You post a picture of you and your best friend to your favorite social media platform. She doesn’t feel comfortable with the image, so you agree to take it down. Will this ensure that no one else sees the picture?
Answer: No. Once an image (or any information) is posted on the internet, it is virtually impossible to remove it from circulation.
Taking it off of your social media page will help, but there is no guarantee that others have not already seen it and/or downloaded it to their own machines.
True or False:
Using your name and the year you were born is a safe password
False!
Using your name and birth year makes your password very easy to guess. A strong password should include a mix of uppercase and lowercase letters, numbers, and symbols — and it shouldn’t contain personal details that others could easily find out about you.
Give an example of a password that is not safe
Answers:
myname1
456789
mydog2025
goodsamsipad
abcde
On an average, how long does it takes for an unprotected computer to be compromised once it is connected to the Internet:
[A] 20 minutes
[B] 1 week
[C] 10 hours
[D] 12 months
[A] 20 minutes
You receive an email from an online shopping site claiming that you were incorrectly charged for your last purchase and are due a refund. The email asks you to click a link where you will submit the necessary information. What should you do?
Answer: Do NOT click the link!
Check the sender’s address and search the document for spelling/grammar mistakes. If you notice anything suspicious, the email is likely a scam. Even if it seems legitimate, navigate to the site yourself rather than clicking any links.
What is a digital footprint?
Answer: The trail of information you leave behind when you use the internet.
Your digital footprint can be permanent — once something is online, it can be copied or shared even if you delete it
What are some key signs that an email might be a scam attempt?
a.Unusual sender email address.
b.Urgent or threatening language.
c.Suspicious links or attachments.
d.Poor grammar or spelling mistakes.
e.Requests for sensitive information.
f.All of the above
What is a strategy to control your image and information online?
1. Be careful when choosing your online contacts
2. Limit your contacts
3. Do a stocktake of privacy settings and use two factor authentication
4. Being considerate about what you say about yourself and others
5. Check who can see your stuff
6.Choose to post positive images or your own work
What should you do before posting a photo of a friend online?
Answer:
- Ask for their permission / consent
True or false: If someone sends you an unwanted image online, the best thing to do is to tell a trusted adult
Answer:True
If you receive an unwanted image, tell a trusted adult or report it to e safety.
Which of the following are strong password practices? (Choose all that apply.)
A.Passwords should contain a mixture of upper and lower case letters, numbers, and special characters.
B.Passwords should have personal meaning to you (e.g. a relative’s birthday) so that you can remember them more easily.
C.You should immediately change your password in the case of a known data breach.
D.You should store your passwords on paper or somewhere easily accessible, giving you a backup in the event that you forget them.
Answer: A & C. While it is helpful for passwords to have some level of personal relevance, anything concrete or publicly-available (high schools, birthdates, pets’ names, etc.) can be easily researched and guessed by an attacker. Storing your passwords physically or in a text-document is also ill-advised, as someone could gain access to the copy.
What is multi-factor authentication (MFA)?
Answer: Multi-factor authentication (MFA) adds an extra layer of security (e.g., a text message code or authentication app) in addition to your password.
It makes it harder for attackers to access your account even if they have your password
What does “Think before you post” mean?
Consider consequences and if it’s kind, true, or necessary
What does it mean to post a photo of someone without their consent?
A. Sharing a photo only after the person has agreed to it.
B. Posting a photo of someone without asking or getting their permission.
C. Sharing a photo that everyone in the picture already knows about.
D. Editing a photo before posting it online.
Correct Answer: B — Posting a photo of someone without asking or getting their permission.
Explanation:
Posting a photo without consent means sharing someone’s image online without their permission, which can invade their privacy and may be considered disrespectful or even illegal in some cases.
On social networks like Facebook and X – you can control your posts and who can see these posts by:
[A] Assuming it is safe from prying eyes
[B] Doing nothing
[C] Carefully check the privacy settings
[D] Assuming anti-virus software will make it safe and secure
[C] Carefully check the privacy settings
Name one strategy for limiting your screen time.
Answers:
- Turn off notifications for addictive apps
- Remove apps with notifications from homescreen
- Put phone on grayscale mode
- Set time limits or use screen time apps to track your usage
- Leave your phone out of the room when going to bed
When things go wrong online or something happens that you are uncomfortable with, what should you do?
Answer:
- Collect Evidence
- Tell a trusted adult
- Report to the social media company
- If not resolved within 48 hours, report to esafety commissioner
What should you do if someone online asks for your address or personal info?
Don’t share it, tell a trusted adult
What does the e safety commissioner help with?
Helps keep people safe online — especially children and young people. You can report cyberbullying, scams, or other online harm
Why is it important to think carefully before posting anything online?
A. What you post can stay online forever, even if you delete it.
B. Future employers, schools, or others might see what you’ve posted.
C. Posts can be shared or copied without your permission.
D. All of the above
Answer: D — All of the above
Explanation:
Everything you post online can have long-term effects on your reputation and opportunities. Once something is on the internet, it’s hard to fully remove, so it’s important to pause and think before sharing.