Basic Internet Safety Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Drmicm
D
Drmicm
Community Contributor
Quizzes Created: 1 | Total Attempts: 3,725
Questions: 20 | Attempts: 3,730

SettingsSettingsSettings
Basic Internet Safety Quiz - Quiz

The Internet has opened up a whole new world of opportunity for people of all ages. You can shop, plan a holiday, send pictures and videos to family and friends, chat with others and even study online. But the Internet has slew of risks associated with it, if safety precautions are not implemented. See how well do you know about basic Internet safety.


Questions and Answers
  • 1. 

     What is cyberbullying?

    • A.

      Bullying on the playground, bus stop or public place.

    • B.

      Bullying through emails, IM, websites, cell phone, etc.

    • C.

      Physically hurting some who cannot stand up for themselves.

    • D.

      Being nice to someone.

    Correct Answer
    B. Bullying through emails, IM, websites, cell phone, etc.
    Explanation
    Cyberbullying refers to the act of bullying that takes place through electronic means such as emails, instant messaging, websites, and cell phones. It involves using technology to harass, intimidate, or harm someone, often repeatedly and intentionally. Unlike traditional bullying which may occur in physical locations like playgrounds or bus stops, cyberbullying occurs in the virtual world, making it easier for the perpetrator to remain anonymous and for the victim to be targeted 24/7. This form of bullying can have severe psychological and emotional effects on the victim.

    Rate this question:

  • 2. 

    What are Proper Rules for the Internet called?

    • A.

      Proper Rules for the Internet

    • B.

      Internet Politeness

    • C.

      Netiquette

    • D.

      None of the above

    Correct Answer
    C. Netiquette
    Explanation
    Netiquette refers to the proper rules and guidelines for behavior and communication on the internet. It encompasses various aspects of online etiquette, such as being polite, respectful, and considerate towards others while using online platforms. Netiquette helps to create a positive and harmonious online environment by promoting good manners and responsible online behavior. "Proper Rules for the Internet" and "Internet Politeness" are not commonly used terms to refer to the concept of netiquette.

    Rate this question:

  • 3. 

    What is "grooming"?

    • A.

      When someone buys you personal care products.

    • B.

      When your dog licks your face.

    • C.

      When someone tries to become your friend online.

    • D.

      When someone threatens you online.

    Correct Answer
    C. When someone tries to become your friend online.
    Explanation
    Grooming refers to the process where an individual, usually an adult, builds an emotional connection with a child or young person online with the intention of gaining their trust and potentially exploiting them. This can involve pretending to be someone else, manipulating the child into sharing personal information or engaging in inappropriate activities. It is important for individuals, especially children, to be aware of the dangers of online grooming and take necessary precautions to protect themselves.

    Rate this question:

  • 4. 

    Who can you trust online?

    • A.

      Someone you've spent a lot of time with in a chatroom.

    • B.

      Someone you know well offline.

    • C.

      Someone interested in you life and activities.

    • D.

      Someone who knows your other cyber friends.

    Correct Answer
    B. Someone you know well offline.
    Explanation
    The correct answer is someone you know well offline. This is because offline relationships are typically built on trust and familiarity, whereas online relationships can be more easily manipulated or misrepresented. Knowing someone well offline means that you have had the opportunity to establish trust and gauge their character in person, making them a more reliable source of trust online.

    Rate this question:

  • 5. 

    Birthday, school name, full name, phone number are all examples of:

    • A.

      Too much online personal information.

    • B.

      Good profile data.

    • C.

      Fun facts to share while chatting

    • D.

      None of the above.

    Correct Answer
    A. Too much online personal information.
    Explanation
    The given correct answer is "Too much online personal information." This is because birthday, school name, full name, and phone number are all examples of personal information that should not be shared freely online. Revealing such details can pose a risk to one's privacy and security, as they can be exploited by malicious individuals for identity theft or other harmful activities. It is important to be cautious and mindful of the information we share online to protect ourselves from potential risks.

    Rate this question:

  • 6. 

    What is "flaming"?

    • A.

      When your computer overheats.

    • B.

      Sending mean, nasty, and insulting messages to others on line.

    • C.

      Online fights using electronic messaging.

    • D.

      Pretending to be someone else online.

    Correct Answer
    C. Online fights using electronic messaging.
    Explanation
    Flaming refers to engaging in online fights using electronic messaging. This involves sending mean, nasty, and insulting messages to others on the internet. It is a form of aggressive behavior where individuals attack and provoke others with offensive language and personal attacks in online discussions or forums. This can lead to heated arguments and a hostile online environment.

