How To Use Internet And Email?

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Jackie_mac
J
Jackie_mac
Community Contributor
Quizzes Created: 6 | Total Attempts: 23,491
Questions: 24 | Attempts: 1,082

SettingsSettingsSettings
How To Use Internet And Email? - Quiz

Take this quiz on how to use internet email and share with friends too. All the best for this knowledgeable quiz!


Questions and Answers
  • 1. 

    Which one of the following is a feed format used to publish frequently updated content such as news headlines or podcasts

    • A.

      Really Simple Service (RSS).

    • B.

      Real Site Software (RSS).

    • C.

      Real Simple Syndication (RSS).

    Correct Answer
    C. Real Simple Syndication (RSS).
    Explanation
    Real Simple Syndication (RSS) is a feed format used to publish frequently updated content such as news headlines or podcasts. RSS allows users to subscribe to websites and receive updates in a standardized format. It provides a convenient way for users to stay updated with their favorite websites without having to visit them individually. RSS feeds can be easily read and accessed by various platforms and applications, making it a popular choice for distributing and consuming content.

    Rate this question:

  • 2. 

     Which one of the following refers to the Top Level domain name in the URL http://www.ecdl.org?

    • A.

      .org

    • B.

      //www.

    • C.

      Ecdl

    Correct Answer
    A. .org
    Explanation
    The Top Level Domain (TLD) refers to the last part of a domain name, which indicates the type of organization or the country code. In this case, the TLD in the URL http://www.ecdl.org is .org, which typically represents non-profit organizations.

    Rate this question:

  • 3. 

    Which one of the following describes software that is created and distributed for malicious purposes

    • A.

      Freeware.

    • B.

      Vaporware.

    • C.

      Malware

    Correct Answer
    C. Malware
    Explanation
    Malware refers to software that is intentionally created and distributed with malicious intent. Unlike freeware, which is software that is available for free, and vaporware, which refers to software that is announced but never actually released, malware is specifically designed to cause harm, such as stealing personal information, damaging systems, or disrupting normal computer operations.

    Rate this question:

  • 4. 

    Which one of the following statements is true

    • A.

      E-mail cannot transmit images as attachments

    • B.

      E-mail is a low cost way to send and receive messages.

    • C.

      E-mail cannot be infected by computer viruses.

    Correct Answer
    B. E-mail is a low cost way to send and receive messages.
    Explanation
    The given statement that "e-mail is a low cost way to send and receive messages" is true. This is because email allows users to send and receive messages electronically, eliminating the need for traditional mail services. Unlike physical mail, email does not require postage fees or paper costs, making it a cost-effective means of communication. Additionally, email allows for the transmission of messages instantly, saving time and resources compared to traditional mail.

    Rate this question:

  • 5. 

     Which one of the following allows voice communication across the Internet?

    • A.

      VoIP

    • B.

      SMS

    • C.

      VPN

    Correct Answer
    A. VoIP
    Explanation
    VoIP (Voice over Internet Protocol) allows voice communication across the Internet. It is a technology that enables the transmission of voice and multimedia content over IP networks. Unlike traditional telephone systems, which use dedicated lines for voice communication, VoIP converts voice signals into digital data packets and transmits them over the Internet. This allows for cost-effective and efficient communication over long distances, making it popular for both personal and business use. SMS (Short Message Service) is a text messaging service, and VPN (Virtual Private Network) is a secure network connection, neither of which are specifically designed for voice communication.

    Rate this question:

  • 6. 

    What is FTP

    • A.

      Fast Transfer Provision

    • B.

      File Transfer Protocol

    • C.

      File Troubleshoot Principles

    Correct Answer
    B. File Transfer Protocol
    Explanation
    FTP stands for File Transfer Protocol. It is a standard network protocol used to transfer files between a client and a server on a computer network. FTP allows users to upload, download, and manage files on a remote server. It is commonly used by web developers to upload files to a website and by individuals to download files from servers.

    Rate this question:

  • 7. 

    What is a Search Engine

    • A.

      A program that searches for an Internet connection

    • B.

      A program that searches the Internet by key words

    • C.

      A program that searches the processing unit.

    Correct Answer
    B. A program that searches the Internet by key words
    Explanation
    A search engine is a program that searches the Internet by using keywords. It allows users to enter specific words or phrases and retrieves relevant information from the vast amount of data available on the Internet. The search engine uses algorithms to analyze and index web pages, making it easier for users to find the information they are looking for. By entering keywords, users can narrow down their search and receive a list of web pages that are most relevant to their query.

    Rate this question:

  • 8. 

    What is a protected Web site

    • A.

      A Web site that requires a user name and password to protect against access of unauthorized persons.

    • B.

      A Web site with copyright protection

    • C.

