1.
With the many types of electronic communication, which is the best for regular entries, commentaries, and most like an on-line diary?
Correct Answer
B. Blog
Explanation
A blog is the best option for regular entries, commentaries, and most like an online diary. A blog allows individuals to regularly post their thoughts, experiences, and opinions in a chronological manner. It provides a platform for self-expression and allows readers to engage through comments and feedback. Unlike a discussion board or chat room, a blog provides a more personal and structured format for sharing content. While a podcast may also involve regular entries, it is primarily an audio-based medium and may not offer the same level of interactivity and written expression as a blog.
2.
Real-time conversations and group on-line discussion needs are best served by:
Correct Answer
C. Chat Rooms
Explanation
Real-time conversations and group online discussion needs are best served by chat rooms. Chat rooms provide a platform for instant messaging and real-time interaction between multiple participants. They allow users to engage in live discussions, exchange ideas, and collaborate in a more immediate and interactive manner compared to other options like discussion boards, blogs, or podcasts. Chat rooms facilitate quick responses and enable participants to have dynamic conversations, making them an ideal choice for real-time communication and group discussions.
3.
What is the term for an on-line digital media file that can be audio or video and does not require a media player only a computer with Internet access?
Correct Answer
D. Podcast
Explanation
A podcast is an on-line digital media file that can be audio or video and does not require a media player only a computer with Internet access. It is a form of digital media that is typically episodic and can be downloaded or streamed online. Podcasts have gained popularity for their convenience and accessibility, allowing users to listen or watch content on various topics at their own convenience.
4.
Which of the following information types are the MOST dangerous to disclose?
Correct Answer
D. Your social security number
Explanation
Disclosing your social security number is the most dangerous among the given information types. This is because social security numbers are unique identifiers that can be used by identity thieves to commit various types of fraud, such as opening fraudulent accounts, accessing financial information, or filing false tax returns. Unlike the other information types listed, your social security number is directly linked to your personal and financial identity, making it highly valuable and vulnerable to misuse.
5.
A cyber bully uses all of the following on-line methods to intimidate EXCEPT:
Correct Answer
C. Pushing, hitting, screaming in person
Explanation
The correct answer is "Pushing, hitting, screaming in person." This is because cyberbullying refers to bullying that takes place online, not in person. The other options listed are all examples of cyberbullying methods, such as using all uppercase to yell, posting fraudulent or malicious information, and posting fake or demeaning pictures of the victim.
6.
The “s” in https:// reveals that the site is:
Correct Answer
C. Secure and protected
Explanation
The "s" in https:// stands for "secure" and indicates that the site is using a secure and encrypted connection. This means that any information transmitted between the user's browser and the website is encrypted and protected from potential eavesdropping or tampering. Therefore, the correct answer is "Secure and protected."
7.
Identity Theft impacts individuals in all of the following ways EXCEPT:
Correct Answer
D. Pet names
Explanation
Identity theft impacts individuals in all of the following ways except for their pet names. Identity theft typically involves the fraudulent use of someone's personal information, such as their credit and criminal records, financial records and bank accounts. Pet names, on the other hand, are not typically used or targeted in identity theft incidents.
8.
Discussion Boards are safer when they are:
Correct Answer
D. Moderated
Explanation
Moderated discussion boards are safer because they have someone overseeing the content and ensuring that inappropriate or harmful posts are removed. This helps to create a more positive and respectful environment for users. Unmoderated boards can lead to the spread of misinformation, harassment, and other harmful behavior. Secure and accessible are important factors for discussion boards, but moderation is the key aspect that ensures safety.
9.
Spyware tracks and monitors individual user habits through the use of:
Correct Answer
A. Cookies
Explanation
Spyware tracks and monitors individual user habits through the use of cookies. Cookies are small text files that are stored on a user's computer by websites they visit. These files contain information about the user's browsing history, preferences, and login details. Spyware can access and collect this data without the user's knowledge or consent, allowing it to track their online activities and gather personal information. Therefore, cookies are commonly used by spyware to monitor and track individual user habits.
10.
E-mail is not confidential. Which of the following notations in an e-mail header indicate that a copy has been sent without that person’s knowledge?
Correct Answer
B. BCC
Explanation
The correct answer is BCC. BCC stands for "Blind Carbon Copy" and it is a notation in an email header that indicates that a copy of the email has been sent to someone without the knowledge of the other recipients. When using BCC, the recipients in the "To" and "CC" fields are not able to see the email addresses of the BCC recipients, maintaining their anonymity. This allows for discreet communication and ensures that the BCC recipients remain unaware of each other's involvement in the email conversation.
11.
Which of the following e-mail parts should be updated frequently to make sure that the topic is relevant to the body?
Correct Answer
C. Subject
Explanation
The subject of an email should be updated frequently to ensure that it accurately reflects the topic discussed in the body of the email. This is important because it helps the recipient quickly understand the purpose of the email and allows them to prioritize and organize their inbox effectively. By updating the subject, the sender can also ensure that the email remains relevant over time, especially if there are multiple email exchanges on the same thread.
12.
To promote professionalism and credibility, which word processing tool should ALWAYS be used before sending an e-mail?
Correct Answer
B. Spell and grammar check
Explanation
To promote professionalism and credibility, it is important to use the spell and grammar check tool before sending an email. This tool helps to ensure that there are no spelling mistakes or grammatical errors in the email, which can negatively impact the credibility of the sender. By using this tool, the sender can present a polished and error-free email, demonstrating professionalism and attention to detail.
13.
Netiquette is BEST defined as:
Correct Answer
A. Internet etiquette
Explanation
Netiquette refers to the set of rules and guidelines for proper behavior and communication on the internet. It involves showing respect, being polite, and using appropriate language and tone when interacting with others online. Netiquette helps to create a positive and respectful online environment.