    Rate this question:

  • 7. 

    Which is the best way to protect yourself when on MySpace or Facebook?

    • A.

      Be careful what you post online.

    • B.

      On post lies about yourself.

    • C.

      Use the privacy settings.

    • D.

      Don't post pictures.

    Correct Answer
    C. Use the privacy settings.
    Explanation
    Using the privacy settings is the best way to protect yourself when on MySpace or Facebook. By adjusting the privacy settings, you can control who can see your posts, personal information, and photos. This allows you to limit the visibility of your content to only your friends or a select group of people, reducing the risk of strangers accessing your information or using it against you. It is important to be cautious about what you post online, but utilizing privacy settings adds an extra layer of protection to ensure your personal information remains secure.

    Rate this question:

  • 8. 

    Which of the following personal information is okay to put online?

    • A.

      Your full name

    • B.

      Your school

    • C.

      Your favorite food

    • D.

      Your birthdate

    • E.

      None of the above.

    Correct Answer
    C. Your favorite food
    Explanation
    It is okay to put your favorite food online because it is a personal preference and does not reveal any sensitive or personally identifiable information. Sharing your full name, school, or birthdate online can potentially compromise your privacy and put you at risk of identity theft or other harmful consequences. Therefore, it is advised to refrain from sharing such personal information online.

    Rate this question:

  • 9. 

    True or False: It is okay to download or print a single copy of copyright material for your own use.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    It is okay to download or print a single copy of copyright material for your own use. This is because copyright law typically allows for the fair use of copyrighted materials for personal use. However, it is important to note that distributing or sharing copyrighted material without permission is generally illegal.

    Rate this question:

  • 10. 

    Which of the following would provide the strongest password?

    • A.

      Your birthdate

    • B.

      A mix of letters, numbers or symbols.

    • C.

      Your pet's name

    • D.

      Your screen name

    Correct Answer
    B. A mix of letters, numbers or symbols.
    Explanation
    A mix of letters, numbers, or symbols would provide the strongest password because it increases the complexity and makes it harder for hackers to guess or crack. Using personal information like birthdate, pet's name, or screen name can be easily guessed or obtained through social engineering. However, a combination of letters, numbers, and symbols creates a more random and unique password that is harder to guess or crack using brute force methods.

    Rate this question:

  • 11. 

    Facebook, MySpace, Twitter are examples of:

    • A.

      SPAM

    • B.

      Social Networking

    • C.

      Cyberbullying

    • D.

      Online predator havens

    Correct Answer
    B. Social Networking
    Explanation
    Facebook, MySpace, and Twitter are all examples of social networking platforms. These websites allow users to create profiles, connect with friends, and share information, photos, and updates with their network. Users can also join groups, participate in discussions, and interact with others through comments and messages. Social networking platforms have become popular for both personal and professional use, providing a means for people to stay connected, share interests, and engage with others online.

    Rate this question:

  • 12. 

    All of the following are things to do about a cyberbully EXCEPT:

    • A.

      Talk to a trusted adult.

    • B.

      Respond the the bully and make threats.

    • C.

      Save the bully's messages.

    • D.

      Don't respond.

    Correct Answer
    B. Respond the the bully and make threats.
    Explanation
    The correct answer is "Respond to the bully and make threats." This option is not a recommended action to take when dealing with a cyberbully. Responding to the bully and making threats can escalate the situation and potentially make it worse. It is important to avoid engaging with the bully and instead focus on seeking help from a trusted adult, saving evidence of the bullying, and not responding to the bully's messages.

    Rate this question:

  • 13. 

    Which of the following probably gives the most accurate data about "atoms"?

    • A.

      Www.information.com

    • B.

      Www.wextoncollege.edu/science/atoms

    • C.

      Www.wikipedia.com

    • D.

      Www.rassamuniversity.edu/~thomas

    Correct Answer
    B. Www.wextoncollege.edu/science/atoms
    Explanation
    The website www.wextoncollege.edu/science/atoms is likely to provide the most accurate data about "atoms" because it is a specific educational institution's website that focuses on science and specifically mentions atoms in the URL. This suggests that the website is dedicated to providing credible and reliable information about atoms.

    Rate this question:

  • 14. 

    What things should you look for on a website to determine if the data is appropriate or accurate?

    • A.

      Contributor or author's name.

    • B.

      Date when data was updated.

    • C.

      Email address

    • D.

      All of the above.

