Cyber Safety & Cyberbullying Cyber Safety & Cyberbullying 1 / 25 1) Who should you talk to if you are experiencing cyberbullying? a) A trusted adult b) Strangers online c) Nobody d) The bully 2 / 25 2) Which of these is an example of cyberbullying? a) Complimenting someone on their photo b) Congratulating someone on their achievements c) Liking a friend's post on social media d) Sending anonymous threatening messages 3 / 25 3) Why is it important to keep your software up to date? a) To get the latest features b) To make your device slower c) To use more storage space d) To protect your device from online threats 4 / 25 4) What is one way to address cyberbullying if you or someone you know is experiencing it? a) Respond to the bully b) Don't respond to the bully c) Encourage the bully d) Share the bullying with others 5 / 25 5) How can you check if a website is secure when entering personal information? a) Look for a padlock symbol in the address bar and https in the website address b) See if the website has a lot of images c) Look for a high number of visitors d) Check if the website has many ads 6 / 25 6) What is the main purpose of cyber safety? a) To create complex passwords b) To access public Wi-Fi c) To become popular on social media d) To stay safe and secure when using the internet and digital technologies 7 / 25 7) What should you do if you receive a suspicious email asking for personal information? a) Provide the requested information b) Click on any links in the email c) Avoid clicking on links and report the phishing attempt d) Download any attachments 8 / 25 8) Which of these is a good practice for protecting your personal information online? a) Connecting to public Wi-Fi for online banking b) Using the same password for all accounts c) Sharing your home address on social media d) Using strong, unique passwords for each account 9 / 25 9) Why is it important to use strong passwords? a) To avoid using special characters b) To protect your accounts from hackers and cybercriminals c) To make it easy for friends to access your accounts d) To make it easy to remember 10 / 25 10) What is a common sign that an email or message might be a phishing scam? a) The message contains misspellings or unusual grammar b) The message is from a trusted contact c) The message has no links or attachments d) The message is only text 11 / 25 11) What is the best way to respond to a cyberbully? a) Don't respond to the bully b) Encourage their behavior c) Join the bullying d) Retaliate with insults 12 / 25 12) What is the role of bystanders in combating cyberbullying? a) To ignore the situation b) To help address and prevent cyberbullying c) To participate in the bullying d) To spread the bullying content 13 / 25 13) How can promoting digital citizenship help prevent cyberbullying? a) By ignoring the feelings of others b) By spreading harmful content c) By encouraging negative behavior online d) By understanding the impact of our words and actions online 14 / 25 14) What should you do if you witness cyberbullying? a) Like, share, or comment on harmful content b) Encourage the bullying c) Ignore the content d) Report the content to the platform 15 / 25 15) How can a password manager help you maintain online security? a) By creating weak passwords for your accounts b) By securely storing all of your passwords in one place c) By allowing you to use the same password for all accounts d) By providing public Wi-Fi passwords 16 / 25 16) What is a passphrase? a) A series of special characters b) A single word c) A longer sequence of words that is easy to remember but hard to guess d) A sequence of numbers 17 / 25 17) What is the primary goal of a phishing scam? a) To entertain people b) To provide helpful information c) To trick people into giving away their personal information d) To help people find new friends 18 / 25 18) What should you do with evidence of cyberbullying? a) Share it with your friends b) Ignore it c) Delete it immediately d) Save the evidence 19 / 25 19) What should you avoid sharing on social media to protect your personal information? a) Your favorite movies b) Your favorite hobbies c) Your home address and phone number d) Pictures of your pets 20 / 25 20) How can two-factor authentication help protect your online accounts? a) By automatically sharing your password with friends b) By making your password easier to guess c) By requiring a code in addition to your password to access your account d) By requiring only a password to access your account 21 / 25 21) What can you do on social media platforms to report cyberbullying? a) Like the bullying content b) Share the bullying content c) Use the reporting features d) Ignore the bullying content 22 / 25 22) Why should you avoid accessing sensitive information on public Wi-Fi networks? a) Public Wi-Fi networks are more secure than private networks b) Public Wi-Fi networks are usually faster c) Public Wi-Fi networks can be less secure, and your information can be intercepted d) Public Wi-Fi networks require a password 23 / 25 23) How can you prevent a cyberbully from contacting you further? a) Add them as a friend on social media b) Respond to their messages c) Block the bully d) Encourage their behavior 24 / 25 24) What is one way to support someone experiencing cyberbullying? a) Join the bully b) Spread rumors about them c) Be a friend and offer support d) Ignore them 25 / 25 25) What is the goal of promoting digital citizenship and empathy? a) To encourage cyberbullying b) To help people become famous on social media c) To encourage negative behavior online d) To create a more respectful and inclusive online environment Your score is Restart quiz