Toggle Navigation
Games
Blog
Class PIN
Join for Free
Sign in
Toggle Navigation
Games
PIN
Join for Free
Blog
Pricing
Contact us
Help center
Sign in
Edit Game
Computer Literacy Review
Delete
Settings
Multiple Choice
Import
Collapse
GIFs
Images 🔒 Plus
×
Start using GIFs
GIFs
Stickers
Text
Relevant
ADD SOUND
Upload
Record
Remove Existing
Upload sound (5MB max, 10s max)
Start Recording (10s max)
Stop
Cancel
Title
Browse gifs, upload image or paste URL
Image Library
Description
Language
Choose a Language
Abkhazian
Afar
Afrikaans
Akan
Albanian
Amharic
Arabic
Aragonese
Armenian
Assamese
Avaric
Avestan
Aymara
Azerbaijani
Bambara
Bashkir
Basque
Belarusian
Bengali
Bihari languages
Bislama
Bosnian
Breton
Bulgarian
Burmese
Catalan, Valencian
Central Khmer
Chamorro
Chechen
Chichewa, Chewa, Nyanja
Chinese
Church Slavonic, Old Bulgarian, Old Church Slavonic
Chuvash
Cornish
Corsican
Cree
Croatian
Czech
Danish
Divehi, Dhivehi, Maldivian
Dutch, Flemish
Dzongkha
English
Esperanto
Estonian
Ewe
Faroese
Fijian
Finnish
French
Fulah
Gaelic, Scottish Gaelic
Galician
Ganda
Georgian
German
Gikuyu, Kikuyu
Greek (Modern)
Greenlandic, Kalaallisut
Guarani
Gujarati
Haitian, Haitian Creole
Hausa
Hebrew
Herero
Hindi
Hiri Motu
Hungarian
Icelandic
Ido
Igbo
Indonesian
Interlingua (International Auxiliary Language Association)
Interlingue
Inuktitut
Inupiaq
Irish
Italian
Japanese
Javanese
Kannada
Kanuri
Kashmiri
Kazakh
Kinyarwanda
Komi
Kongo
Korean
Kwanyama, Kuanyama
Kurdish
Kyrgyz
Lao
Latin
Latvian
Letzeburgesch, Luxembourgish
Limburgish, Limburgan, Limburger
Lingala
Lithuanian
Luba-Katanga
Macedonian
Malagasy
Malay
Malayalam
Maltese
Manx
Maori
Marathi
Marshallese
Moldovan, Moldavian, Romanian
Mongolian
Nauru
Navajo, Navaho
Northern Ndebele
Ndonga
Nepali
Northern Sami
Norwegian
Norwegian Bokmål
Norwegian Nynorsk
Nuosu, Sichuan Yi
Occitan (post 1500)
Ojibwa
Oriya
Oromo
Ossetian, Ossetic
Pali
Panjabi, Punjabi
Pashto, Pushto
Persian
Polish
Portuguese
Quechua
Romansh
Rundi
Russian
Samoan
Sango
Sanskrit
Sardinian
Serbian
Shona
Sindhi
Sinhala, Sinhalese
Slovak
Slovenian
Somali
Sotho, Southern
South Ndebele
Spanish, Castilian
Sundanese
Swahili
Swati
Swedish
Tagalog
Tahitian
Tajik
Tamil
Tatar
Telugu
Thai
Tibetan
Tigrinya
Tonga (Tonga Islands)
Tsonga
Tswana
Turkish
Turkmen
Twi
Uighur, Uyghur
Ukrainian
Urdu
Uzbek
Venda
Vietnamese
Volap_k
Walloon
Welsh
Western Frisian
Wolof
Xhosa
Yiddish
Yoruba
Zhuang, Chuang
Zulu
Remove Image
Tags
Use commas to add multiple tags
Private
Unlisted
Public
Featured
Game of the Day
Game of the Day
Try Baamboozle+ for free
Featured
Featured on Games page
Public
Visible on your profile. Anyone can play.
Unlisted
Hidden from your profile. Anyone with the link or game code can play.
