1) ................. sites contain fake situations in an attempt to steal your data. a) Trusted b) Scam c) Reliable 2) You can go to the site you want by typing the .................. a) opnions b) URL c) class 3) ...................are scam websites that offer you a prize that never comes. a) Online shopping b) Scarewares c) Sweepstakes 4) All URLs are made up of two main parts. a) b) 5) All scam websites follow the same basic principles, but in different ways. a) b) 6) You should avoid accessing scam websites. a) b) 7) .................. scam never send(s) you the correct items you bought. a) Sweepstakes b) Scarewares c) Online shopping 8) If someone is exposed to .................. should contact the Child Helpline. a) scam websites b) educational websites c) government 9) The URL (Uniform Resource Locator) begins with the ................. a) protocol b) file path c) resource name 10) Scam websites operate to get your .................... a) personal information b) opinions c) URL 11) The website address (URL) enables you to access the site you want. a) b) 12) Scam websites usually have misspelled words or bad grammar. a) b) 13) Scareware websites offer you a prize that you never get. a) b) 14) You can check out (verify) websites using ............... a) personal opinions b) digital blogs c) the URL 15) The ................ indicates who owns this site. a) protocol b) resource name c) file path 16) The .................. websites tell u that your computer has a problem, and you should download a file. a) sweepstakes b) scareware c) online shopping 17) If you are scammed, you should report it and tell a trusted adult. a) b) 18) The last part of the URL is the file path that identifies who owns that space. a) b) 19) To avoid scam websites, you should check the URL of websites. a) b) 20) The protocol in a URL determines how the information is transferred. a) b)

ICT | Grade 5 | First term | Theme 2 | lesson 4

Ranking

Estilo visual

Opções

Alterar modelo

Restaurar arquivo salvo automaticamente: ?