Crear actividad
Jugar Froggy Jumps
1. What should a teacher do if child pornography is discovered in a student's device?
A
Notify law enforcement and the principal
B
Save the images
C
Identify the students who were involved
2. What is a common method used by cybercriminals to steal personal information?
A
Smishing
B
Vishing
C
Phishing
3. Why is it important to use strong and unique passwords for each online account?
A
To prevent unauthorized access
B
To make it easier to remember
C
To share with friends
4. What does the Family Educational Rights and Privacy Act requires?
A
For schools to divulge student's information
B
For teachers to divulge student's information
C
For schools and teachers to protect student's information
5. What should you do if you receive a suspicious email asking for personal information?
A
Reply with your details
B
Forward it to all your contacts
C
Delete it and do not click on any links
6. Why is it risky to use public Wi-Fi networks for sensitive transactions?
A
It is faster than private networks
B
Data can be intercepted by hackers
C
It is always secure
7. Which of the following statements about cyberbullying is true?
A
Cyberbullying is rarely an issue in younger grades
B
Cyberbullying is often more persistent and invasive than traditional bullying.
C
Cyberbullying is only the concern of teachers if it happens at school or on school-owned devices.
8. What is the purpose of two-factor authentication in online security?
A
To add an extra layer of protection
B
To simplify the login process
C
To share login credentials
9. Why should you be cautious about sharing personal information on social media?
A
To gain more followers
B
To connect with strangers
C
To avoid identity theft and privacy risks
10. What is the first step you should take if you suspect your online account has been compromised?
A
Share the news on social media
B
Ignore it and hope for the best
C
Change your password immediately
11. What is a common way to protect your devices from malware and viruses?
A
Click on every pop-up ad
B
Disable all security features
C
Install security software and keep it updated