Edit Game
Identity Theft 2023
 Delete

Use commas to add multiple tags

 Private  Unlisted  Public




Delimiter between question and answer:

Tips:

  • No column headers.
  • Each line maps to a question.
  • If the delimiter is used in a question, the question should be surrounded by double quotes: "My, question","My, answer"
  • The first answer in the multiple choice question must be the correct answer.






 Save   23  Close
Can you name this device?
floppy disk
Which is your favourite smartphone application? Tell 3 useful functions that makes it the best!
...
What does this image represent?
phishing
What is a strong password like?
It contains different types of characters.
What's another word for this?
Fake news
What's this?
Firewall
You've been chatting online with someone whom you haven't met yet. Now this person invites you to meet in a park in the evening. What will you do?
...
You're always tired and sleepy in school, because you play online video games until late night. Your teacher wants to talk to you about it. What will you do?
...
Your parents are worried because you spend to much time on internet. They restricted your online time to 1 hour per day. What will you do?
...
Your friend broke up with his partner. They shared each others' passwords. What advice will you give?
 
Change the passwords and suggest the same to the ex.
 
Start to blackmail the ex.
 
Don't do anything.
What do you do if a stranger contacts you online or on social media?
1. I block him immediately. 2. I accept him without any questions. 3. I think about it before accepting it
What types of messages do you communicate on social media and the internet?
1. Everything I do or am going to do. 2. My personal wants and needs. 3. News, events and meetings.
What do you want to show about yourself on social media and on the internet?
...
What is your aim when you show your image on the internet or social media?
...
How do you ensure your privacy when surfing the internet or social networking?
1. I do not provide personal or intimate data. 2. I set up my profile securely. 3. I don't think it is that important, so I share whatever I want.
If your parents tell you that you are dependent on your mobile phone, what would you tell them?
...
If a friend asked you to share a social media password, how would you respond?
...
A friend sends you an (impolite) photo of a classmate - would you spread the image?
1. No, she deserves respect. 2. If she sent it, why not? 3. No, and I'd ask her to delete it.
If a friend sends you a photo of them having a great time, do you share it on social media?
...
How do you express your moods on social media and the internet?
1.I use impolite words sometimes. 2. I add emoticons to my messages. 3. With private messages to friends.
If your online social profile is hacked, what do they have access to?
To all your information: data, photos, videos, etc.
Why would someone commit identity theft?
To offend, bother or cause harm to the person they are impersonating.
What is identity theft?
 
To pretend to be someone you are not online.
 
To be yourself online.
 
To identify yourself.