Unlock hundreds more features
Save your Quiz to the Dashboard
View and Export Results
Use AI to Create Quizzes and Analyse Results

Sign inSign in with Facebook
Sign inSign in with Google
Quizzes > Quizzes for Business > Education

Take the Child Online Safety Quiz

Assess Your Child Internet Safety Knowledge Today

Difficulty: Moderate
Questions: 20
Learning OutcomesStudy Material
Colorful paper art depicting elements related to Child Online Safety Quiz

This child online safety quiz helps you spot online risks kids face and choose safer actions. Practice quick, real-world scenarios in 15 multiple-choice questions to check gaps and build smart habits. For more, try an online safety assessment or a parent knowledge check .

Which of the following is an example of cyberbullying?
Sending threatening messages online.
Sharing educational articles.
Posting homework help requests.
Giving a friend a compliment.
Cyberbullying involves using digital means, such as messages or posts, to harass or threaten another person. Sending threatening messages directly over a digital platform is an example. Compliments or sharing articles do not constitute bullying.
What does 'phishing' typically involve?
Friendly online conversation.
An online multiplayer game.
A type of spyware that records keystrokes.
Sending emails that pretend to be from legitimate companies to steal personal information.
Phishing is a form of social engineering where attackers impersonate legitimate institutions via email or messaging to steal credentials or personal data. Pretending to be a legitimate company in an email is a classic example. It does not refer to spyware or innocent conversation.
Which characteristic makes a password most secure?
Using the word 'password'.
Including a mix of letters, numbers and symbols.
Using your birthdate only.
A short numeric code.
A strong password includes a mixture of uppercase and lowercase letters, numbers, and symbols to increase complexity and resist guessing or cracking. Simple or commonly used words and dates are easily compromised. Short numeric-only passwords are insecure.
Why is it risky to share your home address publicly on social media?
It helps keep your profile private.
It speeds up your internet connection.
It can allow strangers to locate and harm your safety.
It improves app performance.
Sharing your home address publicly can expose you to real-world safety risks because anyone online can see and misuse that information. Privacy settings should keep such details private. Neither public sharing nor app performance have protective benefits.
Which habit is an example of responsible screen time for children?
Using multiple screens simultaneously without breaks.
Always playing online games late at night.
Taking regular breaks and balancing with physical activity.
Watching screens continuously for several hours without pause.
Responsible screen time includes taking regular breaks and engaging in physical activities to support health and well-being. Continuous screen use without pause can lead to eye strain and reduced physical activity. Playing late at night can disrupt sleep patterns.
How can you limit who sees your posts on social media?
Setting your profile visibility to 'Friends Only'.
Accepting all friend requests.
Posting only on public groups.
Sharing your password.
Limiting profile visibility to 'Friends Only' ensures that only approved contacts can view your posts, enhancing privacy. Public groups or accepting all requests do not restrict access to strangers. Sharing passwords undermines account security.
You receive an email asking for your login password to verify your account. What should you do?
Delete the email and report it as phishing.
Forward it to all your contacts.
Click the link to see what happens.
Reply with your password.
Phishing emails often request sensitive data under false pretenses, so deleting and reporting helps protect your account and alert others. Responding with your password or clicking unknown links exposes you to fraud. Forwarding increases the risk to others.
A stranger online asks to meet in person after only brief chats. What is the best response?
Politely decline and inform a trusted adult.
Agree and share your address.
Block them immediately without telling anyone.
Ask for money before meeting.
Meeting in person with online strangers poses safety risks; the safest response is to decline and inform a trusted adult. Agreeing to meet or sharing your address can endanger you. Blocking without reporting misses the chance for adult guidance.
Before downloading a new app, you should:
Review the app's permissions and ratings.
Download it immediately without checking.
Disable your antivirus to speed installation.
Share the installer with friends.
Checking app permissions and ratings helps you understand what data the app accesses and other users' experiences. Downloading without review or disabling antivirus introduces privacy and security vulnerabilities. Sharing installers can distribute malware.
Which piece of personal information is safest to share publicly?
Your favorite color.
Your full birth date.
Your social security number.
Your home address.
Your favorite color is non-sensitive and poses no risk if public. Personal data like birth dates, addresses, or social security numbers can be used for identity theft. Only non-identifiable preferences are safe to share.
How often should you review and update your privacy settings?
Only when you create your account.
Only after a security breach.
Regularly, such as monthly.
Never, defaults are always safe.
Regular, such as monthly, reviews of privacy settings help ensure they remain aligned with your changing needs and platform updates. Relying on defaults or waiting for breaches can leave vulnerabilities unaddressed. Privacy is an ongoing process.
If you see someone being harassed online, what is the best action?
Share the content on your profile.
Join in and post insults.
Ignore it completely.
Report the behavior and support the victim.
Reporting harassment helps platform moderators address abuse and supports the victim by showing solidarity. Joining insults or ignoring the behavior can perpetuate harm. Sharing the content spreads the harassment further.
Which strategy helps maintain a healthy balance of screen time?
Using screens until bedtime every day.
Setting daily time limits and scheduling offline activities.
Removing all recreational screen activities.
Using screens only at random times.
Setting daily time limits for devices and including offline activities like sports or hobbies creates a balanced routine. Using screens until bedtime or removing breaks can lead to strain and poor health. Random usage lacks structure.
In an online game, what is a safe practice when choosing a username?
Use a nickname that doesn't reveal personal details.
Include your home address in the username.
Use your full real name and birth year.
Share your username and password publicly.
Choosing a nickname without personal identifiers keeps you more anonymous and protects your identity in online communities. Using full names, addresses, or sharing credentials increases the risk of privacy invasion or account theft.
What is the first step if you receive a suspicious link in a message?
Delete the message without any thought.
Do not click it and verify its source.
Forward it to everyone you know.
Click it to see where it goes.
Verifying the source before clicking prevents malware infections or scams. Clicking unknown links may lead to fraud or viruses. Forwarding suspicious messages can spread threats, and deleting without considering reporting misses protection steps.
Which sequence of actions best protects you if you suspect a phishing attempt?
Do not click the link, change your password, report to the platform.
Forward it to friends, then click links.
Delete the email only.
Click the link, provide info to see if it's real, then ignore it.
The best response to phishing is to avoid interacting with suspicious links, update your credentials in case of compromise, and alert the platform to protect yourself and others. Clicking or forwarding increases risk. Deleting alone may not help prevent further attacks.
How can you customize privacy settings to share posts with only specific friends?
Change your password to a friend's name.
Leave your profile public but message only chosen friends.
Use custom friend lists or audience selectors in settings.
Disable your account temporarily.
Custom friend lists or audience selectors allow you to choose exactly who can see each post, giving you granular control over privacy. Leaving profiles public offers no restriction. Changing passwords or disabling accounts does not target individual post visibility.
A healthy screen time schedule balances schoolwork, recreation, and rest. Which daily plan follows best practices?
1 hour homework, 5 hours gaming, no exercise, 6 hours sleep.
4 hours homework, 2 hours leisure screen, 1 hour exercise, 8 hours sleep.
No homework, 3 hours gaming, 0 exercise, 12 hours sleep.
Continuous screens all day with no sleep schedule.
A balanced day includes structured schoolwork, limited leisure screen time, regular physical activity, and adequate sleep to promote overall health. Excessive gaming or skipping exercise and sleep can lead to negative outcomes. Unstructured plans lack balance.
If a peer shares content indicating self-harm intentions, what should you do?
Laugh it off and send memes.
Ignore them.
Share it without comment to other friends.
Report it to a trusted adult and the platform immediately.
Self-harm content is a serious warning sign and should be reported promptly to guardians or platform authorities for support and intervention. Ignoring or mocking such content endangers the person. Sharing without context can violate privacy.
In an online chat, an older user gives excessive compliments and asks for personal photos. What threat does this indicate and how should you respond?
It suggests grooming; stop communication and report the user.
They are verifying identity; send password.
It is normal behavior; share more photos.
It means they want to collaborate on a project; give photos.
Grooming involves an adult building trust with a minor to exploit them, and excessive flattery or requests for personal images are red flags. The correct action is to cease communication and report the individual. Sharing sensitive materials or passwords is dangerous.
0
{"name":"Which of the following is an example of cyberbullying?", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Which of the following is an example of cyberbullying?, What does 'phishing' typically involve?, Which characteristic makes a password most secure?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}

