You are on page 1of 20

question

b) c) d)
Protecting Protecting
yourself from Protecting yourself from Protecting
physical yourself from natural yourself from
harm online harm disasters sunburn
answer

b)

Protecting
yourself from
online harm
question

Information about your Information that can


age and school identify you, like your
name or address

Information about your


All of these
family
answer

All of these
question

Which of the
following is a
strong
password?
answer

Which of the
following is a
strong
password?
question

b) c) d)
Reply to their Ignore their Add them as
message and message Give them a friend on
become and tell a your your social
friends trusted adult personal media
information
answer

b)
Ignore their
message
and tell a
trusted adult
question

Using technology to harm


or harass someone Being scared of using
technology

Pushing a computer over


Sharing funny memes
and then laughing at it
with your friends
answer

Using technology to harm


or harass someone
question

Which of the
following is
safe to share
online?
answer

Which of the
following is
safe to share
online?
question

b) c) d)
Pretending to
Spending be someone
Playing
Saturday at else online to
Swimming in online
the river with the lake get personal
games with
catching fish information
the fish friends
answer

d)
Pretending to
be someone
else online to
get personal
information
question

A type of virus that can


harm your computer or A type of protective
device software

A type of online chatroom A special outfit to wear ito


a party for Uncle Mal
answer

A type of virus that can


harm your computer or
device
question

What is a
digital
footprint?
answer

What is a
digital
footprint?

You might also like