Private
Hidden from your profile. Only you can play.
Save
Cancel
Copy and paste from ChatGPT, Quizlet Export, Word, Excel, Google Docs, etc.
Delimiter between question and answer:
Comma
Tab
Semicolon
Custom
Tips:
No column headers.
Each line maps to a question.
If the delimiter is used in a question, the question should be surrounded by double quotes: "My, question","My, answer"
The first answer in the multiple choice question must be the correct answer.
Import questions
Cancel
Question
Answer
Points
5
10
15
20
25
Image options
Question with image
Answer with image
Browse gifs, upload image or paste URL
Image Library
Save
34
Close
What types of works can be plagiarized and are protected by Copyright Laws?
Essays, music, Movies, artwork, songs, photographs, computer software, etc.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What are some tips to consider when sending an email?
tone, grammar, be brief, have professional fonts, and use punctuation
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What are examples of sensitive information that should not be shared in emails?
credit card numbers, social security numbers, passwords
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
Which keyboard key allows you to select NON adjacent files?
CTRL
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
Which keyboard key allows you to select adjacent files?
SHIFT
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
How do you identify the bully, target, and the upstander?
the bully is the one doing the harmful action, the target is who the bully is doing the bullying to, and the upstander is the person who stands up for the targe
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
When shopping online, what signals that you are on a secure site to protect against security threats?
https in the website or a locked symbol
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
How can cyberbullying and social media posts affect your future?
Lose scholarships, get denied from college acceptance, jail time
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is the ability to imagine the feelings that someone else is experiencing?
Empathy
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is cyberbullying?
the electronic posting of mean-spirited messages about a person (such as a student) often done anonymously
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is the way you tell your readers that certain material in your work came from another source?
Citation, cite your source
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is plagiarism?
taking someone else's work and passing it off as your own
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is the practice of spying on a user of an ATM, computer, or other electronic device in order to obtain their personal access information?
Shoulder Surfing
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What does a firewall do?
prevents other computers on the internet from accessing a computer OR prevents a program on the computer from accessing the Internet
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What does Anitvirus software do?
it searches for files that cause harm and tries to fix them by erasing or disabling the commands
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is the unauthorized use of or damage to a computer or computer files called?
Security Threat
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is the act of defrauding an account holder by sending emails to try to gain access to financial information?
Phishing
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is software used to track a computer user's internet usage?
Spyware
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is the best way to find out if something is true?
Research the information
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What makes a good password?
A mix of letters (uppercase and lowercase), numbers, and symbols that you can remember.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What are some issues that can occur when you spend a lot of time online?
It can hurt friendships, grades, mental health, etc.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
Why are people meaner online than in person?
They can stay anonymous.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
Why is it important to disregard Internet hoaxes, chain emails, and constant messaging?
It can contain harmful viruses and could clog up your email
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What are two examples of Security Threats?
Virus, Spoofed site, phishing, shoulder surfing, pharming, malware, spyware
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is a redirect from a legitimate site that sends a customer to a criminal's spoofed site?
Pharming
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is a spoofed site?
a website set up to look like another website (fake site)
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What are ways your identity can be stolen?
dumpster diving, shoulder surfing, wallet is stolen, through business records, spoofing, phishing, con game (phone calls)
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is identity theft?
when someone takes your personal information and pretends to be you
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is tricky about online communication whether it is email or text?
Lack of emotional details and tone so it leads to misunderstandings.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
Why is it not a good idea to keep all your credit cards in your wallet or purse?
Because it can get stolen.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is the best practice for your PINs for credit or debit cards?
To memorize them.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What do you do if you are a victim of identity theft? (There are five.)
Contact FTC, notify the 3 credit bureaus, file police report, contact creditors, make complaints in writing
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
Name two ways to prevent identity theft. (There were eight.)
Educate, Check credit report annually, Check monthly statements, Don't give out info, Secure websites, Strong Passwords, Shred Mail, Firewall
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is the fastest growing crime in America?
Identity Theft
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
×
Sign up for a trial to unlock features.
Get Started
Your experience on this site will be improved by allowing cookies.
Allow cookies