Online Safety
Device Security
Cyber Safety
Cyber Security
100

You post a picture of you and your best friend to your favorite social media platform. She doesn’t feel comfortable with the image, so you agree to take it down. Will this ensure that no one else sees the picture?

Answer: No. Once an image (or any information) is posted on the internet, it is virtually impossible to remove it from circulation.
Taking it off of your social media page will help, but there is no guarantee that others have not already seen it and/or downloaded it to their own machines.

100

True or False:

Using your name and the year you were born is a safe password 


False!
Using your name and birth year makes your password very easy to guess. A strong password should include a mix of uppercase and lowercase letters, numbers, and symbols — and it shouldn’t contain personal details that others could easily find out about you.

100

Give an example of a password that is not safe

Answers:
myname1
456789
mydog2025
goodsamsipad
abcde

100

On an average, how long does it takes for an unprotected computer to be compromised once it is connected to the Internet: 

[A] 20 minutes 

[B] 1 week 

[C] 10 hours 

[D] 12 months

[A] 20 minutes

200

You receive an email from an online shopping site claiming that you were incorrectly charged for your last purchase and are due a refund. The email asks you to click a link where you will submit the necessary information. What should you do?

Answer: Do NOT click the link!  

Check the sender’s address and search the document for spelling/grammar mistakes. If you notice anything suspicious, the email is likely a scam. Even if it seems legitimate, navigate to the site yourself rather than clicking any links.

200

What is a digital footprint?

Answer: The trail of information you leave behind when you use the internet.

Your digital footprint can be permanent — once something is online, it can be copied or shared even if you delete it

200

What are some key signs that an email might be a scam attempt?

a.Unusual sender email address.

b.Urgent or threatening language.

c.Suspicious links or attachments.

d.Poor grammar or spelling mistakes.

e.Requests for sensitive information.

f.All of the above

200

What is a strategy to control your image and information online?

1. Be careful when choosing your online contacts
2. Limit your contacts
3. Do a stocktake of privacy settings and use two factor authentication
4. Being considerate about what you say about yourself and others
5. Check who can see your stuff
6.Choose to post positive images or your own work

300

What should you do before posting a photo of a friend online?

Answer:
- Ask for their permission / consent
 

300

True or false: If someone sends you an unwanted image online, the best thing to do is to tell a trusted adult 

Answer:True

If you receive an unwanted image, tell a trusted adult or report it to e safety.

300

Which of the following are strong password practices? (Choose all that apply.)

A.Passwords should contain a mixture of upper and lower case letters, numbers, and special characters.

B.Passwords should have personal meaning to you (e.g. a relative’s birthday) so that you can remember them more easily.

C.You should immediately change your password in the case of a known data breach.

D.You should store your passwords on paper or somewhere easily accessible, giving you a backup in the event that you forget them.

Answer: A & C. While it is helpful for passwords to have some level of personal relevance, anything concrete or publicly-available (high schools, birthdates, pets’ names, etc.) can be easily researched and guessed by an attacker. Storing your passwords physically or in a text-document is also ill-advised, as someone could gain access to the copy.

300

What is multi-factor authentication (MFA)?

Answer: Multi-factor authentication (MFA) adds an extra layer of security (e.g., a text message code or   authentication app) in addition to your password. 

It makes it harder for attackers to access your account even if they have your password

400

What does “Think before you post” mean?

Consider consequences and if it’s kind, true, or necessary

400

What does it mean to post a photo of someone without their consent?

A. Sharing a photo only after the person has agreed to it.
B. Posting a photo of someone without asking or getting their permission.
C. Sharing a photo that everyone in the picture already knows about.
D. Editing a photo before posting it online.


Correct Answer: B — Posting a photo of someone without asking or getting their permission.

Explanation:
Posting a photo without consent means sharing someone’s image online without their permission, which can invade their privacy and may be considered disrespectful or even illegal in some cases.

400

On social networks like Facebook and X – you can control your posts and who can see these posts  by: 

[A] Assuming it is safe from prying eyes 

[B] Doing nothing 

[C] Carefully check the privacy settings 

[D] Assuming anti-virus software will make it safe and secure

[C] Carefully check the privacy settings

400

Name one strategy for limiting your screen time. 

Answers:
- Turn off notifications for addictive apps
- Remove apps with notifications from homescreen
- Put phone on grayscale mode
- Set time limits or use screen time apps to track your usage
- Leave your phone out of the room when going to bed

500

When things go wrong online or something happens that you are uncomfortable with, what should you do? 

Answer:
- Collect Evidence

- Tell a trusted adult

- Report to the social media company

- If not resolved within 48 hours, report to esafety commissioner

500

What should you do if someone online asks for your address or personal info?

Don’t share it, tell a trusted adult

500

What does the e safety commissioner help with? 

Helps keep people safe online — especially children and young people. You can report cyberbullying, scams, or other online harm

500

Why is it important to think carefully before posting anything online?

A. What you post can stay online forever, even if you delete it.
B. Future employers, schools, or others might see what you’ve posted.
C. Posts can be shared or copied without your permission.
D. All of the above

Answer: D — All of the above

Explanation:
Everything you post online can have long-term effects on your reputation and opportunities. Once something is on the internet, it’s hard to fully remove, so it’s important to pause and think before sharing.