Cyber Safety & Cyberbullying Cyber Safety & Cyberbullying 1 / 25 1) What should you do if you witness cyberbullying? a) Report the content to the platform b) Like, share, or comment on harmful content c) Ignore the content d) Encourage the bullying 2 / 25 2) What should you do with evidence of cyberbullying? a) Delete it immediately b) Ignore it c) Share it with your friends d) Save the evidence 3 / 25 3) What is the main purpose of cyber safety? a) To stay safe and secure when using the internet and digital technologies b) To create complex passwords c) To access public Wi-Fi d) To become popular on social media 4 / 25 4) What is the goal of promoting digital citizenship and empathy? a) To help people become famous on social media b) To create a more respectful and inclusive online environment c) To encourage negative behavior online d) To encourage cyberbullying 5 / 25 5) Which of these is an example of cyberbullying? a) Congratulating someone on their achievements b) Complimenting someone on their photo c) Sending anonymous threatening messages d) Liking a friend's post on social media 6 / 25 6) What is the role of bystanders in combating cyberbullying? a) To spread the bullying content b) To participate in the bullying c) To help address and prevent cyberbullying d) To ignore the situation 7 / 25 7) How can you prevent a cyberbully from contacting you further? a) Block the bully b) Respond to their messages c) Encourage their behavior d) Add them as a friend on social media 8 / 25 8) Which of these is a good practice for protecting your personal information online? a) Using the same password for all accounts b) Using strong, unique passwords for each account c) Connecting to public Wi-Fi for online banking d) Sharing your home address on social media 9 / 25 9) Who should you talk to if you are experiencing cyberbullying? a) A trusted adult b) Nobody c) The bully d) Strangers online 10 / 25 10) What is the best way to respond to a cyberbully? a) Don't respond to the bully b) Encourage their behavior c) Join the bullying d) Retaliate with insults 11 / 25 11) Why is it important to keep your software up to date? a) To make your device slower b) To use more storage space c) To protect your device from online threats d) To get the latest features 12 / 25 12) What should you avoid sharing on social media to protect your personal information? a) Your favorite movies b) Your home address and phone number c) Your favorite hobbies d) Pictures of your pets 13 / 25 13) What is one way to support someone experiencing cyberbullying? a) Ignore them b) Be a friend and offer support c) Join the bully d) Spread rumors about them 14 / 25 14) What is a common sign that an email or message might be a phishing scam? a) The message is from a trusted contact b) The message has no links or attachments c) The message is only text d) The message contains misspellings or unusual grammar 15 / 25 15) Why should you avoid accessing sensitive information on public Wi-Fi networks? a) Public Wi-Fi networks require a password b) Public Wi-Fi networks are usually faster c) Public Wi-Fi networks can be less secure, and your information can be intercepted d) Public Wi-Fi networks are more secure than private networks 16 / 25 16) How can a password manager help you maintain online security? a) By creating weak passwords for your accounts b) By securely storing all of your passwords in one place c) By providing public Wi-Fi passwords d) By allowing you to use the same password for all accounts 17 / 25 17) What is the primary goal of a phishing scam? a) To help people find new friends b) To trick people into giving away their personal information c) To provide helpful information d) To entertain people 18 / 25 18) What can you do on social media platforms to report cyberbullying? a) Like the bullying content b) Share the bullying content c) Use the reporting features d) Ignore the bullying content 19 / 25 19) What is a passphrase? a) A longer sequence of words that is easy to remember but hard to guess b) A single word c) A series of special characters d) A sequence of numbers 20 / 25 20) How can you check if a website is secure when entering personal information? a) Look for a high number of visitors b) Look for a padlock symbol in the address bar and https in the website address c) Check if the website has many ads d) See if the website has a lot of images 21 / 25 21) What should you do if you receive a suspicious email asking for personal information? a) Click on any links in the email b) Provide the requested information c) Avoid clicking on links and report the phishing attempt d) Download any attachments 22 / 25 22) Why is it important to use strong passwords? a) To make it easy to remember b) To make it easy for friends to access your accounts c) To protect your accounts from hackers and cybercriminals d) To avoid using special characters 23 / 25 23) What is one way to address cyberbullying if you or someone you know is experiencing it? a) Encourage the bully b) Share the bullying with others c) Don't respond to the bully d) Respond to the bully 24 / 25 24) How can promoting digital citizenship help prevent cyberbullying? a) By spreading harmful content b) By encouraging negative behavior online c) By understanding the impact of our words and actions online d) By ignoring the feelings of others 25 / 25 25) How can two-factor authentication help protect your online accounts? a) By requiring a code in addition to your password to access your account b) By making your password easier to guess c) By requiring only a password to access your account d) By automatically sharing your password with friends Your score is Restart quiz