      A Web site that provides anti-virus protection

    Correct Answer
    A. A Web site that requires a user name and password to protect against access of unauthorized persons.
    Explanation
    A protected website refers to a website that requires users to enter a username and password in order to access its content. This security measure is implemented to prevent unauthorized individuals from gaining access to the website and its resources. By requiring authentication, the website ensures that only authorized users can view and interact with its content, protecting sensitive information and maintaining privacy.

    Rate this question:

  • 9. 

    Which one of the following is an example of online (virtual) communities

    • A.

      News feed

    • B.

      Podcasts

    • C.

      Chat Rooms

    Correct Answer
    C. Chat Rooms
    Explanation
    Chat rooms are an example of online (virtual) communities because they provide a platform for people with similar interests or goals to connect and interact with each other in real-time. Users can join specific chat rooms based on their preferences and engage in conversations, discussions, and sharing of information. These communities foster a sense of belonging, enable networking opportunities, and facilitate the exchange of ideas and knowledge among participants.

    Rate this question:

  • 10. 

    What is a digital certificate

    • A.

      A verification that a Web site is free from viruses

    • B.

      A verification that authenticates a Web site.

    • C.

      A version number indicating when a Web page was published

    Correct Answer
    B. A verification that authenticates a Web site.
    Explanation
    A digital certificate is a verification method used to authenticate a website. It provides assurance to users that the website they are visiting is legitimate and secure. It verifies the identity of the website and ensures that the communication between the user's browser and the website is encrypted and cannot be intercepted by malicious entities. This helps in establishing trust and confidence in the website, protecting sensitive information and preventing phishing attacks.

    Rate this question:

  • 11. 

     Which one of the following is the most likely to infect your computer with a virus while you are browsing the Internet?

    • A.

      Downloading files from a web site

    • B.

      Refreshing web pages.

    • C.

      Disabling cookies

    • D.

      Installing a firewall

    Correct Answer
    A. Downloading files from a web site
    Explanation
    Downloading files from a web site is the most likely action to infect a computer with a virus while browsing the Internet. When downloading files, there is a risk of unknowingly downloading malicious files that contain viruses or malware. These files can be disguised as legitimate software or documents, tricking the user into downloading and executing them. It is important to be cautious and only download files from trusted sources to minimize the risk of infection.

    Rate this question:

  • 12. 

    Which one of the following best describes the difference between the Cc and Bcc fields

    • A.

      There is no difference between the Cc and Bcc fields

    • B.

      The Cc recipient’s name in a mail message is NOT visible to other recipients of the message

    • C.

      The Bcc recipient’s name in a mail message is visible to other recipients of the message

    Correct Answer
    B. The Cc recipient’s name in a mail message is NOT visible to other recipients of the message
    Explanation
    The Cc field is used to include additional recipients in an email message. However, the names of these recipients are visible to all other recipients of the message. On the other hand, the Bcc field also allows for additional recipients, but their names are not visible to any other recipients. This ensures that the identity of these recipients remains confidential.

    Rate this question:

  • 13. 

    Which one of the following is a commonly used web browser

    • A.

      Windows Internet Explorer

    • B.

      Mozilla Firefox

    • C.

      Google

    • D.

      Yahoo

    Correct Answer
    A. Windows Internet Explorer
    Explanation
    Mozilla Firefox, Google, and Yahoo are all internet companies or search engines, not web browsers. Windows Internet Explorer, on the other hand, is a commonly used web browser. It is developed by Microsoft and has been widely used as the default browser on Windows operating systems for many years.

    Rate this question:

  • 14. 

    Which one of the following parts of the e-mail address [email protected] is known as the top level domain

    • A.

      Com

    • B.

      Gmail

    • C.

      Anybody

    • D.

      @

    Correct Answer
    A. Com
    Explanation
    The top-level domain refers to the last part of an email address, which indicates the type of organization or country associated with the domain. In this case, "com" is the top-level domain of the email address "[email protected]".

    Rate this question:

  • 15. 

    What is a digital signature

    • A.

      An electronic signature used as ID in secure sites

    • B.

      An electronic encryption signature

    • C.

      An electronic signature that is used to validate the identity of the source of a message

    Correct Answer
    C. An electronic signature that is used to validate the identity of the source of a message
    Explanation
    A digital signature is an electronic signature that is used to validate the identity of the source of a message. It provides assurance that the message has not been altered during transmission and that it originated from the claimed sender. This is achieved through the use of cryptographic algorithms that create a unique digital fingerprint for the message, which can be verified by the recipient using the sender's public key.

    Rate this question:

  • 16. 

    Which one of the following is a scheme where criminals send unsolicited e-mail or pop-up messages to get personal and financial information from unsuspecting victims?  

    • A.

      Browsing.

    • B.

      Phishing

    • C.

      Encoding

    • D.

      Blogging

    Correct Answer
    B. pHishing
    Explanation
    Phishing is a scheme where criminals send unsolicited e-mail or pop-up messages to get personal and financial information from unsuspecting victims. This is typically done by impersonating a legitimate organization or individual and tricking the victim into providing sensitive information such as passwords, credit card numbers, or social security numbers. The goal of phishing is to use this information for identity theft, fraud, or other malicious purposes.

