Cyber Safety & Cyberbullying Cyber Safety & Cyberbullying 1 / 25 1) How can two-factor authentication help protect your online accounts? a) By requiring a code in addition to your password to access your account b) By requiring only a password to access your account c) By making your password easier to guess d) By automatically sharing your password with friends 2 / 25 2) How can you prevent a cyberbully from contacting you further? a) Encourage their behavior b) Block the bully c) Respond to their messages d) Add them as a friend on social media 3 / 25 3) What is the best way to respond to a cyberbully? a) Encourage their behavior b) Retaliate with insults c) Join the bullying d) Don't respond to the bully 4 / 25 4) What should you avoid sharing on social media to protect your personal information? a) Your favorite hobbies b) Pictures of your pets c) Your home address and phone number d) Your favorite movies 5 / 25 5) What is the main purpose of cyber safety? a) To stay safe and secure when using the internet and digital technologies b) To become popular on social media c) To create complex passwords d) To access public Wi-Fi 6 / 25 6) What should you do with evidence of cyberbullying? a) Delete it immediately b) Share it with your friends c) Ignore it d) Save the evidence 7 / 25 7) What is a passphrase? a) A single word b) A sequence of numbers c) A series of special characters d) A longer sequence of words that is easy to remember but hard to guess 8 / 25 8) How can a password manager help you maintain online security? a) By providing public Wi-Fi passwords b) By creating weak passwords for your accounts c) By allowing you to use the same password for all accounts d) By securely storing all of your passwords in one place 9 / 25 9) How can you check if a website is secure when entering personal information? a) Check if the website has many ads b) Look for a padlock symbol in the address bar and https in the website address c) See if the website has a lot of images d) Look for a high number of visitors 10 / 25 10) What is a common sign that an email or message might be a phishing scam? a) The message contains misspellings or unusual grammar b) The message is only text c) The message is from a trusted contact d) The message has no links or attachments 11 / 25 11) What should you do if you receive a suspicious email asking for personal information? a) Avoid clicking on links and report the phishing attempt b) Download any attachments c) Click on any links in the email d) Provide the requested information 12 / 25 12) What is one way to address cyberbullying if you or someone you know is experiencing it? a) Encourage the bully b) Respond to the bully c) Share the bullying with others d) Don't respond to the bully 13 / 25 13) What is the role of bystanders in combating cyberbullying? a) To help address and prevent cyberbullying b) To ignore the situation c) To spread the bullying content d) To participate in the bullying 14 / 25 14) How can promoting digital citizenship help prevent cyberbullying? a) By ignoring the feelings of others b) By understanding the impact of our words and actions online c) By spreading harmful content d) By encouraging negative behavior online 15 / 25 15) Who should you talk to if you are experiencing cyberbullying? a) The bully b) Strangers online c) Nobody d) A trusted adult 16 / 25 16) Which of these is an example of cyberbullying? a) Liking a friend's post on social media b) Complimenting someone on their photo c) Sending anonymous threatening messages d) Congratulating someone on their achievements 17 / 25 17) Why is it important to use strong passwords? a) To avoid using special characters b) To make it easy to remember c) To protect your accounts from hackers and cybercriminals d) To make it easy for friends to access your accounts 18 / 25 18) Why is it important to keep your software up to date? a) To get the latest features b) To make your device slower c) To protect your device from online threats d) To use more storage space 19 / 25 19) Why should you avoid accessing sensitive information on public Wi-Fi networks? a) Public Wi-Fi networks are usually faster b) Public Wi-Fi networks require a password c) Public Wi-Fi networks can be less secure, and your information can be intercepted d) Public Wi-Fi networks are more secure than private networks 20 / 25 20) What is the goal of promoting digital citizenship and empathy? a) To help people become famous on social media b) To encourage negative behavior online c) To create a more respectful and inclusive online environment d) To encourage cyberbullying 21 / 25 21) What should you do if you witness cyberbullying? a) Report the content to the platform b) Like, share, or comment on harmful content c) Ignore the content d) Encourage the bullying 22 / 25 22) What can you do on social media platforms to report cyberbullying? a) Like the bullying content b) Ignore the bullying content c) Use the reporting features d) Share the bullying content 23 / 25 23) What is the primary goal of a phishing scam? a) To provide helpful information b) To trick people into giving away their personal information c) To entertain people d) To help people find new friends 24 / 25 24) What is one way to support someone experiencing cyberbullying? a) Join the bully b) Ignore them c) Spread rumors about them d) Be a friend and offer support 25 / 25 25) Which of these is a good practice for protecting your personal information online? a) Sharing your home address on social media b) Connecting to public Wi-Fi for online banking c) Using the same password for all accounts d) Using strong, unique passwords for each account Your score is Restart quiz