Toggle Navigation
Games
Blog
Class PIN
Join for Free
Sign in
Toggle Navigation
Games
PIN
Join for Free
Blog
Pricing
Contact us
Help center
Sign in
Edit Game
Social media Privacy
Delete
Settings
Multiple Choice
Import
Collapse
GIFs
Images 🔒 Plus
×
Start using GIFs
GIFs
Stickers
Text
Relevant
ADD SOUND
Upload
Record
Remove Existing
Upload sound (5MB max, 10s max)
Start Recording (10s max)
Stop
Cancel
Title
Browse gifs, upload image or paste URL
Image Library
Description
Language
Choose a Language
Abkhazian
Afar
Afrikaans
Akan
Albanian
Amharic
Arabic
Aragonese
Armenian
Assamese
Avaric
Avestan
Aymara
Azerbaijani
Bambara
Bashkir
Basque
Belarusian
Bengali
Bihari languages
Bislama
Bosnian
Breton
Bulgarian
Burmese
Catalan, Valencian
Central Khmer
Chamorro
Chechen
Chichewa, Chewa, Nyanja
Chinese
Church Slavonic, Old Bulgarian, Old Church Slavonic
Chuvash
Cornish
Corsican
Cree
Croatian
Czech
Danish
Divehi, Dhivehi, Maldivian
Dutch, Flemish
Dzongkha
English
Esperanto
Estonian
Ewe
Faroese
Fijian
Finnish
French
Fulah
Gaelic, Scottish Gaelic
Galician
Ganda
Georgian
German
Gikuyu, Kikuyu
Greek (Modern)
Greenlandic, Kalaallisut
Guarani
Gujarati
Haitian, Haitian Creole
Hausa
Hebrew
Herero
Hindi
Hiri Motu
Hungarian
Icelandic
Ido
Igbo
Indonesian
Interlingua (International Auxiliary Language Association)
Interlingue
Inuktitut
Inupiaq
Irish
Italian
Japanese
Javanese
Kannada
Kanuri
Kashmiri
Kazakh
Kinyarwanda
Komi
Kongo
Korean
Kwanyama, Kuanyama
Kurdish
Kyrgyz
Lao
Latin
Latvian
Letzeburgesch, Luxembourgish
Limburgish, Limburgan, Limburger
Lingala
Lithuanian
Luba-Katanga
Macedonian
Malagasy
Malay
Malayalam
Maltese
Manx
Maori
Marathi
Marshallese
Moldovan, Moldavian, Romanian
Mongolian
Nauru
Navajo, Navaho
Northern Ndebele
Ndonga
Nepali
Northern Sami
Norwegian
Norwegian Bokmål
Norwegian Nynorsk
Nuosu, Sichuan Yi
Occitan (post 1500)
Ojibwa
Oriya
Oromo
Ossetian, Ossetic
Pali
Panjabi, Punjabi
Pashto, Pushto
Persian
Polish
Portuguese
Quechua
Romansh
Rundi
Russian
Samoan
Sango
Sanskrit
Sardinian
Serbian
Shona
Sindhi
Sinhala, Sinhalese
Slovak
Slovenian
Somali
Sotho, Southern
South Ndebele
Spanish, Castilian
Sundanese
Swahili
Swati
Swedish
Tagalog
Tahitian
Tajik
Tamil
Tatar
Telugu
Thai
Tibetan
Tigrinya
Tonga (Tonga Islands)
Tsonga
Tswana
Turkish
Turkmen
Twi
Uighur, Uyghur
Ukrainian
Urdu
Uzbek
Venda
Vietnamese
Volap_k
Walloon
Welsh
Western Frisian
Wolof
Xhosa
Yiddish
Yoruba
Zhuang, Chuang
Zulu
Remove Image
Tags
Use commas to add multiple tags
Private
Unlisted
Public
Featured
Game of the Day
Game of the Day
Try Baamboozle+ for free
Featured
Featured on Games page
Public
Visible on your profile. Anyone can play.
Unlisted
Hidden from your profile. Anyone with the link or game code can play.
Private
Hidden from your profile. Only you can play.
Save
Cancel
Copy and paste from ChatGPT, Quizlet Export, Word, Excel, Google Docs, etc.
Delimiter between question and answer:
Comma
Tab
Semicolon
Custom
Tips:
No column headers.
Each line maps to a question.
If the delimiter is used in a question, the question should be surrounded by double quotes: "My, question","My, answer"
The first answer in the multiple choice question must be the correct answer.
Import questions
Cancel
Question
Answer
Points
5
10
15
20
25
Image options
Question with image
Answer with image
Browse gifs, upload image or paste URL
Image Library
Save
22
Close
If your ransomware message is gone, it means that your computer is ok now?
False!
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is Ransomware?
A virus that demands payment or you will lose all of your data.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
It is ok if you click on a pop-up, your computer is protected from your browser. (True or false?)
False! Due to various integrations, your browser has a high level of access to your operating system.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is the best way to protect yourself from Ransomware?
Backup and encrypt your data to external media.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
Give an example of a Social engineering scam.
Various. Win an Ipad, gift card, etc.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
Why is it important to think before you post?
You risk overexposing yourself.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
How can you tell if an email is a phishing attempt?
Spelling errors, weird email address, strange questions, too good to be true.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What are some characteristics of Social engineering?
Impersonation, fake, Scare tactics, baiting, etc.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is scareware?
A scary pop-up message attempts to get you to enter confidential personal information to fix a virus/infection on your computer.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
Vishing: Phishing over the phone, tricking people into calling a number, and providing confidential information. (True or False?)
True!
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is baiting?
Using an item to lure in a victim (e.g., free devices, music, movies, etc.).
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is spear-phishing?
Phishing attempts that focus on a specific high-value individual or group.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
Social engineering exploits the willingness of people to provide information when asked politely and in a reasonable manner. True or False?
True.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is social engineering?
When criminals attempt to trick people into revealing confidential personal information. Phishing is a type of social engineering.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is shoulder surfing?
Someone spying on you when you are accessing personal information. I.e, looking over your shoulder.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
Email: “You have won a free $500 Walmart gift card. Click here to collect your card.” This is an example of....
Phishing.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is impersonation? Give an example.
When you pretend to be someone else. A stranger that says they are a friend of your parents.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
You receive an email from your school. It asks you to provide sensitive personal information (password, Social Security Number, etc.) What should you do?
Do not respond. Contact the school and ask questions.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
Phishing messages may appear to be from organizations you do business with? True or False?
True!
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
Phishing attacks happen by email, phone, online ads and text messaging? True or False.
True.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What are examples of personal information?
Credit card and bank account numbers, Social Security number, passwords, etc.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
What is phishing?
When criminals try to trick you into giving out confidential or personal information. They use schemes to gain your trust.
5
10
15
20
25
Image
Browse gifs, upload image or paste URL
Image Library
Image options
Question with image
Answer with image
×
Sign up for a trial to unlock features.
Get Started
Your experience on this site will be improved by allowing cookies.
Allow cookies