    Rate this question:

  • 17. 

    Which of the follwoing is described as interlinked hypertext document used on the Internet

    • A.

      An Intranet

    • B.

      The Internet

    • C.

      The World Wide Web

    • D.

      A Web Browser

    Correct Answer
    C. The World Wide Web
    Explanation
    The World Wide Web is described as an interlinked hypertext document used on the Internet. It is a system of interconnected documents and other resources, linked by hyperlinks and URLs. It allows users to navigate between different web pages and access information from various sources on the Internet. The World Wide Web is a fundamental component of the Internet, but it is not the same as the Internet itself. The Internet is the global network of networks that connects computers worldwide, while the World Wide Web is a service that operates over the Internet, providing access to web pages and other resources.

    Rate this question:

  • 18. 

    What does the https indicate in a URL address

    • A.

      Encrypted transaction of data

    • B.

      Quick transation of data

    • C.

      File Transfer Protocol

    Correct Answer
    A. Encrypted transaction of data
    Explanation
    The "https" in a URL address indicates that the website is using a secure connection, known as HTTPS (Hypertext Transfer Protocol Secure). This means that any data transmitted between the user's browser and the website's server is encrypted, making it difficult for unauthorized parties to intercept and access the information. HTTPS is commonly used for sensitive transactions, such as online banking or shopping, to ensure the privacy and security of the user's data.

    Rate this question:

  • 19. 

    What would cause a problem when sending an email.

    • A.

      Attaching a large file

    • B.

      Attaching an executable file

    • C.

      Sending with out a subject

    Correct Answer
    B. Attaching an executable file
    Explanation
    Attaching an executable file can cause a problem when sending an email because executable files can contain viruses or malware that can harm the recipient's computer or network. Many email providers have strict security measures in place to prevent the transmission of executable files to protect users from potential threats. Therefore, attempting to send an email with an executable file may result in the email being blocked or flagged as suspicious, causing a problem in the delivery of the email.

    Rate this question:

  • 20. 

    What is a Spam

    • A.

      An email server that is overloaded.

    • B.

      Unsolicited email which are sent to a large number of recipients

    • C.

      E-mail message that are infected with viruses

    Correct Answer
    B. Unsolicited email which are sent to a large number of recipients
    Explanation
    Spam refers to unsolicited email that is sent to a large number of recipients. It is typically sent in bulk and often contains advertisements or other unwanted content. The purpose of spam is to reach as many people as possible, without their consent, in order to promote products, services, or scams. Spam emails can be annoying and potentially harmful, as they may contain malware or phishing attempts. Therefore, the correct answer is "Unsolicited email which are sent to a large number of recipients."

    Rate this question:

  • 21. 

    During communication over the internet there is an expression for how users should formulate and express themselves correctly. What is this called

    • A.

      Internet slang

    • B.

      Netiquette

    • C.

      Interlinked

    Correct Answer
    B. Netiquette
    Explanation
    Netiquette refers to the set of rules and guidelines for proper behavior and communication on the internet. It encompasses the appropriate way to express oneself, use language, and interact with others online. Netiquette helps to maintain a respectful and productive online environment, ensuring effective communication and minimizing misunderstandings or conflicts. Internet slang, on the other hand, refers to informal language and abbreviations commonly used on the internet. Interlinked is not a term related to communication etiquette on the internet.

    Rate this question:

  • 22. 

    What is a Cookie

    • A.

      A cookie is a small identifer file placed on the hard disk

    • B.

      A biscuit you can eat

    • C.

      Web Browser

    Correct Answer
    A. A cookie is a small identifer file placed on the hard disk
    Explanation
    A cookie is a small identifier file that is placed on the hard disk. It is used by websites to store information about a user's preferences and browsing activity. This information is then retrieved by the website each time the user visits, allowing for a personalized browsing experience.

    Rate this question:

  • 23. 

    A Cache is

    • A.

      File Transfer

    • B.

      Web Browser

    • C.

      Temporary internet file

    Correct Answer
    C. Temporary internet file
    Explanation
    A cache is a temporary storage location that stores copies of frequently accessed data to improve the speed and efficiency of retrieving that data. In the context of the given options, a cache can be referred to as a temporary internet file. When you browse the internet, your web browser stores certain elements of web pages, such as images and scripts, in a cache on your computer. This allows the browser to load web pages more quickly the next time you visit them, as it can retrieve the stored files from the cache instead of downloading them again from the internet.

    Rate this question:

  • 24. 

    You can not block Pop-Ups

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Pop-up blockers are software or browser settings that prevent pop-up windows from appearing while browsing the internet. Therefore, it is possible to block pop-ups by using these blockers. Hence, the correct answer is False.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 01, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • May 09, 2011
    Quiz Created by
    Jackie_mac
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.