Computer Lab And Internet Safety Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Selena Skipper
Selena Skipper, Business teacher
Selena, a dedicated Business Teacher with 26 years of experience, currently imparts knowledge at the Cullman Area Technology Academy. Her passion lies in guiding students to discover their career paths and achieve valuable certifications.
Quizzes Created: 12 | Total Attempts: 67,712
Questions: 32 | Attempts: 7,073

SettingsSettingsSettings
Computer Lab And Internet Safety Quiz - Quiz

This is a safety quiz that is required of all students who take a Career Technical Business Education Course. Each students must score 100% before they can use the lab.


Questions and Answers
  • 1. 

    The Internet gives us access to many resources we could not otherwise come in contact with.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement is true because the internet provides us with access to a vast amount of information, resources, and opportunities that would not be easily accessible otherwise. It allows us to connect with people from all around the world, access educational materials, conduct research, shop online, and much more. The internet has revolutionized the way we communicate, learn, work, and access information, making it an invaluable tool in today's digital age.

    Rate this question:

  • 2. 

    Information on the Internet can always be trusted to be factual.  It would not be online if it was not true. 

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement suggests that information on the internet can always be trusted to be factual because it would not be online if it was not true. However, this statement is false. The internet is a vast platform where anyone can publish information, and not all sources are reliable or accurate. It is important to critically evaluate the credibility of the sources and cross-check information before considering it as factual.

    Rate this question:

  • 3. 

    Anythiing I send in my private e-mail, IM or chat cannot be seen by others.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement "Anything I send in my private e-mail, IM or chat cannot be seen by others" is false. It is important to understand that private communication platforms are not completely secure and can be vulnerable to interception or hacking. It is always advisable to exercise caution and use encrypted communication methods to ensure privacy.

    Rate this question:

  • 4. 

    Websites must have my permission to put online any personal information about me, like my phone number, address, or birthday.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Websites do not require explicit permission from individuals to put personal information online. In fact, many websites collect and display personal information without prior consent. Privacy laws and regulations may require websites to provide individuals with options to control the sharing and visibility of their personal information, but permission is not always necessary. Therefore, the statement is false.

    Rate this question:

  • 5. 

    If I want to know something about a stranger that sends me an Instant Message, I can check their profile and TRUST that information.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The explanation for the answer being False is that checking a stranger's profile on an Instant Messaging platform does not guarantee the accuracy or truthfulness of the information provided. People can create fake profiles or provide misleading information, so it is not advisable to fully trust the information found on someone's profile without further verification or getting to know them better.

    Rate this question:

  • 6. 

    Installing a virus checker on my machine will keep my PC/computer safe.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Installing a virus checker on a machine is not a foolproof method to keep it safe. While virus checkers can detect and remove known viruses, they may not be able to catch all types of malware or protect against emerging threats. Additionally, users need to regularly update their virus checker and practice safe browsing habits to minimize the risk of infection. Therefore, relying solely on a virus checker is not enough to ensure the complete safety of a PC/computer.

    Rate this question:

  • 7. 

    Putting blocking software on my child's PC will keep my child safe.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Putting blocking software on a child's PC does not guarantee their safety. While it can help in filtering out inappropriate content and restricting access to certain websites, it is not foolproof. Children can still encounter harmful content through other devices or platforms, and blocking software may give a false sense of security. It is important for parents to have open communication with their child, educate them about online safety, and supervise their online activities to ensure their overall safety.

    Rate this question:

  • 8. 

    I can always trust e-mails and attachments I get from friends.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    It is not always safe to trust emails and attachments from friends. Cybercriminals can gain access to a friend's email account and send malicious emails or attachments without their knowledge. These emails or attachments may contain viruses, malware, or phishing attempts that can harm your computer or steal your personal information. Therefore, it is important to exercise caution and verify the authenticity of emails and attachments, even if they come from friends.

    Rate this question:

  • 9. 

    People who look for children to harm often do not get caught until they have hurt over 30 children.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement suggests that people who intend to harm children often go undetected until they have already caused harm to more than 30 children. This implies that these individuals are skilled at evading detection or that their actions are not recognized as harmful until a significant number of victims have been affected. This highlights the concerning fact that child predators may operate unnoticed for an extended period, putting numerous children at risk before they are apprehended.

    Rate this question:

  • 10. 

    Criminals and terrorists are sending encrypted messages in photos as forwards being mass-emailed around the world.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given statement suggests that criminals and terrorists are using encrypted messages in photos that are being shared through mass-emails globally. This implies that these individuals are finding new ways to communicate covertly and securely, making it difficult for authorities to detect and intercept their messages. Therefore, the correct answer is "True."

    Rate this question:

  • 11. 

    What do you do if someone keeps bothering you online?

    • A.

      Tell your parents

    • B.

      Tell Law Enforcement

    • C.

      Tell them to leave you alone and print out the attempts to contact

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    The correct answer is "All of the above." If someone keeps bothering you online, it is important to take action to protect yourself. Telling your parents is important because they can provide support and guidance. Informing law enforcement is crucial if the harassment becomes severe or threatening. Additionally, telling the person to leave you alone and printing out the attempts to contact can serve as evidence in case further action needs to be taken. By choosing all of the above options, you are taking comprehensive steps to address the issue and ensure your safety online.

