Cyber Safety & Cyberbullying Cyber Safety & Cyberbullying 1 / 25 1) What is one way to address cyberbullying if you or someone you know is experiencing it? a) Respond to the bully b) Encourage the bully c) Don't respond to the bully d) Share the bullying with others 2 / 25 2) How can a password manager help you maintain online security? a) By providing public Wi-Fi passwords b) By creating weak passwords for your accounts c) By allowing you to use the same password for all accounts d) By securely storing all of your passwords in one place 3 / 25 3) What should you do if you witness cyberbullying? a) Like, share, or comment on harmful content b) Report the content to the platform c) Ignore the content d) Encourage the bullying 4 / 25 4) Which of these is an example of cyberbullying? a) Sending anonymous threatening messages b) Liking a friend's post on social media c) Congratulating someone on their achievements d) Complimenting someone on their photo 5 / 25 5) How can you prevent a cyberbully from contacting you further? a) Add them as a friend on social media b) Block the bully c) Encourage their behavior d) Respond to their messages 6 / 25 6) Which of these is a good practice for protecting your personal information online? a) Using the same password for all accounts b) Sharing your home address on social media c) Connecting to public Wi-Fi for online banking d) Using strong, unique passwords for each account 7 / 25 7) What is the best way to respond to a cyberbully? a) Don't respond to the bully b) Encourage their behavior c) Join the bullying d) Retaliate with insults 8 / 25 8) What is the goal of promoting digital citizenship and empathy? a) To help people become famous on social media b) To encourage cyberbullying c) To encourage negative behavior online d) To create a more respectful and inclusive online environment 9 / 25 9) Why should you avoid accessing sensitive information on public Wi-Fi networks? a) Public Wi-Fi networks require a password b) Public Wi-Fi networks can be less secure, and your information can be intercepted c) Public Wi-Fi networks are usually faster d) Public Wi-Fi networks are more secure than private networks 10 / 25 10) What is a common sign that an email or message might be a phishing scam? a) The message is from a trusted contact b) The message contains misspellings or unusual grammar c) The message is only text d) The message has no links or attachments 11 / 25 11) What is a passphrase? a) A sequence of numbers b) A series of special characters c) A longer sequence of words that is easy to remember but hard to guess d) A single word 12 / 25 12) What can you do on social media platforms to report cyberbullying? a) Ignore the bullying content b) Share the bullying content c) Like the bullying content d) Use the reporting features 13 / 25 13) What is one way to support someone experiencing cyberbullying? a) Join the bully b) Ignore them c) Spread rumors about them d) Be a friend and offer support 14 / 25 14) How can promoting digital citizenship help prevent cyberbullying? a) By spreading harmful content b) By encouraging negative behavior online c) By ignoring the feelings of others d) By understanding the impact of our words and actions online 15 / 25 15) What should you avoid sharing on social media to protect your personal information? a) Your favorite hobbies b) Your home address and phone number c) Your favorite movies d) Pictures of your pets 16 / 25 16) Why is it important to keep your software up to date? a) To use more storage space b) To make your device slower c) To get the latest features d) To protect your device from online threats 17 / 25 17) Why is it important to use strong passwords? a) To make it easy to remember b) To protect your accounts from hackers and cybercriminals c) To avoid using special characters d) To make it easy for friends to access your accounts 18 / 25 18) What is the main purpose of cyber safety? a) To stay safe and secure when using the internet and digital technologies b) To become popular on social media c) To access public Wi-Fi d) To create complex passwords 19 / 25 19) How can two-factor authentication help protect your online accounts? a) By requiring only a password to access your account b) By making your password easier to guess c) By automatically sharing your password with friends d) By requiring a code in addition to your password to access your account 20 / 25 20) Who should you talk to if you are experiencing cyberbullying? a) A trusted adult b) Nobody c) Strangers online d) The bully 21 / 25 21) What is the primary goal of a phishing scam? a) To provide helpful information b) To trick people into giving away their personal information c) To help people find new friends d) To entertain people 22 / 25 22) How can you check if a website is secure when entering personal information? a) Check if the website has many ads b) Look for a high number of visitors c) Look for a padlock symbol in the address bar and https in the website address d) See if the website has a lot of images 23 / 25 23) What should you do if you receive a suspicious email asking for personal information? a) Provide the requested information b) Avoid clicking on links and report the phishing attempt c) Click on any links in the email d) Download any attachments 24 / 25 24) What should you do with evidence of cyberbullying? a) Share it with your friends b) Save the evidence c) Ignore it d) Delete it immediately 25 / 25 25) What is the role of bystanders in combating cyberbullying? a) To ignore the situation b) To spread the bullying content c) To help address and prevent cyberbullying d) To participate in the bullying Your score is Restart quiz