Grade 10 History And Citizenship – Digital Citizenship technology Quiz

1. What is meant by 'digital citizenship'?

Only following friends online
Knowing how to repair computers
Using digital devices only for school work
Responsibly and ethically using technology and participating in online communities
Explanation:

Digital citizenship means understanding rights and responsibilities online, using technology ethically, and taking part in digital communities in a safe, respectful way.

2. Which Kenyan law gives individuals rights over their personal data?

Public Order Act
National ICT Policy 2012
Computer Misuse and Cybercrimes Act 2018
Data Protection Act 2019
Explanation:

Kenya's Data Protection Act 2019 sets rules on collecting, storing and using personal data and gives individuals rights about their own data.

3. What is a 'digital footprint'?

A brand of smartphone popular in schools
The size of a computer's memory
A record of the websites you visit and things you post online
A physical mark left by an electronic device
Explanation:

A digital footprint is the trail of data you leave when you use the internet—posts, searches, and site visits that can be seen or tracked.

4. If a classmate is being cyberbullied, what is the best immediate action?

Share the messages to see who is responsible
Join in so you fit in
Ignore and do nothing
Report the behaviour to a trusted adult or the platform and support the victim
Explanation:

Reporting cyberbullying to an adult or the platform and supporting the victim helps stop harm and keeps everyone safer online.

5. Which of the following is an example of a phishing attempt?

A friend texting to ask about weekend plans
A teacher sending homework by the school portal
A bank email asking you to click a link and enter your password to verify your account
A legitimate app update from the official store
Explanation:

Phishing messages try to trick you into giving passwords or personal information by pretending to be a trusted organisation.

6. What makes a password strong?

A long mix of letters, numbers and symbols that is not easily guessable
Using your name and birthdate
Using the same password for all accounts
Short words that are easy to remember
Explanation:

Strong passwords are long and include a mix of characters so they are harder for others or software to guess or crack.

7. Which practice helps you check if an online news story is true?

Trusting stories with many likes only
Assuming it is true if it confirms your opinion
Sharing it immediately so others can judge
Checking multiple reputable sources and the original publisher
Explanation:

Verifying a story across trustworthy sources and finding the original publisher reduces the chance of sharing false information.

8. What is 'netiquette'?

The speed of an internet connection
Rules and polite behaviour for communicating online
A type of internet browser
A brand of headset used for online classes
Explanation:

Netiquette refers to polite, respectful behaviour and communication standards when using the internet and social media.

9. Which of the following is a likely consequence of sharing too much personal information online?

Improved phone battery life
Guaranteed privacy forever
Receiving school homework on time
Identity theft or unwanted contact from strangers
Explanation:

Oversharing personal data can lead to identity theft, scams, stalking or other harms from people who misuse the information.

10. What does copyright protect?

Medicines and medical procedures
The price of electronic devices
Creative works like music, writing and art from being copied without permission
A person's right to privacy
Explanation:

Copyright gives creators control over how their original works are used, copied or shared and protects their rights.

11. Which is the safest action when using public Wi‑Fi at a cafĂ© or bus station?

Share personal ID photos while connected
Turn off your phone entirely so it won't connect
Log into your bank account without checking anything
Avoid accessing sensitive accounts or use a secure VPN
Explanation:

Public Wi‑Fi can be insecure; avoid sensitive transactions or use a trusted VPN to protect your data from interception.

12. What does the term 'digital divide' refer to?

The gap between people who have access to digital technology and those who do not
A rule for using mobile phones in class
A type of computer virus
The distance between two servers
Explanation:

The digital divide describes unequal access to the internet, devices and skills, which affects education, jobs and participation.

13. Which action best defines cyberbullying?

Using digital tools to repeatedly harass, threaten or embarrass someone
Helping classmates solve computer problems
Creating a study group chat
Posting class timetables online
Explanation:

Cyberbullying uses phones, social media or messages to harm others repeatedly and can be as damaging as face-to-face bullying.

14. Which platform allows Kenyans to access many government services online?

eCitizen (ecitizen.go.ke)
Instagram
A private bank app
YouTube
Explanation:

eCitizen is Kenya's online portal for government services such as applications, licences and some registrations.

15. What is two‑factor authentication (2FA)?

Using two phones at the same time
A method requiring two forms of verification, such as a password and a code sent to your phone
Turning on airplane mode after login
Logging in with two different usernames
Explanation:

2FA adds a second verification step (like an SMS code or app prompt) to make accounts harder to break into even if the password is stolen.

16. How can you respect other people's privacy online?

Change a friend's profile information without telling them
Ask permission before sharing personal details or photos of others
Post someone else's personal messages publicly
Share photos of friends without asking if they might mind
Explanation:

Asking consent before sharing protects others' privacy and is part of responsible digital behaviour.

17. What is malware?

A type of fast internet connection
Software designed to harm or exploit devices and data
A brand of smartphone
An educational online game
Explanation:

Malware (malicious software) includes viruses, spyware and ransomware that damage systems or steal data.

