1.
The Internet is just made up of many other networks all interacting together.
Correct Answer
A. True
Explanation
The Internet is indeed composed of numerous interconnected networks. These networks, which can be of various sizes and types, are linked together through a system of routers and switches. This interconnected structure allows for the transmission of data and communication between devices and users across the globe. Each network contributes to the overall functioning of the Internet, making it a vast and interconnected web of networks. Therefore, the statement "The Internet is just made up of many other networks all interacting together" is true.
2.
The purpose of a web browser is what?
Correct Answer
A. To do internet searches.
Explanation
The purpose of a web browser is not solely to do internet searches. While internet searches are a common activity performed using a web browser, the primary purpose of a web browser is to display web pages from websites. It allows users to access and navigate through different websites, view content, interact with web applications, and perform various tasks online.
3.
What does ISP stand for?
Correct Answer
A. Internet Service Provider
Explanation
ISP stands for Internet Service Provider. An ISP is a company that provides internet access to individuals, businesses, and other organizations. They offer various types of internet connections, such as broadband, DSL, or fiber optic, and typically charge a monthly fee for their services. ISPs play a crucial role in connecting users to the internet by providing the necessary infrastructure and network services. They also offer additional services like email accounts, web hosting, and virtual private networks (VPNs) to enhance the internet experience for their customers.
4.
A group of related web pages form
Correct Answer
C. Website
Explanation
A group of related web pages form a website. A website is a collection of interconnected web pages that are hosted on a server and can be accessed by users through a web browser. It typically includes a home page, which serves as the main entry point to the website and provides links to other pages within the site. The term "website" is commonly used to refer to a complete online presence, including all the web pages, images, multimedia, and other content associated with a particular domain or URL.
5.
The Internet and World Wide Web is really the same thing
Correct Answer
B. False
Explanation
The statement "The Internet and World Wide Web is really the same thing" is false. While the terms are often used interchangeably, they refer to different concepts. The Internet is a global network of interconnected computers that allows for the transfer of data and information. On the other hand, the World Wide Web is a system of interconnected documents and resources, accessed through the Internet, using specific protocols such as HTTP. The Internet is the infrastructure that enables the World Wide Web to exist.
6.
What is the language used to build web pages?
Correct Answer
C. Html
Explanation
HTML (Hypertext Markup Language) is the language used to build web pages. It is the standard markup language for creating the structure and presentation of web content. HTML uses a set of tags to define the elements and layout of a webpage, including headings, paragraphs, images, links, and more. It is the backbone of every web page and is interpreted by web browsers to display the content to users.
7.
Which of the
following is considered a Directory/Index Internet search engine?
Correct Answer
B. Yahoo
Explanation
Yahoo is considered a Directory/Index Internet search engine because it organizes websites into categories and subcategories, making it easier for users to navigate and find specific information. Unlike traditional search engines like Google, Yahoo relies on human editors to review and categorize websites, creating a curated directory of resources. This directory-based approach allows for a more structured and organized search experience, particularly for users looking for specific topics or industries.
8.
Which of the
following Top Level Domain is considered the MOST credible?
Correct Answer
D. .edu
Explanation
The .edu top-level domain is considered the most credible because it is exclusively used by educational institutions such as universities and colleges. This domain extension is regulated by the United States Department of Commerce and is only granted to institutions that meet specific criteria, ensuring that the websites under .edu are trustworthy and reliable sources of educational information.
9.
Online fights using electronic messages with angry and vulgar language is called what?
Correct Answer
C. Flaming
Explanation
Flaming refers to the act of engaging in online fights using angry and vulgar language. It involves the use of aggressive and offensive comments to attack or insult others in a digital environment. This behavior is often seen in online forums, social media platforms, or chat rooms where individuals express their anger or frustration through inflammatory language. Cyberbullying, on the other hand, refers to the deliberate and repeated harassment or intimidation of others online, which can include flaming as one of its tactics. Impersonation, however, is unrelated to the given question and refers to pretending to be someone else online.
10.
Which one should you never do in a cyberbullying situation?
Correct Answer
C. Respond to the messages in an angry way
Explanation
In a cyberbullying situation, responding to the messages in an angry way is not recommended. Reacting angrily can escalate the situation and provide the bully with the satisfaction they seek. It may also lead to further harassment and negative consequences for the victim. Instead, it is important to remain calm and composed, block harmful messages, and seek help from a responsible adult who can provide guidance and support in dealing with the situation effectively.
