1.
In the address [email protected] what does the anesbit part represent?
Correct Answer
A. Username
ExplanationThe anesbit part in the email address
[email protected] represents the username. The username is the unique identifier of an individual or entity within a system or network. In this case, anesbit is the specific username for the email address.
2.
Which on these is NOT a true statement about e-mail?
Correct Answer
D. D. Messages can only be sent to people using the same host
Explanation
The statement "Messages can only be sent to people using the same host" is not a true statement about email. Email allows messages to be sent to recipients using different hosts or email providers.
3.
Internet sites store data on your local computer. These are called…..?
Correct Answer
C. C. Cookies
Explanation
Internet sites store data on your local computer in the form of cookies. Cookies are small files that contain information about your browsing activity and preferences. They are stored on your computer by websites you visit and are used to personalize your browsing experience, remember login credentials, and track your online behavior.
4.
Web pages can be bookmarked. Why might you want to do this?
Correct Answer
C. C. To make it easier to access the pages at a later date
Explanation
Bookmarking web pages allows users to easily access those pages at a later date. By bookmarking a page, users can quickly navigate back to it without having to remember or search for the URL. This is especially useful for frequently visited or important pages that users want to have quick and convenient access to.
5.
Which is the best way of finding information on the World Wide Web about specific subjects?
Correct Answer
D. D. Type keywords into a search engine
Explanation
The best way of finding information on the World Wide Web about specific subjects is to type keywords into a search engine. This is because search engines are designed to crawl and index web pages, making it easier to find relevant information based on the keywords entered. By typing in specific keywords related to the subject you are interested in, the search engine will provide a list of websites and resources that are most likely to contain the information you are looking for.
6.
The software used to access information on the World Wide Web is…..?
Correct Answer
A. A. A browser
Explanation
A browser is the software used to access information on the World Wide Web. It allows users to view web pages, navigate through websites, and interact with online content. Browsers such as Google Chrome, Mozilla Firefox, and Safari are commonly used to access the internet and browse websites. They provide a graphical user interface (GUI) that allows users to easily navigate and interact with web-based content. Unlike an office application or an operating system, a browser specifically focuses on accessing and displaying web-based information.
7.
The Internet is…..?
Correct Answer
B. B. A global network of interconnected computers
Explanation
The correct answer is B. A global network of interconnected computers. The Internet is a vast network that connects millions of computers and devices worldwide, allowing them to communicate and share information. It is not limited to just the World Wide Web or a specific protocol or operating system, but rather encompasses all of these elements and more.
8.
How is multimedia information stored on the Internet displayed on your computer?
Correct Answer
A. A. Via the World Wide Web
Explanation
Multimedia information stored on the Internet is displayed on your computer via the World Wide Web. The World Wide Web is a system of interconnected documents and other resources, linked by hyperlinks and URLs. When you access a website or webpage that contains multimedia content, such as images, videos, or audio files, the web browser retrieves and displays this content from the Internet. The World Wide Web acts as the medium through which multimedia information is accessed and displayed on your computer.
9.
The software used to access information on the Internet is …?
Correct Answer
A. A. A browser
Explanation
A browser is the software used to access information on the Internet. It allows users to view web pages, download files, and interact with online content. Browsers such as Google Chrome, Mozilla Firefox, and Safari provide a graphical user interface (GUI) that enables users to navigate the Internet and access various websites. While an office application is used for tasks such as creating documents and spreadsheets, and an operating system manages computer hardware and software, neither of these options specifically relate to accessing information on the Internet. Therefore, the correct answer is A. A browser.
10.
Where is information that you view on the Internet stored on your computer?
Correct Answer
A. A. In the History
Explanation
When you view information on the Internet, it is stored in your computer's browser history. The browser history keeps a record of all the websites you have visited, including the web pages, images, and other content that you have accessed. This allows you to easily revisit previously viewed websites by accessing your browsing history.
11.
In the address [email protected] what does the de part represent?