18. If you find illegal or harmful content online, what should you do first?

Edit it and repost it as a joke
Download and keep it for evidence without telling anyone
Report it to the website/platform and, if serious, inform an adult or the authorities
Share it widely so others can see
Explanation:

Reporting to the platform helps remove harmful content; contact adults or authorities for serious offences so action can be taken.

19. What happens when you copy someone else's school essay and present it as your own?

You get free permission to use their work forever
You are demonstrating good teamwork
It has no consequences if nobody notices
It is plagiarism and may lead to discipline or legal issues
Explanation:

Using another person's work without credit is plagiarism; schools punish it and creators' rights can be legally protected.

20. How can citizens use digital tools to strengthen democracy?

By refusing to use e‑services
By using online platforms to access information, engage in civic discussions and hold leaders accountable
By spreading rumours during elections
By blocking government websites
Explanation:

Digital tools help people get information, discuss issues, petition, and monitor public officials—strengthening civic participation when used responsibly.

21. What is encryption used for?

Making files take up more storage space
Converting data into a coded form so only authorised people can read it
Slowing down the internet
Automatically deleting old messages
Explanation:

Encryption protects information by turning it into code that only people with the right key can decode and read.

22. Which action is a good, age‑appropriate step for a 15‑year‑old to protect their social media account?

Share your password with close friends so they can post for you
Use the same password on all sites for convenience
Accept every friend request from unknown people
Adjust privacy settings so only trusted people see your posts
Explanation:

Setting privacy controls helps limit who can view your content, reducing risks like unwanted contact or oversharing.

23. How can schools best teach digital citizenship to students?

By only testing students on keyboard speed
By including lessons, practical activities and discussions about online safety and responsible use
By leaving students to learn from social media alone
By banning all use of technology at school
Explanation:

Active teaching—class lessons, role plays and guided online practice—helps students develop safe and responsible digital habits.

24. Which sign suggests a website is more likely to be secure and trustworthy?

The site uses bright colours and many pop-ups
The site offers everything for free without any information about the owner
The site URL starts with http:// and has no padlock
The URL starts with https:// and shows a padlock icon in the browser
Explanation:

HTTPS and a padlock indicate the site encrypts data between your device and the site, which is one sign of better security.

25. Which Kenyan law specifically criminalises hacking, identity theft and other cyber offences?

Computer Misuse and Cybercrimes Act 2018
Education Act
Births and Deaths Registration Act
Traffic Act
Explanation:

The Computer Misuse and Cybercrimes Act 2018 in Kenya covers offences like hacking, cyber fraud and identity-related cybercrimes.

26. What is 'digital citizenship'?

Knowing how to use digital devices only for entertainment
Avoiding all contact with the internet
Only using social media to make friends
The responsible and informed use of technology to participate in society
Explanation:

Digital citizenship means using digital technologies responsibly, safely and ethically to take part in civic, social and economic life.

27. Which of the following is an example of responsible online behaviour for a 15-year-old in Kenya?

Posting rumours about a classmate to get more followers
Using privacy settings to control who sees your personal posts
Accepting friend requests from unknown people without checking
Sharing your National ID number in a public comment to get help faster
Explanation:

Using privacy settings helps protect personal information and gives you control over who can see your online content.

28. What does the term 'digital footprint' refer to?

All traces of a person's activity online and the information they leave behind
Marks left on a device screen after use
The amount of storage used in your cloud account
A list of the apps installed on a phone
Explanation:

A digital footprint is the record of things you do online—posts, searches, and shared content—that can be found or tracked later.

29. Which of these is the best way to create a strong password?

Use your date of birth so you remember it easily
Use the word 'password' with a number
Use the same password for all school and personal accounts
Combine upper and lower case letters, numbers and symbols in a long phrase
Explanation:

A long, complex password with mixed characters is harder to guess or crack than simple or repeated passwords.

30. What is 'phishing'?

A legal way to get someone’s password
Trying to trick people into giving personal information using fake emails or messages
An official government email asking you to pay taxes
A sport played outdoors
Explanation:

Phishing uses deceptive emails or messages that look real to steal passwords, bank details or other personal data.

31. Which action is an example of cyberbullying?

Helping a classmate recover their lost account
Reporting an abusive comment to the platform
Posting embarrassing photos of someone to make others laugh
Joining a school online study group
Explanation:

Sharing embarrassing content to shame or harass someone is cyberbullying and can cause serious harm.

32. If you or someone you know is a victim of a serious online crime in Kenya, the most appropriate first step is to:

Post the details online to get public sympathy
Try to handle it alone by confronting the offender publicly
Delete your social media accounts and do nothing else
Report the incident to the police cybercrime unit or a trusted adult so it can be investigated
Explanation:

Serious online crimes should be reported to authorities or a trusted adult so they can take action and protect victims.

33. Which of the following is an example of copyright infringement?

Asking permission to use a photographer’s image
Linking to a newspaper article in your blog
Citing the author when using a short quote from a book in a school project
Downloading and reposting a song without the creator’s permission
Explanation:

Using someone’s work without permission or proper licensing breaches copyright and is illegal in many cases.