11.
Which screenname is the most dangerous for a child to have?
Correct Answer
C. Dave93_CA
Explanation
Dave93_CA is the most dangerous screenname for a child to have because it includes personal information (Dave's name and location) which can make it easier for predators to track and target the child. The inclusion of "CA" also indicates the location, further narrowing down the child's whereabouts. This screenname provides more identifiable information compared to the other options, making it riskier for a child's online safety.
12.
What is the use of information and
communication technologies to support deliberate, repeated, and hostile
behavior by an individual or group, that is intended to harm others?
Correct Answer
B. Cyberbullying
Explanation
Cyberbullying refers to the use of information and communication technologies to intentionally harm others through repeated and hostile behavior. This can include sending threatening messages, spreading rumors, or sharing embarrassing photos or videos online. It is a form of harassment that occurs in the digital space, often targeting individuals or groups with the intention of causing emotional distress and harm. Cyberbullying can have severe psychological and emotional consequences for the victims, making it a serious issue that needs to be addressed.
13.
All of the following are forms of technology used to cyberbully except:
Correct Answer
D. Television
Explanation
Television is not a form of technology used to cyberbully. Cyberbullying refers to the use of electronic communication platforms such as emails, instant messaging, and web pages to harass or intimidate others. While television can be used to spread harmful content or messages, it is not considered a direct form of cyberbullying as it does not involve the use of electronic communication platforms.
14.
What technology do teens use the most for cyberbullying?
Correct Answer
C. Instant Messages
Explanation
Teens use instant messages the most for cyberbullying because it provides them with a quick and direct way to communicate with their peers. Instant messaging platforms allow for real-time conversations, making it easier for bullies to send hurtful messages, spread rumors, or engage in other forms of online harassment. Additionally, instant messages can be easily shared and forwarded, amplifying the impact of cyberbullying incidents.
15.
To be safer, what should you do if you post pictures online?
Correct Answer
B. Blur the pictures
Explanation
To be safer when posting pictures online, it is advisable to blur the pictures. Blurring the pictures helps to protect your privacy and prevent any potential misuse of the images. By blurring the pictures, you can make it more difficult for others to identify you or any other individuals in the photos, reducing the risk of unauthorized use or potential harm. This precautionary measure adds an extra layer of security and safeguards your personal information.
16.
What is the safest things to do in public chatrooms?
Correct Answer
C. Block any unknown people that talk to you
Explanation
Blocking any unknown people that talk to you is the safest thing to do in public chatrooms. This helps to protect your personal information and ensures that you only interact with people you trust. By blocking unknown individuals, you can avoid potential scams, cyberbullying, and other online threats. It is important to maintain a level of caution and privacy when engaging in public chatrooms to ensure your safety and security.
17.
What is one of the problems that makes cyberbullying easy?
Correct Answer
A. Computers are in a teen's private room which keeps their parents from seeing the problem
Explanation
One of the problems that makes cyberbullying easy is the fact that computers are often located in a teen's private room, which keeps their parents from seeing the problem. This lack of parental supervision allows cyberbullying to occur without immediate intervention or awareness from adults.
18.
Schools and businesses most often connect to the Internet through a ___________.
Correct Answer
B. LAN (Local Area Network)
Explanation
Schools and businesses typically connect to the Internet through a LAN (Local Area Network). A LAN is a network that connects computers and devices within a limited area, such as a school or office building. It allows for the sharing of resources, such as printers and files, and provides a secure and efficient way for users to access the Internet. A LAN is usually connected to the Internet through a router, which acts as a gateway between the LAN and the Internet. The other options, such as a firewall, Internet Service Provider, and World Wide Web, are not the primary means by which schools and businesses connect to the Internet.
19.
All computers are identified with a 4 digit number separated by periods. This is called
Correct Answer
C. Ip address
Explanation
Computers are identified with a 4 digit number separated by periods, which is referred to as an IP address. The IP address is a unique numerical label assigned to each device connected to a computer network. It serves as an identifier for locating and communicating with devices on the network. Domain names, on the other hand, are user-friendly names used to identify websites, while host names refer to the name assigned to a specific device or host on a network. However, the given question specifically asks about the 4 digit number separated by periods, which is the IP address.
20.
Which of the following domains is LEAST reliable?