Correct Answer
D. D. Domain name
ExplanationThe "de" part in the email address
[email protected] represents the domain name. The domain name is the part of the email address that follows the "@" symbol and indicates the organization or entity that the email address belongs to. In this case, "co.de" is the domain name, indicating that the email address belongs to the organization or entity with the domain "co.de".
12.
Which of these is NOT a true statement about e-mail?
Correct Answer
D. D. You can attach an electronic signature to your messages.
Explanation
Email is a widely used communication method that allows users to send messages to anyone in the world and can be used to send messages to groups of people. Additionally, viruses can be distributed as email attachments. However, the statement that is not true about email is that you can attach an electronic signature to your messages.
13.
Which one of the following is a program used to view HTML documents on the World Wide Web?
Correct Answer
C. C. A browser
Explanation
A browser is a program used to view HTML documents on the World Wide Web. It allows users to navigate through different web pages, access various websites, and display the content of these pages in a readable format. Browsers interpret the HTML code and render it as a visual webpage, including text, images, links, and other elements. They also provide additional features such as bookmarking, tabbed browsing, and security settings to enhance the user's browsing experience.
14.
Which one of the following is a digital certificate?
Correct Answer
D. D. A program that provides an assurance that software downloaded from the Internet comes from a trustworthy source.
Explanation
A digital certificate is a program that provides assurance that software downloaded from the Internet comes from a trustworthy source. This means that the certificate verifies the authenticity and integrity of the software, ensuring that it has not been tampered with or modified by unauthorized parties. This is important for security purposes, as it helps users to trust and safely use the downloaded software without the risk of malware or other malicious activities.
15.
Which one of the following is an advantage of e-mail?
Correct Answer
B. B. E-mail is a low cost way to send messages worldwide.
Explanation
E-mail is a low cost way to send messages worldwide because it does not require physical postage or delivery fees. Additionally, e-mail allows for instant communication, eliminating the need for waiting for traditional mail to be delivered. This makes it a convenient and cost-effective option for sending messages to recipients around the world.
16.
A Chat Room is an example of which one of the following?
Correct Answer
D. D. An online virtual community.
Explanation
A chat room is an example of an online virtual community because it is a platform where people can connect and communicate with each other in real-time. It allows individuals to join specific chat rooms based on their interests or topics of discussion, creating a sense of community among participants. Unlike a voice over internet protocol (VoIP), which is a technology used for making voice calls over the internet, a podcast, which is a digital audio or video file that can be downloaded and listened to offline, or phishing, which is a fraudulent attempt to obtain sensitive information, a chat room primarily focuses on facilitating online interactions and fostering a sense of community among its users.
17.
Which one of the following describes Malware?
Correct Answer
B. B. Software that is created and distributed for harmful purposes
Explanation
Malware refers to software that is created and distributed for harmful purposes. It is designed to disrupt, damage, or gain unauthorized access to computer systems or networks. Malware includes various types such as viruses, worms, Trojans, ransomware, spyware, and adware. Its primary objective is to exploit vulnerabilities in a system and compromise its security, often resulting in data theft, financial loss, or system malfunction. Therefore, option B accurately describes the nature of malware.
18.
What is encryption and why is it used?
Correct Answer
D. D. Encoding of data to prevent unauthorized access to data
Explanation
Encryption is the process of encoding data in such a way that only authorized parties can access and understand it. It is used to prevent unauthorized access to sensitive information, such as personal data, financial records, or classified documents. By encrypting data, it becomes unreadable to anyone who does not possess the appropriate decryption key, making it significantly more difficult for hackers or unauthorized individuals to gain access to the data. Encryption is an essential security measure in today's digital age, helping to protect sensitive information and maintain privacy.
19.
How do you change your Web browser's home page?
Correct Answer
D. D. Use menu options to set the current page as the home page
Explanation
To change your Web browser's home page, you can use menu options to set the current page as the home page. This means that within the browser's settings or preferences, there is an option to select the current page you are on and set it as the default home page. This allows you to quickly access your desired page whenever you open your browser.
