1.
What is spam?
Correct Answer
B. Unwanted or unsolicited electronic messages
Explanation
Spam refers to unwanted or unsolicited electronic messages. These messages are typically sent in bulk to a large number of recipients without their consent. Spam can include various types of content such as advertisements, scams, phishing attempts, or malicious links. It is considered a nuisance and can clog up email inboxes, consume storage space, and potentially contain harmful content.
2.
The act of disguising a website as a legitimate one in order to gain access to personally identifiable information (PII) is known as _____.
Correct Answer
A. pHarming
Explanation
Pharming is the act of disguising a website as a legitimate one in order to gain access to personally identifiable information (PII). It is a form of online fraud where attackers redirect users to a fake website that looks identical to the original, tricking them into entering their sensitive information. Unlike phishing, which relies on luring victims through deceptive emails or messages, pharming directly redirects users to a fraudulent website without their knowledge or consent. This technique is used to steal personal data such as usernames, passwords, credit card details, and more.
3.
Mel receives and e-mail allegedly from his mobile phone service provider. It has the company logo prominently featured at the top of the communication and states that the company is updating all client records. Mel is asked to re-submit his account information including name, address, home phone number and the credit card number tied to his account for billing purposes. This could be an example of _______
Correct Answer
C. pHishing, and Mel should promptly delete the message.
Explanation
The given scenario is an example of phishing, where an attacker impersonates a legitimate company to trick individuals into providing their personal and financial information. The email asks Mel to submit sensitive details like his credit card number, which is a common tactic used by phishers. To protect himself from potential fraud or identity theft, Mel should promptly delete the message and not respond or provide any information.
4.
Sending insulting messages across peer-to-peer networks is an example of _______
Correct Answer
A. Flaming
Explanation
Flaming refers to the act of sending insulting or aggressive messages over the internet, often in online communities or through peer-to-peer networks. This behavior is characterized by the intention to provoke or offend others, typically resulting in heated arguments or conflicts. It is a form of cyberbullying or harassment that aims to create a hostile environment and negatively impact the targeted individuals.
5.
This sophisticated piece of software tracks what users are typing on a website.
Correct Answer
C. Beacon
Explanation
A beacon is a small piece of code embedded in a website that allows tracking of user activity, such as what they are typing. It is a sophisticated tool used to monitor user behavior and collect data. Unlike flash cookies, trackers, or third-party monitors, a beacon specifically focuses on tracking user input on a website.
6.
An IP or internet protocol address is an example of ______________
Correct Answer
A. Non PII
Explanation
An IP address is an example of non PII (Personally Identifiable Information) because it does not directly identify an individual. It is a unique numerical label assigned to each device connected to a computer network. While it can be used to determine the general location of a device, it does not reveal specific personal information about the user. Therefore, an IP address is considered non PII.
7.
You can optimize your search results on the Web by ____
Correct Answer
D. All of the above.
Explanation
The correct answer is "all of the above." By using reliable resources such as EBSCO and recognized news sites, you can ensure that the information you find is accurate and trustworthy. Additionally, using several different types of search engines can help you access a wider range of information and perspectives. Finally, sticking to your topic and avoiding distractions allows you to focus on the most relevant search results. Therefore, by doing all of these things, you can optimize your search results on the web.
8.
Which of the following statements about meta-search engines is NOT true?
Correct Answer
B. Meta-search engines are a waste of time becasue they provide very few results.
Explanation
Meta-search engines are not a waste of time because they provide very few results. In fact, meta-search engines can be beneficial as they scan multiple search engine databases and provide results based on the keyword(s) submitted. While they can save time by aggregating results from various search engines, it is not advisable to rely on them exclusively as they may not cover all search engines or provide comprehensive results.
9.
Which of the following is an example of an accurately constructed Boolean search string?
Correct Answer
B. Internet AND marketing
Explanation
The correct answer is "internet AND marketing" because it uses the Boolean operator "AND" to combine the two search terms "internet" and "marketing". This means that the search results will only include pages that contain both of these terms, narrowing down the search and making it more specific.
10.
Flash cookies serve the following purpose:
Correct Answer
D. All of the above
Explanation
Flash cookies serve all of the above purposes. They can remember preferences such as volume settings for videos, allowing a personalized experience for users. They also enable users to watch videos on sites that use Adobe Flash. Additionally, flash cookies can track users' activities online, which can be used for targeted advertising.
11.
Explain the similarities and differences between "Favorites" and "Social Bookmarking" sites. (NOTE: This constructed response will be scored separately.)
12.
RSS provides an efficient way for an internet user to ______________
Correct Answer
B. Use a "reader" to review information compiled from a number of sources based on pre-selected preferences.
Explanation
RSS provides an efficient way for an internet user to use a "reader" to review information compiled from a number of sources based on pre-selected preferences. This means that instead of visiting multiple websites individually to check for updates, the user can subscribe to RSS feeds from their favorite websites and have the content delivered to their reader. The reader collects and displays the latest updates from all the subscribed sources in one place, making it easier for the user to stay updated with the latest information without the need for manual checking.