    Rate this question:

  • 12. 

    I have a digital picture of myself and someone I met online wants to see it.  Is it OK to send it to that person?

    • A.

      Yes

    • B.

      No

    Correct Answer
    B. No
    Explanation
    No, it is not okay to send a digital picture of yourself to someone you met online. Sharing personal pictures with strangers online can be risky as you have no control over how they will use or share the image. They could potentially use it for malicious purposes or share it without your consent. It is important to prioritize your online safety and only share personal information or pictures with trusted individuals.

    Rate this question:

  • 13. 

    I am visiting a site from a company or organization with which I am familiar.  they want my name and phone number so I can enter a contest.  Is it OK to enter?

    • A.

      Yes

    • B.

      No

    Correct Answer
    B. No
    Explanation
    It is not okay to enter because providing personal information such as name and phone number for a contest on a website can potentially lead to privacy and security risks. Even if the website belongs to a familiar company or organization, there is no guarantee that the information will be handled securely or not misused. It is important to be cautious and protect personal information online.

    Rate this question:

  • 14. 

    As I travel through "Cyberspace"  information I should never give out to someone I meet online is:

    • A.

      The names of my favorite books and movies

    • B.

      My real name, address, phone number, school I attend, or my photograph

    • C.

      My pet's name

    • D.

      None of the above

    Correct Answer
    B. My real name, address, pHone number, school I attend, or my pHotograpH
    Explanation
    When traveling through "Cyberspace," it is important to never give out personal information to someone you meet online. This includes your real name, address, phone number, school you attend, or your photograph. Sharing such information can put your privacy and safety at risk. It is always better to be cautious and protect your personal information when interacting with strangers online.

    Rate this question:

  • 15. 

    If someone online sends me an inappropriate message or material I should:

    • A.

      Keep it a secret

    • B.

      Respond and ask thaht person to leave me alone

    • C.

      Tell my parents so they can alert our internet service provider

    • D.

      All of the above

    Correct Answer
    C. Tell my parents so they can alert our internet service provider
    Explanation
    If someone online sends me an inappropriate message or material, it is important to tell my parents so they can alert our internet service provider. This is the correct answer because it is crucial to involve a trusted adult who can help handle the situation appropriately and take necessary actions to ensure my safety online. Keeping it a secret may allow the inappropriate behavior to continue, and responding to the person may further escalate the situation. By involving parents and the internet service provider, they can take necessary steps to address the issue and protect me from further harm.

    Rate this question:

  • 16. 

    If someone is on my E-mail "buddy list", "friend list", or "contact list", and I only know that person online, he or she is:

    • A.

      My friend and someone I can trust

    • B.

      The person he or she claims to be

    • C.

      Someone I should be cautious about because I do not know him or her

    Correct Answer
    C. Someone I should be cautious about because I do not know him or her
    Explanation
    This answer suggests that if someone is on the person's email buddy list, friend list, or contact list, and the person only knows that individual online, they should be cautious because they do not know them personally. It implies that online relationships may not always be trustworthy and it is important to exercise caution when interacting with people solely through the internet.

    Rate this question:

  • 17. 

    The cybertipline is: 

    • A.

      A cool new video game

    • B.

      A web site where I can find out tips for defeating a variety of video games

    • C.

      My online source to report child sexual-exploitation or other scary internet encounters

    Correct Answer
    C. My online source to report child sexual-exploitation or other scary internet encounters
    Explanation
    The correct answer is "My online source to report child sexual-exploitation or other scary internet encounters." The cybertipline refers to a platform or website where individuals can report instances of child sexual exploitation or any other frightening encounters they have had on the internet. It serves as a resource for people to seek help and report illegal activities happening online.

    Rate this question:

  • 18. 

    A web cookie is all of these except:

    • A.

      Delicious snack

    • B.

      Something that can keep track of where you go on the Internet

    • C.

      Something that companies use to find out more about you

    • D.

      Something you can turn off it you do not want it

    Correct Answer
    A. Delicious snack
    Explanation
    A web cookie is not a delicious snack. It is a small piece of data that is stored on a user's computer by a website. It is used to track the user's browsing activity, personalize their experience, and gather information about their preferences and behavior. However, it can be turned off if the user does not want it.

    Rate this question:

  • 19. 

    As I travel through Cyberspace, I should never agree to meet someone in person who I have met online.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    It is important to prioritize personal safety when interacting with strangers online. Meeting someone in person whom you have only met online can be risky as their true intentions and identity may not be known. It is always better to exercise caution and avoid such meetings to protect oneself from potential harm or dangerous situations.

    Rate this question:

  • 20. 

    If you purchase a term paper online, would this be considered plagiarizing?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Purchasing a term paper online can be considered as plagiarizing because it involves obtaining someone else's work and presenting it as one's own. Plagiarism is the act of using someone else's ideas, words, or work without giving them proper credit. By buying a term paper, the person is not contributing any original content and is essentially taking credit for someone else's efforts. This goes against academic integrity and is generally considered unethical. Therefore, the correct answer is true.

