Cyber Safety & Cyberbullying Cyber Safety & Cyberbullying 1 / 25 1) What should you avoid sharing on social media to protect your personal information? a) Your home address and phone number b) Your favorite movies c) Your favorite hobbies d) Pictures of your pets 2 / 25 2) Why is it important to keep your software up to date? a) To use more storage space b) To make your device slower c) To protect your device from online threats d) To get the latest features 3 / 25 3) What should you do with evidence of cyberbullying? a) Ignore it b) Share it with your friends c) Save the evidence d) Delete it immediately 4 / 25 4) What is one way to support someone experiencing cyberbullying? a) Spread rumors about them b) Be a friend and offer support c) Ignore them d) Join the bully 5 / 25 5) What is the best way to respond to a cyberbully? a) Encourage their behavior b) Don't respond to the bully c) Retaliate with insults d) Join the bullying 6 / 25 6) What is the role of bystanders in combating cyberbullying? a) To spread the bullying content b) To participate in the bullying c) To help address and prevent cyberbullying d) To ignore the situation 7 / 25 7) How can a password manager help you maintain online security? a) By securely storing all of your passwords in one place b) By providing public Wi-Fi passwords c) By creating weak passwords for your accounts d) By allowing you to use the same password for all accounts 8 / 25 8) What can you do on social media platforms to report cyberbullying? a) Use the reporting features b) Ignore the bullying content c) Like the bullying content d) Share the bullying content 9 / 25 9) How can two-factor authentication help protect your online accounts? a) By requiring only a password to access your account b) By automatically sharing your password with friends c) By requiring a code in addition to your password to access your account d) By making your password easier to guess 10 / 25 10) What is the main purpose of cyber safety? a) To become popular on social media b) To stay safe and secure when using the internet and digital technologies c) To create complex passwords d) To access public Wi-Fi 11 / 25 11) Which of these is an example of cyberbullying? a) Sending anonymous threatening messages b) Congratulating someone on their achievements c) Liking a friend's post on social media d) Complimenting someone on their photo 12 / 25 12) What is a common sign that an email or message might be a phishing scam? a) The message contains misspellings or unusual grammar b) The message is from a trusted contact c) The message has no links or attachments d) The message is only text 13 / 25 13) Why is it important to use strong passwords? a) To protect your accounts from hackers and cybercriminals b) To make it easy for friends to access your accounts c) To avoid using special characters d) To make it easy to remember 14 / 25 14) How can you prevent a cyberbully from contacting you further? a) Add them as a friend on social media b) Respond to their messages c) Encourage their behavior d) Block the bully 15 / 25 15) What should you do if you receive a suspicious email asking for personal information? a) Download any attachments b) Click on any links in the email c) Avoid clicking on links and report the phishing attempt d) Provide the requested information 16 / 25 16) What is a passphrase? a) A single word b) A sequence of numbers c) A series of special characters d) A longer sequence of words that is easy to remember but hard to guess 17 / 25 17) Why should you avoid accessing sensitive information on public Wi-Fi networks? a) Public Wi-Fi networks require a password b) Public Wi-Fi networks are more secure than private networks c) Public Wi-Fi networks are usually faster d) Public Wi-Fi networks can be less secure, and your information can be intercepted 18 / 25 18) What is one way to address cyberbullying if you or someone you know is experiencing it? a) Respond to the bully b) Share the bullying with others c) Encourage the bully d) Don't respond to the bully 19 / 25 19) What is the goal of promoting digital citizenship and empathy? a) To encourage cyberbullying b) To encourage negative behavior online c) To create a more respectful and inclusive online environment d) To help people become famous on social media 20 / 25 20) What is the primary goal of a phishing scam? a) To trick people into giving away their personal information b) To provide helpful information c) To help people find new friends d) To entertain people 21 / 25 21) How can you check if a website is secure when entering personal information? a) Look for a padlock symbol in the address bar and https in the website address b) Check if the website has many ads c) Look for a high number of visitors d) See if the website has a lot of images 22 / 25 22) Which of these is a good practice for protecting your personal information online? a) Using strong, unique passwords for each account b) Connecting to public Wi-Fi for online banking c) Using the same password for all accounts d) Sharing your home address on social media 23 / 25 23) Who should you talk to if you are experiencing cyberbullying? a) A trusted adult b) Nobody c) Strangers online d) The bully 24 / 25 24) What should you do if you witness cyberbullying? a) Like, share, or comment on harmful content b) Encourage the bullying c) Ignore the content d) Report the content to the platform 25 / 25 25) How can promoting digital citizenship help prevent cyberbullying? a) By ignoring the feelings of others b) By encouraging negative behavior online c) By spreading harmful content d) By understanding the impact of our words and actions online Your score is Restart quiz