34. Which clue most often indicates that a news item might be fake or misleading?

The headline is sensational and the story has no reliable sources
It includes clear sources and quotes from experts
It is published on a well-known government website
Multiple respected outlets report the same facts
Explanation:

Fake news often uses shocking headlines and lacks trustworthy sources. Verify with reputable outlets before believing or sharing.

35. How can you increase privacy on your social media account?

Accept friend requests from everyone to grow followers
Share passwords with your friends so they can post for you
Post personal documents to show authenticity
Set your profile and posts to be visible only to approved friends
Explanation:

Limiting visibility to people you trust reduces the chance that strangers will see or misuse your personal information.

36. Which of the following is a recognised digital right?

The right to demand others’ passwords
The right to access information and express opinion online within the law
The right to download any paid content for free
The right to post anything without consequences
Explanation:

Digital rights include access to information and freedom of expression online, but these rights are balanced by laws and responsibilities.

37. What is good 'netiquette' when participating in an online class discussion?

Typing in all capital letters to make your point stronger
Interrupting others by posting repeated messages
Posting unrelated memes during the lesson
Using respectful language and taking turns to speak or post
Explanation:

Good netiquette means being polite, respectful and considerate so discussions are productive and safe for everyone.

38. What does two-factor authentication (2FA) do?

Removes the need for a password entirely
Sends your password to others so they can log in
Allows you to use the same password for two devices
Adds an extra verification step, like a code on your phone, when you log in
Explanation:

2FA improves account security by requiring a second proof of identity (e.g., a code) in addition to your password.

39. What is 'malware'?

A browser extension that improves privacy
Software designed to harm or gain unauthorised access to computers
A helpful app approved by the government
A type of internet connection for schools
Explanation:

Malware includes viruses, worms and ransomware that damage devices or steal information without permission.

40. Which is a likely consequence of sharing personal information like your home address or bank details on a public profile?

Automatic verification of your social media accounts
Higher chance of identity theft, fraud or unwanted contact
Receiving more helpful friend requests from classmates
Improving your chances of winning online contests
Explanation:

Publicly exposed personal data can be used by criminals to commit fraud or invade your privacy.

41. Which Kenyan e-government portal is commonly used to access services such as passport applications and business registration online?

YouTube
Airtel Money
Safaricom M-Pesa
Huduma eCitizen
Explanation:

The eCitizen (Huduma) portal is Kenya’s online platform for many government services, including passports and business registration.

42. What does the term 'digital divide' mean?

The gap between those who have access to digital technology and those who do not
The password that separates two user accounts
A disagreement between two people in an email
A special internet plan for students
Explanation:

The digital divide describes inequality in access to devices, internet and skills needed to participate in the digital world.

43. How can social media be used positively for citizenship?

Creating fake accounts to influence opinions
Organising community events, sharing reliable civic information and encouraging voter registration
Ignoring local issues and only following celebrities
Spreading unverified rumours to gain attention
Explanation:

Social media can help organise communities, spread accurate civic information and promote participation in public life.

44. Before downloading a file from the internet for schoolwork, you should:

Check that the source is trusted and scan the file for viruses
Open the file on a school computer without checking
Share the file link on your profile first
Download immediately; files from the internet are always safe
Explanation:

Verifying the source and scanning files reduces the risk of downloading malware that could harm your device or data.

45. What does copyright protect?

Ideas that someone mentions in a conversation
The original works of creators such as music, writing and artwork
Facts that everyone already knows
Only news articles published by the government
Explanation:

Copyright gives creators control over how their original works are used and shared, protecting their creative rights.

46. What does a Creative Commons licence allow you to do?

Use someone’s work without any conditions at all
Claim someone else’s work as entirely your own
Use or share a work under specific conditions set by the creator
Delete the creator’s name from their work
Explanation:

Creative Commons licences let creators allow reuse of their work under certain terms, such as giving credit or not using it commercially.

47. Why is sexting risky for teenagers?

It helps to build trust with strangers
There are no risks because messages disappear immediately
It guarantees privacy because phones are secure
It can lead to emotional harm, bullying, blackmail and legal consequences for minors
Explanation:

Sharing sexual images or messages can be abused by others, leading to serious personal and sometimes legal problems for young people.

48. What makes up a person's 'digital identity'?

The colour scheme of their device
Only the email address they use for school
Only the devices owned by their parents
The combination of usernames, profiles, posts and online behaviour that represent them digitally
Explanation:

Digital identity includes all online traces—accounts, posts and interactions—that together form how someone appears on the internet.

49. How does a Virtual Private Network (VPN) help users?

It encrypts your internet connection to protect privacy and hide browsing activity from others on the same network
It makes your phone battery last forever
It automatically deletes your social media accounts
It guarantees you will never see advertisements
Explanation:

A VPN creates a secure, encrypted connection that helps protect your data and privacy, especially on public Wi-Fi networks.

50. Which is an ethical way to use artificial intelligence (AI) when doing school research?

Use AI to generate ideas, then verify facts and write the final work in your own words with citations
Rely on AI for all answers and skip learning
Use AI to create fake evidence for assignments
Present AI-generated text as your own work without checking it
Explanation:

Using AI responsibly means checking its output, avoiding plagiarism, and ensuring the information is accurate before including it in schoolwork.