1.
The Internet is controlled by one big computer.
Correct Answer
B. False
Explanation
The statement that the Internet is controlled by one big computer is false. The Internet is a global network of interconnected computers and devices that communicate with each other using a standardized protocol. It is not controlled by a single computer, but rather by a decentralized system of servers, routers, and other network infrastructure. This distributed nature of the Internet allows for redundancy, scalability, and resilience.
2.
An e-mail signature should be at the top of every e-mail.
Correct Answer
B. False
Explanation
An e-mail signature is typically placed at the bottom of an e-mail, not at the top. It is a block of text that is automatically appended to the end of an e-mail message, containing the sender's contact information, job title, company name, or any other relevant information. Placing the signature at the top of the e-mail would disrupt the natural flow of the message and could confuse the recipient. Therefore, the statement that an e-mail signature should be at the top of every e-mail is false.
3.
An example of a search engine is Internet Explorer.
Correct Answer
B. False
Explanation
Internet Explorer is not an example of a search engine. It is a web browser developed by Microsoft. A search engine is a software program that searches a database of internet sites based on keywords or phrases entered by the user, providing a list of websites that match the search criteria. Some examples of search engines include Google, Bing, and Yahoo.
4.
Attaching a file to an e-mail converts it to a universally readable format.
Correct Answer
B. False
Explanation
Attaching a file to an email does not convert it to a universally readable format. The file format remains the same, and the recipient of the email must have the necessary software or application to open and view the attached file. The file format may be compatible with many different devices and operating systems, but it is not automatically converted to a universally readable format.
5.
Your files are stored on the school’s intranet.
Correct Answer
A. True
Explanation
The explanation for the given correct answer is that the files are stored on the school's intranet. Intranet refers to a private network that is only accessible to authorized users within an organization, such as a school. Therefore, if the answer is true, it means that the files are stored within the school's network and can only be accessed by individuals who have the necessary permissions and are connected to the intranet.
6.
ISP is an abbreviation for Internet Spam Protector.
Correct Answer
B. False
Explanation
The statement is incorrect. ISP stands for Internet Service Provider, not Internet Spam Protector. Internet Service Providers are companies that provide internet access to users.
7.
Etiquette refers to expectations or rules for interaction.
Correct Answer
A. True
Explanation
Etiquette is a set of social norms and expectations that dictate appropriate behavior in social interactions. It includes rules and guidelines for how to behave politely and respectfully in different situations. These expectations can vary across cultures and contexts, but they generally serve to promote harmonious and considerate interactions among individuals. Therefore, it is true that etiquette refers to expectations or rules for interaction.
8.
You should use abbreviations and emoticons to express your feelings when emailing your teachers.
Correct Answer
B. False
Explanation
Using abbreviations and emoticons in emails to teachers is generally considered unprofessional and disrespectful. It is important to maintain a formal tone and proper language when communicating with teachers, as it shows respect for their position and expertise. Using proper grammar, spelling, and punctuation helps to convey professionalism and ensures clear communication. Therefore, the correct answer is false.
9.
Which of the following is not an e-mail etiquette guideline you should follow when communicating with a co-worker:
Correct Answer
C. Abbreviate long words
Explanation
Abbreviating long words is not an e-mail etiquette guideline that should be followed when communicating with a co-worker. It is important to use clear and concise language in professional communication to ensure that the message is easily understood. Abbreviating long words can lead to confusion or misinterpretation of the message. Therefore, it is best to avoid using abbreviations and instead use complete words and phrases to maintain professionalism and clarity in e-mail communication with co-workers.
10.
The “Computing in the Cloud” means you should:
Correct Answer
B. Read the User Agreement
Explanation
The correct answer is "Read the User Agreement". This is because when it comes to "Computing in the Cloud," it is important to read the user agreement. The user agreement outlines the terms and conditions, privacy policies, and other important information regarding the cloud computing service. By reading the user agreement, users can understand their rights and responsibilities, as well as any potential risks or limitations associated with the service. It is crucial to be informed and aware of the user agreement before using any cloud computing service.
11.
Which of the following is an example of an URL?
Correct Answer
A. Www.google.com
Explanation
An URL (Uniform Resource Locator) is a specific web address that is used to locate and access resources on the internet. In this case, www.google.com is an example of an URL because it follows the typical format of a web address, with "www" representing the World Wide Web, "google" being the domain name, and ".com" indicating the top-level domain.
12.
What can you do to search for an exact phrase on the Internet using a search engine?
Correct Answer
C. Place quotes around the phrase.
Explanation
To search for an exact phrase on the Internet using a search engine, you should place quotes around the phrase. This will tell the search engine to only show results that include the exact phrase, rather than individual words or variations of the phrase.
13.
What is an example of an email client?
Correct Answer
B. Outlook on your desktop
Explanation
An example of an email client is Outlook on your desktop. Outlook is a popular email client developed by Microsoft that allows users to send, receive, and manage their email messages. It provides features such as organizing emails into folders, creating rules for automatic email sorting, and integrating with calendars and contacts. Outlook can be installed on a computer and accessed offline, making it a convenient option for individuals who prefer desktop email management.
14.
Someone may try to steal your identity by ___________________ for private information.
Correct Answer
Phishing
Explanation
Phishing is a method used by someone to steal personal and sensitive information by posing as a trustworthy entity or organization. They typically send fraudulent emails or create fake websites that appear legitimate, tricking individuals into providing their private information such as passwords, credit card numbers, or social security numbers. This allows the attacker to assume the victim's identity and potentially engage in fraudulent activities using their personal information.
15.
Adobe Reader is on almost all computers and can read ____ documents (filename extension).
Correct Answer
PDF
Explanation
Adobe Reader is a widely used software that allows users to view and interact with PDF documents. The question is asking for the file extension that Adobe Reader can read, and the correct answer is PDF. PDF (Portable Document Format) is a file format that preserves the formatting and layout of a document, regardless of the software or hardware used to view it. Adobe Reader is specifically designed to open and display PDF files, making it the appropriate software for this purpose.
16.
When using a website for research you should first evaluate_____________ authored it.
Correct Answer
who
Explanation
When using a website for research, it is important to first evaluate who authored it. This is because knowing the author provides credibility and helps determine the reliability of the information presented on the website. Understanding the author's qualifications, expertise, and potential biases can help assess the accuracy and trustworthiness of the content.
17.
The program you use to capture a picture of your screen is the __________ Tool.
Correct Answer
Snipping
Explanation
The program used to capture a picture of your screen is called the Snipping Tool.
18.
The Internet address of a website is the__________
Correct Answer
URL
Explanation
The Internet address of a website is referred to as the URL, which stands for Uniform Resource Locator. A URL is a unique string of characters that identifies the location of a specific webpage or resource on the internet. It typically consists of the protocol (such as HTTP or HTTPS), the domain name, and the specific path to the webpage or resource. The URL allows users to access and navigate to different websites and webpages on the internet.