Edit Game
Safer internet
 Delete

Use commas to add multiple tags

 Private  Unlisted  Public



 Save

Delimiter between question and answer:

Tips:

  • No column headers.
  • Each line maps to a question.
  • If the delimiter is used in a question, the question should be surrounded by double quotes: "My, question","My, answer"
  • The first answer in the multiple choice question must be the correct answer.






 Save   10  Close
What is the purpose of antivirus software on a computer or phone?​ a) Enhancing device speed​ b) Protecting against viruses and malware
b) Protecting against viruses and malware
Which of the following is an example of respectful online communication?​ a) Using offensive language​ b) Constructive criticism
b) Constructive criticism
What is a proactive step to address cyberbullying?​ a) Ignore the situation​ b) Report and block the person, and seek support from a trusted adult
b) Report and block the person, and seek support from a trusted adult
How can you manage your digital footprint effectively?​ a) Avoid using the internet altogether​ b) Regularly review and adjust privacy settings
b) Regularly review and adjust privacy settings
6.  What is a recommended precaution when using public Wi-Fi?​ a) Turn off your device's firewall​ b) Use a virtual private network (VPN)​b) Use a virtual private network (VPN)
What does the "https" in a website's URL indicate during online shopping?
The website has a secure and encrypted connection.
What is a key characteristic of a strong and secure password? a) Short and simple b) Easy to remember
b) Easy to remember
What is a common characteristic of phishing emails? a) Clearly written by a reputable company b) Urgent requests for personal information
b) Urgent requests for personal information
Which of the following is a recommended privacy setting on social media? a) Public Profile b) Private Profile
b) Private Profile
Is using a passphrase with a combination of uppercase, lowercase, numbers, and symbols a good practice for creating secure passwords?
Yes. It is a good practice for creating secure passwords.