1.
Why is communication easier today than say twenty years ago?
Correct Answer
C. Better technology
Explanation
Communication is easier today than it was twenty years ago because of advancements in technology. With the development of smartphones, internet, and social media platforms, people can easily connect with each other regardless of their location. These technological advancements have also made communication faster and more efficient, with the ability to send instant messages, make video calls, and share information instantly. Additionally, the availability of various communication apps and platforms has made it easier for people to stay connected and communicate in real-time.
2.
Who causes millions of dollars worth of damage to computer systems and computer information each year?
Correct Answer
A. Virus programmers
Explanation
Virus programmers are responsible for causing millions of dollars worth of damage to computer systems and computer information each year. These individuals create malicious software, known as viruses, with the intention of infecting computers and compromising their security. Once a virus is unleashed, it can spread rapidly and cause various forms of damage, such as data loss, system crashes, and unauthorized access to sensitive information. The actions of virus programmers result in significant financial losses for individuals, businesses, and governments worldwide.
3.
What kind of network lets a person send and receive e-mail?
Correct Answer
A. Client-server network
Explanation
A client-server network allows a person to send and receive e-mail. In this type of network, the person acts as a client who connects to a server, such as an email server, to access their email account. The client sends requests to the server to send or receive emails, and the server processes these requests and delivers the emails accordingly. This network architecture enables efficient and reliable email communication by centralizing the email storage and management on the server side.
4.
What term is used to represent the computer that is sending the e-mail?
Correct Answer
A. Client
Explanation
The term used to represent the computer that is sending the e-mail is the client. In the context of email communication, the client refers to the software or application being used by the user to send and receive emails. The client interacts with the email server to send the email from the user's computer to the recipient's computer.
5.
What term is used for the computer that receives an e-mail message?
Correct Answer
B. Server
Explanation
The term used for the computer that receives an e-mail message is a server. A server is a computer or system that is responsible for managing and storing data, as well as providing services to other computers or clients on a network. In the context of e-mail, a server receives incoming messages and stores them until they are retrieved by the intended recipient's client device. The client device, such as a computer or smartphone, then connects to the server to download the received messages.
6.
What does ISP stand for?
Correct Answer
C. Internet Service Provider
Explanation
ISP stands for Internet Service Provider. An ISP is a company or organization that provides access to the internet for individuals and other businesses. They offer various services such as internet connectivity, email services, web hosting, and domain registration. ISPs connect their customers to the internet through technologies like dial-up, DSL, cable, or fiber optics. They play a crucial role in enabling individuals and businesses to access and utilize the internet for communication, information sharing, and online activities.
7.
What does protocol mean?
Correct Answer
C. Proceedures
Explanation
The term "protocol" refers to a set of rules or procedures that govern the communication between different devices or systems. It outlines the specific steps and guidelines to be followed for the successful exchange of information. Therefore, "procedures" is the correct answer as it accurately represents the meaning of the term "protocol".
8.
Where in the server is your e-mail stored until you open it?
Correct Answer
D. Inbox
Explanation
The correct answer is "Inbox" because the inbox is the default storage location for incoming emails on a server. Emails are received and stored in the inbox until the user opens and reads them. Once the email is opened, it is typically moved to a different folder or deleted depending on the user's actions.
9.
What bit of information will not be found in an e-mail's message header?
Correct Answer
E. E-MAIL
Explanation
The information that will not be found in an email's message header is the actual content of the email itself. The header includes the recipient (TO), sender (FROM), date, and subject of the email, but it does not include the email's body or text. The body of the email is typically found in the main section of the email, below the header.
10.
The messages in your inbox can be sorted by date, or sender's name.
Correct Answer
A. True
Explanation
The given statement is true because most email platforms provide options to sort messages in the inbox based on the date they were received or the sender's name. This allows users to easily organize and locate their emails based on their preferred sorting criteria.
11.
What two items are needed to get authentication to an e-mail clien-server network?
Correct Answer(s)
A. Password
B. Username
Explanation
To get authentication to an email client-server network, two items are required: a password and a username. The password ensures that only authorized individuals can access the network, while the username identifies the specific user. These two items work together to verify the user's identity and grant them access to the email client-server network. The date and virus protection mentioned are not directly related to the authentication process and are not necessary for obtaining access to the network.
12.
Change your password often and never share it with others, even your best friends.
Correct Answer
A. True
Explanation
Changing your password often and not sharing it with others, even your best friends, is a good practice for maintaining the security of your accounts. By changing your password regularly, you reduce the risk of someone gaining unauthorized access to your account. Sharing your password, even with trusted individuals, increases the chances of it falling into the wrong hands and compromising the security of your account. Therefore, it is important to change your password frequently and keep it private.
