenage girls are the most likely targets of online predators because they are often perceived as more vulnerable and easily manipulated. Predators may exploit their curiosity, naivety, and desire for attention or validation. Additionally, teenage girls are more likely to engage in online activities such as social media, online gaming, and chat rooms, making them more accessible to predators. The anonymity of the internet allows predators to create fake identities and establish relationships with unsuspecting victims, putting teenage girls at higher risk.

Submit
14. Which is the best way to protect yourself when on MySpace or Facebook?

Explanation

Using the privacy settings is the best way to protect yourself when on MySpace or Facebook. By adjusting the privacy settings, you can control who can see your posts, personal information, and photos. This allows you to limit the visibility of your content to only your friends or a select group of people, reducing the risk of strangers accessing your information or using it against you. It is important to be cautious about what you post online, but utilizing privacy settings adds an extra layer of protection to ensure your personal information remains secure.

Submit
15. Your parents (or you) have received an email from their (your) bank saying there is a problem with their (your) account. Instructions say to click on the link in the email and enter their (your) username and password to solve the problem. This is an example of:

Explanation

This scenario is an example of phishing. Phishing is a fraudulent activity where scammers impersonate a legitimate institution, such as a bank, to deceive individuals into providing sensitive information like usernames and passwords. In this case, the email instructs the recipient to click on a link and enter their account credentials, which is a common tactic used by phishers to gain unauthorized access to personal information and commit identity theft. It is important to be cautious and never provide sensitive information in response to unsolicited emails or messages.

Submit
16. How should you stop communicating with someone online?Click all the apply.

Explanation

When communicating with someone online, it is important to be cautious and protect your personal information. If the person asks for personal information, it is a red flag and a sign that you should stop communicating with them. Similarly, if the person asks to meet in person, it can be a potential danger and it is best to end the communication. Additionally, if the person asks you to keep secrets or sends you inappropriate pictures or messages, it is important to cut off communication with them to ensure your safety and well-being.

Submit
17. What are Proper Rules for the Internet called?

Explanation

Netiquette refers to the proper rules and guidelines for behavior and communication on the internet. It encompasses various aspects of online etiquette, such as being polite, respectful, and considerate towards others while using online platforms. Netiquette helps to create a positive and harmonious online environment by promoting good manners and responsible online behavior. "Proper Rules for the Internet" and "Internet Politeness" are not commonly used terms to refer to the concept of netiquette.

Submit
18. What per cent of teenagers report they have been contacted by a potential predator?

Explanation

The correct answer is 20. This means that 20% of teenagers report that they have been contacted by a potential predator. This suggests that a significant portion of teenagers have experienced this concerning and dangerous situation. It highlights the need for education and awareness about online safety and the potential risks that teenagers face when using the internet.

Submit
19. True or False: It is okay to download or print a single copy of copyright material for your own use.

Explanation

It is okay to download or print a single copy of copyright material for your own use. This is because copyright law typically allows for the fair use of copyrighted materials for personal use. However, it is important to note that distributing or sharing copyrighted material without permission is generally illegal.

Submit
20. What is "flaming"?

Explanation

Flaming refers to engaging in online fights using electronic messaging. This involves sending mean, nasty, and insulting messages to others on the internet. It is a form of aggressive behavior where individuals attack and provoke others with offensive language and personal attacks in online discussions or forums. This can lead to heated arguments and a hostile online environment.

Submit
View My Results

Quiz Review Timeline (Updated): Apr 18, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 18, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 06, 2009
    Quiz Created by
    Drmicm
Cancel
  • All
    All (20)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
 What is cyberbullying?
Which of the following would provide the strongest password?
Who can you trust online?
Birthday, school name, full name, phone number are all examples of:
Facebook, MySpace, Twitter are examples of:
If you or someone else posts something about you online, it will...
What things should you look for on a website to determine if the data...
What is SPAM?
All of the following are things to do about a cyberbully EXCEPT:
What is "grooming"?
Which of the following personal information is okay to put online?
Which of the following probably gives the most accurate data about...
Who are the most likely targets of on line predators?
Which is the best way to protect yourself when on MySpace or Facebook?
Your parents (or you) have received an email from their (your) bank...
How should you stop communicating with someone online?Click all the...
What are Proper Rules for the Internet called?
What per cent of teenagers report they have been contacted by a...
True or False: It is okay to download or print a single copy of...
What is "flaming"?
Alert!

Advertisement