Correct Answer
B. .net
Explanation
The .net domain is generally considered to be the least reliable among the given options. This is because .net domains are commonly associated with network infrastructure and service providers, making them more susceptible to potential security vulnerabilities and unreliable hosting services compared to the other options.
21.
The .com domain web sites are
Correct Answer
B. Business or other mixed sites.
Explanation
The .com domain is primarily used for commercial purposes, such as businesses or mixed sites that offer products or services. This domain is commonly associated with e-commerce and online businesses. Government institutions usually have their own specific domain extensions, such as .gov, while non-profit institutions and education institutions often use .org or .edu respectively. Therefore, the correct answer is business or other mixed sites.
22.
The .org domains
Correct Answer
D. Must be evaluated well because this domain contains both very reputable non-profit organization web sites and advocacy groups with hidden agendas
Explanation
The correct answer is that .org domains must be evaluated well because this domain contains both very reputable non-profit organization web sites and advocacy groups with hidden agendas. This means that not all .org websites are reliable and trustworthy, as there are both reputable non-profit organizations and advocacy groups with hidden agendas operating within this domain. Therefore, it is important to thoroughly evaluate the content and credibility of a .org website before considering the information provided as reliable.
23.
If the web site has an author and looks professional
Correct Answer
C. You should research the author, look at the domain, check the links, check for errors, look for bias, etc.
Explanation
The answer suggests that if a website has an author and looks professional, it is important to conduct further research. This includes investigating the author, examining the domain, checking the links, looking for errors, and assessing for any potential bias. This is necessary to ensure the credibility and reliability of the information presented on the website.
24.
Which of the following are considered a meta search engine?
Correct Answer
A. Dogpile
Explanation
Dogpile is considered a meta search engine because it gathers results from multiple search engines and displays them in one consolidated list. It does not have its own database of indexed web pages, but instead retrieves results from other search engines like Google, Yahoo, and Bing. This allows users to compare and analyze results from different search engines in one place, making it a meta search engine. Yahoo and Google, on the other hand, are not meta search engines as they have their own search algorithms and databases.
25.
All of the following are BOOLEAN operators used in Google EXCEPT
Correct Answer
A. But
Explanation
The given correct answer is "But". In the context of Google, "But" is not a BOOLEAN operator. The other options listed (And, Or, and And Not) are all valid BOOLEAN operators used in Google. These operators are used to refine search queries and retrieve more accurate and relevant search results.
26.
The language of the Internet, allowing cross-network communication
Correct Answer
A. TCP/IP
Explanation
TCP/IP is the correct answer because it is the language of the Internet that allows cross-network communication. TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a set of protocols used for communication between devices on the Internet. It provides a standardized method for sending and receiving data packets across different networks, ensuring reliable and efficient communication. TCP/IP is essential for the functioning of the Internet and enables devices to connect and communicate with each other regardless of their specific network configurations.
27.
Web entry station that offer quick and easy access to a variety of general- interest links
Correct Answer
A. Portals
Explanation
A web entry station refers to a website that serves as a starting point for users to access a wide range of general-interest links. These links can lead to various types of portals, including consumer portals, corporate portals, and vertical portals. Portals are websites that provide centralized access to information, services, and resources related to a specific topic or industry. Therefore, the given answer "portals" is correct as it encompasses all the mentioned types of portals that can be accessed through a web entry station.
28.
That part of the web that standard search engines don't access is referred to as
Correct Answer
C. Invisible Web
Explanation
The correct answer is "Invisible Web." The term "Invisible Web" refers to the part of the web that cannot be accessed by standard search engines. This includes content that is not indexed or linked to by other websites, such as dynamically generated pages, password-protected content, and unlinked databases. The Invisible Web is estimated to be much larger than the surface web that search engines can access, making it a significant component of the overall web.
29.
Unsolicited emails are called
Correct Answer
A. Spams
Explanation
Unsolicited emails are commonly referred to as "spams". These are unwanted and often promotional or advertising messages that are sent to a large number of recipients without their consent. These emails are often sent in bulk and can be a nuisance to recipients, as they clutter their inbox and can potentially contain malicious content or phishing attempts. Therefore, the correct answer is "Spams".
30.
Doing a Search on the Internet using the Boolean Operator of "OR" will find all websites that
Correct Answer
B. Contain one or the other keywords
Explanation
When conducting a search on the Internet using the Boolean Operator "OR," the search results will include websites that contain either one or the other keywords. This means that the search results will include websites that have at least one of the keywords used in the search query.