Learning Outcomes

  1. Identify common digital risks faced by children
  2. Evaluate safe online behaviors and best practices
  3. Apply privacy settings to protect personal information
  4. Analyze scenarios to recognize potential threats
  5. Demonstrate strategies for responsible screen time
  6. Master reporting procedures for suspicious activities

Cheat Sheet

  1. Identify Online Risks - The internet can be a wild playground with hidden dangers like cyberbullying, inappropriate content, and sneaky predators. Learning to spot these risks is your first shield against trouble!
  2. Master Safe Habits - Strong passwords are your secret code, and sharing personal info is a no-go zone. By practicing responsible clicks and chats, you'll keep your profile locked down tight.
  3. Customize Your Privacy Settings - Adjusting who sees your posts or location is like drawing magic circles around your data. Regular check-ups on these settings keep your digital world under your control.
  4. Think Critically About Content - Not every email, message, or link is friendly; some are traps in disguise. Sharpen your eagle eyes to spot phishing schemes and suspicious profiles before they snag you.
  5. Balance Screen Time - While gaming and scrolling can be epic, too much screen time can zap your energy. Mix in outdoor adventures and cozy family moments to recharge your real-life superpowers.
  6. Know Reporting Pathways - Spot something sketchy? Reporting bad behavior is like calling in the safety squad. Learn where and how to flag harmful content so everyone can browse more safely.
  7. Understand COPPA - The Children's Online Privacy Protection Act (COPPA) is a rulebook that shields kids under 13 from sneaky data grabs. Knowing your rights under COPPA helps you protect younger siblings and friends online.
  8. Keep Communication Open - Chatting honestly with parents or guardians about your online adventures builds trust and keeps you safe. Open dialogue turns confusing clicks into community learning.
  9. Spot "Sharenting" Risks - Parents love sharing cute pics, but oversharing can expose private details forever. Understanding the privacy price of "sharenting" keeps your personal life out of the spotlight.
  10. Use Parental Controls Wisely - Parental controls and monitoring tools act like friendly guards on your digital door. When used right, they help you explore safely without feeling spied on.
Powered by: Quiz Maker