13.
Where would your store your frequent contacts in a clien-server network?
Correct Answer
C. Address book
Explanation
In a client-server network, the address book is the most suitable place to store frequent contacts. An address book is a digital repository where users can store and organize contact information such as names, phone numbers, and email addresses. It provides easy access to frequently used contacts, allowing users to quickly retrieve and communicate with them. Unlike an inbox or outbox, which are typically used for managing emails or messages, the address book is specifically designed for storing and managing contact information. Facebook, on the other hand, is a social media platform and not typically used for storing contact information in a client-server network.
14.
Which choice represents the process of sending the same e-mail to select members of your address book?
Correct Answer
B. E-mail group
Explanation
An e-mail group refers to the process of sending the same e-mail to select members of your address book. By creating a group, you can easily send a single e-mail to multiple recipients without having to manually enter each recipient's address. This saves time and ensures that the message reaches all the intended recipients efficiently.
15.
True or False: An e-mail group saves time because you do not have to type each individual e-mail address to sent the same message to multiple recepients.
Correct Answer
A. True
Explanation
An e-mail group saves time because it allows the sender to send the same message to multiple recipients without having to manually type each individual e-mail address. By creating a group, the sender can simply select the group name and the message will be sent to all the members of that group, saving time and effort.
16.
What should you do to the e-mail messages you no longer need or feel are unimportant?
Correct Answer
C. Delete them
Explanation
To manage e-mail messages that are no longer needed or considered unimportant, the best course of action is to delete them. Deleting these messages helps to declutter your inbox, freeing up storage space and making it easier to find and prioritize important messages. Saving them or forwarding them would only contribute to the accumulation of unnecessary information, while e-mail grouping is not relevant to the task of removing unwanted messages.
17.
What term identifies the method used to save and organize your e-mail.
Correct Answer
A. E-mail folders
Explanation
The term that identifies the method used to save and organize your e-mail is "e-mail folders." This refers to the feature in e-mail clients that allows users to create folders and categorize their e-mails based on different criteria such as sender, subject, or importance. By using e-mail folders, users can easily manage and locate their e-mails, making it a convenient way to organize their inbox.
18.
How can we send a picture with our e-mail message?
Correct Answer
A. Send it as an attachment
Explanation
To send a picture with an email message, you can choose to send it as an attachment. This means that you can include the picture file along with your email, allowing the recipient to download and view the picture. Attaching the picture ensures that it is sent along with the email and can be easily accessed by the recipient.
19.
Why must we be careful when opening attachments received with e-mails?
Correct Answer
C. They could contain a virus
Explanation
When opening attachments received with emails, it is important to be cautious because they could potentially contain a virus. Opening such attachments without proper scrutiny can lead to malware or other harmful software being installed on the device. Therefore, it is crucial to exercise caution and use reliable antivirus software to scan attachments before opening them to ensure the safety and security of the device and personal data.
20.
What is ment by: "A virus can replicate itself!"
Correct Answer
C. It will multiply by itself.
Explanation
The correct answer is "It will multiply by itself." This means that a virus has the ability to make copies of itself and spread to other files or systems. Unlike other options, such as erasing itself or turning into an image, the replication of a virus allows it to infect more devices and potentially cause harm.
21.
Which is not true of a computer virus.
Correct Answer
D. It is expensive and hard to buy or acquire.
Explanation
The statement "It is expensive and hard to buy or acquire" is not true of a computer virus. Computer viruses can be easily acquired through various means such as downloading infected files from the internet or opening malicious email attachments. In fact, some viruses are even designed to spread themselves automatically without any user intervention. Additionally, computer viruses are not expensive to obtain as they can be created by individuals with programming knowledge or found for free on the dark web.
22.
A computer virus is an executable file, that means that it can load and run all by itself. Which extension below tells the user the file is an executable file.
Correct Answer
D. .exe
Explanation
The .exe extension is commonly used to indicate that a file is an executable file. This extension is associated with executable programs on Windows operating systems. When a user sees a file with the .exe extension, they can infer that the file is designed to be run and executed on their computer.
23.
What type of program will help you protect your computer against virus programmers and their work?
Correct Answer
D. Anti-virus software like McAffee
Explanation
Anti-virus software like McAfee is designed specifically to protect computers against virus programmers and their work. It is specifically developed to detect, prevent, and remove malicious software, including viruses, worms, Trojans, and other types of malware. Unlike word processors, presentation software, or computer browsers, which are not designed for computer security, anti-virus software actively scans files and programs for any potential threats, provides real-time protection, and offers features like quarantine and regular updates to keep up with the latest threats. Therefore, using anti-virus software is essential to safeguard a computer against virus programmers and their malicious work.
