Random
Random
Random
Random
Random
100

Being a responsible and respectful user online is called _________________.

Digital Citizenship 

100

Employers and colleges may look at your _______________ before making decisions about you.

Digital Footprint 

100

Repeated online harassment that scares or threatens someone is called _______________.

Cyberstalking

100

You should never share your _______________, _______________, or _______________ online.

name, address, phone number

100

Which is an example of instant messenger?
 A) Facebook Messenger
 B) Google Chrome
 C) Roblox
 D) Wikipedia

A) Facebook Messenger

200

A step-by-step set of instructions for a computer is called an _______________.

Algorithm

200

Early online messaging systems were called:
 A) World Wide Web
 B) Bulletin Board Systems
 C) Social Media
 D) Instant Messenger

B) Bulletin Board Systems

200

A type of malware that spreads from computer to computer is called a _______________.

Virus 

200

Online spaces where players interact with avatars are called _______________ _______________.

Virtual Worlds

200

Hackers who fall in between legal and illegal are called _______________ _______________.

Grey hat hackers
300

Hackers who break the law are called _______________ _______________.

Black hat hackers

300

Early forms of money included _______________ and _______________.

Bartering and coins 

300

Digital money like Bitcoin is stored in:
 A) Bank vaults
 B) Digital wallets
 C) Wallets with coins
 D) Credit cards

 Digital wallets

300

Which is a form of online currency?

Bitcoin

300

A person who finds security problems in programs is called a _______________ _______________.

White hat hacker

400

Copyright protects:
 A) Only music
 B) Any creator’s original work
 C) Public domain work
 D) Your personal posts

 B) Any creator’s original work

400

Which digital safety step is MOST effective when using public Wi-Fi?
A. Turning up screen brightness
B. Logging into banking apps first
C. Using a VPN to encrypt data
D. Disabling airplane mode

C. Using a VPN to encrypt data

400

A user edits a digital image they found online and reposts it without credit. Which copyright principle is being violated?
A. Public domain
B. Fair use
C. Attribution
D. Open license


C. Attribution

400

Something that doesn’t follow the expected pattern in data is called an _______________.

Anomaly

400

A metaverse platform that uses blockchain for in-game purchases is focusing on which benefit?
A. Stronger encryption and transparent ownership
B. Faster loading times
C. Easier login methods
D. Free content for all users

A. Stronger encryption and transparent ownership

500

A student’s search results suddenly show strange links and ads that don’t match their usual browsing behavior. This is most likely an example of:
A. A high-quality algorithm
B. A tracking pixel
C. A browser anomaly
D. A secure connection

C. A browser anomaly

500

The main purpose of online safety is to:
1) Make friends faster

2) Post as much as possible

3) Protect personal information and prevent harm

Protect personal information and prevent harm

500

The _______________ _______________ _______________ was invented by Tim Berners-Lee.

WWW - World wide web

500

A student is debugging code for a 3D metaverse object but cannot find the issue. Which strategy is MOST effective?
A. Ignore the bug and publish the object
B. Rewrite the project from scratch
C. Run the code in small sections to isolate the error
D. Add more random lines of code

C. Run the code in small sections to isolate the error

500

_______________ allows limited use of copyrighted material for school projects.

Fair Use

M
e
n
u