What is a digital footprint?
Your password history
Your activity history online
A type of software
A virus on your computer
Your activity history online
“Cyber security” is about…
A. Improving internet speed
B. Designing websites
C. Protecting systems and data from digital attacks
D. Storing files in the cloud
Protecting systems and data from digital attacks ✅
A “tech-savvy” person is someone who…
A. Works in IT
B. Knows a lot about using technology
C. Avoids social media
D. Invents new devices
Knows a lot about using technology ✅
What does “cloud storage” allow you to do?
A. Make your internet faster
B. Protect your screen
C. Store files on remote servers accessed via the internet
D. Fix broken hardware
Store files on remote servers accessed via the internet ✅
What does “lag” mean in technology?
A. A broken screen
B. A device overheating
C. A loud computer fan
D. A delay in response time during digital activity
A delay in response time during digital activity ✅
A "data breach" happens when
Data is deleted by mistake
A system updates automatically
Private information is accessed illegally
Wi- fi stops working
Private information is accessed illegally
“Misinformation” is…
A. Very detailed information
B. Information that is false or misleading
C. Government secrets
D. Online advertisements
Information that is false or misleading ✅
“Information overload” happens when…
A. Your device has no memory
B. You receive too much information to process effectively
C. The internet stops working
D. You forget your password
You receive too much information to process effectively ✅
What is “artificial intelligence (AI)”?
A. A type of computer virus
B. Machines designed to think and learn like humans
C. A social media platform
D. Human knowledge stored online
Machines designed to think and learn like humans ✅
What is a “firewall”?
A. A type of virus
B. A social media filter
C. A program that blocks unauthorized access to a network
D. A device that cools your computer
A program that blocks unauthorized access to a network ✅
What does "Algorithm" do?
Protects your computer from viruses
Stores photos online
Follows rules to solve a problem or make decisions
Deletes old files
Follows rules to solve a problem or make decisions
“Screen time” describes…
A. The brightness of your screen
B. Time spent using digital devices
C. Watching movies at the cinema
D. Fixing a broken screen
Time spent using digital devices ✅
“Facial recognition” technology is used to…
A. Improve photo quality
B. Identify a person by analyzing their face
C. Create avatars
D. Scan fingerprints
Identify a person by analyzing their face ✅
“Phishing” is when someone…
A. Improves website design
B. Installs new software
C. Downloads music illegally
D. Tries to trick you into giving personal information online
Tries to trick you into giving personal information online ✅
“Streaming” means…
A. Watching or listening to content online without downloading it fully
B. Downloading files permanently
C. Playing offline games
D. Sending emails
Watching or listening to content online without downloading it fully ✅
“Surveillance” means…
A. Protecting personal data
B. Watching or monitoring people’s activities
C. Fixing technical problems
D. Creating new apps
Watching or monitoring people’s activities
“Online privacy” means…
A. Having a private social media account
B. Controlling who can see and use your personal data online
C. Deleting old emails
D. Using the internet at night
Controlling who can see and use your personal data online ✅
“Device dependency” means…
A. Owning many devices
B. Feeling unable to function without digital devices
C. Charging devices too often
D. Sharing devices with others
Feeling unable to function without digital devices ✅
What is “two-factor authentication”?
A. Sharing your password with someone
B. An extra security step to verify your identity
C. Logging into two accounts at once
D. Using two passwords
An extra security step to verify your identity ✅
What does “user-friendly” describe?
A. Cheap technology
B. Technology that is easy to use
C. Very advanced software
D. Devices with many buttons
Technology that is easy to use ✅
“Automation” refers to…
A. People working from home
B. Machines doing tasks instead of humans
C. Learning to use new software
D. Communicating online
Machines doing tasks instead of humans ✅
Virtual Reality (VR) allows users to…
A. Chat with robots
B. Enter a computer-generated 3D environment
C. Store large files
D. Improve Wi-Fi connection
Enter a computer-generated 3D environment ✅
Which situation is an example of a privacy risk?
A. Updating your phone
B. Using strong passwords
C. Posting your home address publicly online
D. Turning off notifications
Posting your home address publicly online ✅
A “software update” usually aims to…
A. Remove all apps
B. Delete user data
C. Make the device heavier
D. Improve performance and fix security issues
Improve performance and fix security issues ✅
What is “digital addiction”?
A. Studying computer science
B. Being unable to control excessive use of digital devices
C. Enjoying technology
D. Needing new devices often
Being unable to control excessive use of digital devices ✅