24.
For anti-virus software to be effective you should set it to manual updates instead of automatic updates.
Correct Answer
B. False
Explanation
Setting anti-virus software to manual updates instead of automatic updates is not effective. Automatic updates ensure that the software is constantly updated with the latest virus definitions and security patches, providing better protection against new threats. Manual updates require the user to regularly check for updates and manually install them, which can be time-consuming and increase the risk of missing important updates. Therefore, the statement is false.
25.
What method lets two or more people communicate at the same time by phone?
Correct Answer
C. Teleconference
Explanation
A teleconference is a method that allows two or more people to communicate at the same time by phone. It enables individuals from different locations to participate in a conversation or meeting through the use of telecommunication technology. This method is commonly used in business settings, where participants can discuss and collaborate on projects without the need for physical presence. Teleconferences are efficient and cost-effective ways to facilitate communication and decision-making among multiple parties.
26.
What option lets people communicate on the internet using their keyboards?
Correct Answer
B. Chatroom
Explanation
A chatroom is an online platform that allows people to communicate with each other using their keyboards. It provides a space where individuals can exchange text-based messages in real-time, facilitating communication and interaction over the internet. Unlike teleconference rooms or videoconference rooms, which involve audio or visual communication, a chatroom specifically focuses on keyboard-based communication. An Internet room is a vague option that does not specifically address the method of communication, making it an incorrect choice.
27.
Which communication method lets people communicate by voice and cameras at the same time via the internet?
Correct Answer
B. Videoconferencing
Explanation
Videoconferencing is the correct answer because it allows people to communicate by voice and cameras simultaneously via the internet. This method enables individuals to have real-time conversations and see each other through video feeds, making it a popular choice for remote meetings, interviews, and collaborations.
28.
What is a another term for Web-based learning?
Correct Answer
B. Distance learning
Explanation
Distance learning is another term for web-based learning. It refers to a method of education where students can learn remotely, without being physically present in a traditional classroom setting. This type of learning utilizes technology, particularly the internet, to deliver educational content and facilitate communication between students and instructors. It allows individuals to access educational resources and participate in classes from any location, making it a flexible and convenient option for those who cannot attend traditional in-person classes.
29.
If a pilot trains to fly using a flight simulator that is similar to a video game, he is training using which of the following methods?
Correct Answer
B. Virtual learning
Explanation
The pilot is training using virtual learning because a flight simulator is a computer-based system that replicates the experience of flying an aircraft. This method allows pilots to practice and gain experience in a simulated environment, which closely resembles real-life flying conditions. Virtual learning refers to the use of technology and simulated environments to facilitate learning and training experiences.
30.
What is one characteristic of virtual learning?
Correct Answer
D. Computer simulation
Explanation
One characteristic of virtual learning is computer simulation. This refers to the use of computer technology to create a simulated learning environment, where students can interact with virtual objects and scenarios. It allows for hands-on experience, experimentation, and problem-solving in a safe and controlled environment. Computer simulation enhances the learning process by providing realistic and immersive experiences that can be tailored to individual needs and objectives.
31.
What type of learning environment lets the learner interact face to face with his peers and teachers, plus it incorporates distance learning in the educational experience?
Correct Answer
B. Blended learning
Explanation
Blended learning is the correct answer because it combines both face-to-face interaction with peers and teachers, as well as distance learning through online platforms or virtual classrooms. This type of learning environment allows for a more flexible and personalized educational experience, as learners can engage with their peers and teachers in person while also accessing resources and participating in online activities.
32.
What is one danger of chatrooms?
Correct Answer
C. Chatroom participants are more than likely to be stangers
Explanation
One danger of chatrooms is that the participants are more than likely to be strangers. This means that you are interacting with individuals whom you do not know personally, which can pose a risk to your safety. Strangers may have malicious intentions, such as attempting to deceive or harm others. It is important to exercise caution and be mindful of sharing personal information or engaging in risky conversations with unknown individuals in chatrooms.
33.
What is one advantage a videoconference has over a telconference?
Correct Answer
B. The participants can see each other in a videoconference
Explanation
In a videoconference, participants have the advantage of being able to see each other. This visual aspect adds an extra layer of communication as it allows for non-verbal cues, facial expressions, and body language to be observed. This visual element enhances the overall interaction and understanding between participants, creating a more immersive and engaging experience compared to a teleconference where only voices can be heard.