    Rate this question:

  • 21. 

    When working at the computer for long periods of time you should glance away from the screen periodically to avoid eye strain. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Glancing away from the computer screen periodically while working for long periods of time helps to prevent eye strain. Staring at a screen for extended periods can cause eye fatigue and discomfort. Taking short breaks to look at objects in the distance or focusing on something other than the screen helps to relax the eye muscles and reduce strain. Therefore, it is important to glance away from the screen regularly to protect and maintain good eye health.

    Rate this question:

  • 22. 

    Sitting up straight at your computer is bad for your back.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Sitting up straight at your computer is not bad for your back. This is because maintaining good posture while sitting helps to align the spine properly and distribute the weight evenly, reducing strain on the back muscles. Slouching or hunching over, on the other hand, can lead to increased pressure on the spine and result in back pain. Therefore, it is important to sit up straight with proper ergonomics to support a healthy back.

    Rate this question:

  • 23. 

    It is important to know the locations of fire extinquishers and fire exits in the computer lab.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Knowing the locations of fire extinguishers and fire exits in a computer lab is important for safety reasons. In the event of a fire, having this knowledge can help individuals quickly locate and use fire extinguishers to suppress the fire or evacuate the area through the nearest fire exit. This information is crucial in preventing injuries and minimizing property damage during emergencies. Therefore, the statement "It is important to know the locations of fire extinguishers and fire exits in the computer lab" is true.

    Rate this question:

  • 24. 

    It is OK to drink soda near the computer.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Drinking soda near the computer is not okay because it can spill and damage the computer's hardware. Liquids can cause short circuits and corrosion, leading to malfunctions or permanent damage. Additionally, soda contains sugar and other sticky substances that can attract dust and debris, clogging the computer's components and affecting its performance. Therefore, it is not advisable to drink soda near the computer.

    Rate this question:

  • 25. 

    Always shut down your computer by pressing the power button on the computer case.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Pressing the power button on the computer case is not the recommended way to shut down the computer. It is better to use the proper shutdown procedure provided by the operating system, such as selecting "Shut Down" from the Start menu. Pressing the power button directly can cause data loss and potential damage to the system.

    Rate this question:

  • 26. 

    Use a surge protector to keep excess electric power from damaging your computer.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Using a surge protector is indeed a recommended measure to protect electronic devices, including computers, from damage caused by sudden power surges or voltage spikes. Surge protectors work by diverting excess electrical energy away from the connected devices, preventing it from reaching and potentially damaging them. Therefore, it is advisable to use a surge protector to safeguard your computer against potential electrical hazards.

    Rate this question:

  • 27. 

    When a computer is on, it is fine to move it around as much as you like.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Moving a computer around while it is on can cause damage to the internal components, such as the hard drive or other sensitive parts. It is recommended to shut down the computer properly before moving it to prevent any potential damage.

    Rate this question:

  • 28. 

    You should always have at least two copies of important files.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    It is important to always have at least two copies of important files because it provides a backup in case one copy gets lost, corrupted, or damaged. Having multiple copies ensures that you can still access and recover the files even if something happens to one of the copies. This practice helps to prevent data loss and ensures the security and availability of important information.

    Rate this question:

  • 29. 

    It is not important to write down your computer's serial number.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Writing down your computer's serial number can be important for several reasons. Firstly, it can help in identifying and tracking your computer in case it gets lost or stolen. Additionally, the serial number may be required for warranty purposes or when seeking technical support. It can also be useful for insurance claims or when selling your computer. Therefore, it is important to write down your computer's serial number.

    Rate this question:

  • 30. 

    If your computer does not work, you do not need to report it to the teacher--just begin working on it. 

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    This statement is false because if your computer is not working, it is important to report it to the teacher so that they can assist you in fixing the issue or provide you with a different computer to work on. Ignoring the problem and continuing to work on a faulty computer will only hinder your progress and make it difficult to complete your tasks effectively.

    Rate this question:

  • 31. 

    Coats, bags and other items hsould be placed

    • A.

      On the floor next to your computer

    • B.

      On the table away from the computers to avoid tripping

    • C.

      Under your chair

    • D.

      On top of your system unit

    Correct Answer
    B. On the table away from the computers to avoid tripping
    Explanation
    Coats, bags, and other items should be placed on the table away from the computers to avoid tripping. This is because placing them on the floor next to the computer or under the chair can create obstacles and increase the risk of tripping or accidentally damaging the items. Placing them on top of the system unit is also not recommended as it can obstruct the airflow and potentially cause overheating. Therefore, the safest option is to keep them on the table, away from the computers.

    Rate this question:

  • 32. 

    Infringing on someone's copyright is not against the law, so it is really no big deal. 

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Infringing on someone's copyright is against the law, making it a big deal. Copyright laws protect the rights of creators, giving them exclusive control over their work. When someone uses, reproduces, or distributes copyrighted material without permission, it is considered infringement and can result in legal consequences. Therefore, it is important to respect copyright laws and obtain proper authorization before using someone else's work.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • May 15, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 27, 2012
    Quiz Created by
    Selena Skipper
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.