    Correct Answer
    D. All of the above.
    Explanation
    To determine if the data on a website is appropriate or accurate, it is important to look for the contributor or author's name, the date when the data was last updated, and an email address. The contributor or author's name helps establish credibility and expertise, while the date of the last update ensures that the information is current and relevant. Additionally, an email address allows users to contact the website owner for further clarification or verification. Considering all of these factors together helps to ensure the accuracy and appropriateness of the data on a website.

    Rate this question:

  • 15. 

    Your parents (or you) have received an email from their (your) bank saying there is a problem with their (your) account. Instructions say to click on the link in the email and enter their (your) username and password to solve the problem. This is an example of:

    • A.

      Good banking relations

    • B.

      SPAM

    • C.

      Phishing

    • D.

      Cyberbullying

    Correct Answer
    C. Phishing
    Explanation
    This scenario is an example of phishing. Phishing is a fraudulent activity where scammers impersonate a legitimate institution, such as a bank, to deceive individuals into providing sensitive information like usernames and passwords. In this case, the email instructs the recipient to click on a link and enter their account credentials, which is a common tactic used by phishers to gain unauthorized access to personal information and commit identity theft. It is important to be cautious and never provide sensitive information in response to unsolicited emails or messages.

    Rate this question:

  • 16. 

    If you or someone else posts something about you online, it will probably go away:

    • A.

      When you delete it.

    • B.

      When someone else deletes it.

    • C.

      In 6 months

    • D.

      In one year

    • E.

      Never

    Correct Answer
    E. Never
    Explanation
    Once something is posted online, it becomes part of the digital world and can be difficult to completely erase. Even if you delete it, there is a possibility that it has already been saved or shared by someone else. Additionally, online content can be archived or indexed by search engines, making it accessible even after a long period of time. Therefore, it is unlikely that something posted online will ever completely go away.

    Rate this question:

  • 17. 

    What is SPAM?

    • A.

      An advertisement.

    • B.

      Unwanted email.

    • C.

      An invitation to join the "Special People And Members" club.

    • D.

      Cyberbullying

    Correct Answer
    B. Unwanted email.
    Explanation
    SPAM refers to unwanted email that is typically sent in bulk to a large number of recipients. It often contains unsolicited advertisements or promotional messages. This type of email is considered spam because it is sent without the consent of the recipients and is usually irrelevant or unwanted. Spam emails can be a nuisance and may also pose security risks, such as phishing attempts or the spread of malware.

    Rate this question:

  • 18. 

    How should you stop communicating with someone online?Click all the apply.

    • A.

      The person asks for personal information.

    • B.

      The person asks to meet in person.

    • C.

      The person asks you to keep secrets.

    • D.

      The person asks you who your favorite musician is.

    • E.

      The person sends you inappropriate pictures or messages.

    Correct Answer(s)
    A. The person asks for personal information.
    B. The person asks to meet in person.
    C. The person asks you to keep secrets.
    E. The person sends you inappropriate pictures or messages.
    Explanation
    When communicating with someone online, it is important to be cautious and protect your personal information. If the person asks for personal information, it is a red flag and a sign that you should stop communicating with them. Similarly, if the person asks to meet in person, it can be a potential danger and it is best to end the communication. Additionally, if the person asks you to keep secrets or sends you inappropriate pictures or messages, it is important to cut off communication with them to ensure your safety and well-being.

    Rate this question:

  • 19. 

    What per cent of teenagers report they have been contacted by a potential predator?

    • A.

      10

    • B.

      20

    • C.

      30

    • D.

      40

    • E.

      50

    Correct Answer
    B. 20
    Explanation
    The correct answer is 20. This means that 20% of teenagers report that they have been contacted by a potential predator. This suggests that a significant portion of teenagers have experienced this concerning and dangerous situation. It highlights the need for education and awareness about online safety and the potential risks that teenagers face when using the internet.

    Rate this question:

  • 20. 

    Who are the most likely targets of on line predators?

    • A.

      Teenage boys

    • B.

      Teenage girls

    • C.

      Pre teen boys

    • D.

      Pre teen girls

    Correct Answer
    B. Teenage girls
    Explanation
    Teenage girls are the most likely targets of online predators because they are often perceived as more vulnerable and easily manipulated. Predators may exploit their curiosity, naivety, and desire for attention or validation. Additionally, teenage girls are more likely to engage in online activities such as social media, online gaming, and chat rooms, making them more accessible to predators. The anonymity of the internet allows predators to create fake identities and establish relationships with unsuspecting victims, putting teenage girls at higher risk.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.