20.
Which one of the following is the process of encoding data to prevent unauthorised access, especially during transmission?
Correct Answer
C. C. Encryption
Explanation
Encryption is the process of encoding data to prevent unauthorized access, especially during transmission. It involves converting plaintext into ciphertext using an encryption algorithm and a key. This ensures that even if the data is intercepted, it cannot be understood without the proper decryption key. Encryption is commonly used to secure sensitive information such as personal data, financial transactions, and confidential communications.
21.
Which one of the following is the best method to ensure access to an network is secure?
Correct Answer
A. A. The network requires a user name and password
Explanation
The best method to ensure access to a network is secure is by requiring a user name and password. This method adds an extra layer of security by verifying the identity of the user before granting access to the network. It helps prevent unauthorized access and protects sensitive information from being accessed by unauthorized individuals.
22.
Which one of the following actions could lead to a computer being infected with a virus?
Correct Answer
D. D. Opening an executable file that is attached to an email message
Explanation
Opening an executable file that is attached to an email message can lead to a computer being infected with a virus. Executable files can contain malicious code that can harm the computer system when executed. It is important to exercise caution when opening attachments from unknown or suspicious sources to avoid the risk of virus infection.
23.
Which three-letter suffix in an email address identifies an organization as non-commercial?
Correct Answer
B. B. Org
Explanation
The three-letter suffix "org" in an email address identifies an organization as non-commercial. This suffix is commonly used by non-profit organizations, charities, and other non-commercial entities to differentiate themselves from commercial businesses. It is short for "organization" and signifies that the entity is not primarily engaged in commercial activities or profit-making ventures.
24.
Which one of the following best describes the difference between the Cc and Bcc fields?
Correct Answer
B. B. the Bcc recipient’s name in a mail message is NOT visible to other recipients of the message.
Explanation
The correct answer is B. the Bcc recipient's name in a mail message is NOT visible to other recipients of the message. In email communication, the Cc (Carbon Copy) field is used to include additional recipients who are not the primary recipients of the message. The names of the Cc recipients are visible to all other recipients of the message. On the other hand, the Bcc (Blind Carbon Copy) field is used to add recipients without their names being visible to other recipients. This allows for a more discreet and private communication.
25.
Which one of the following is an example of an online (virtual) community?
Correct Answer
B. B. Chat Room
Explanation
A chat room is an example of an online (virtual) community because it is a platform where individuals can interact and communicate with each other in real-time. In a chat room, people can join discussions, share information, and form connections with others who have similar interests or goals. It provides a space for community building and fostering relationships, making it a prime example of an online community.
26.
Which one of the following gives you the ability to know if a desired contact is online?
Correct Answer
C. C. Instant messaging (IM).
Explanation
Instant messaging (IM) is a communication tool that allows users to send and receive messages in real-time. One of the features of instant messaging is the ability to see if a desired contact is online. This is typically indicated by a status icon or indicator next to the contact's name, which shows whether they are currently active and available for communication. Therefore, choosing instant messaging as the correct answer makes sense as it directly addresses the ability to know if a desired contact is online.
27.
In a web address identified by geographical area how many letters would a country code contain?
Correct Answer
B. B. 2
Explanation
A country code in a web address typically contains two letters. Country codes are used to identify the geographical area associated with a specific website. Examples of country codes include "us" for the United States, "uk" for the United Kingdom, and "ca" for Canada. These two-letter codes are based on the ISO 3166-1 alpha-2 standard, which assigns a unique code to each country or territory. Therefore, the correct answer is B. 2.
28.
Which one of the following actions would help to prevent children from accessing harmful content on the internet?
Correct Answer
B. B. Supervise computer usage sessions
Explanation
Supervising computer usage sessions would help prevent children from accessing harmful content on the internet because it allows parents or guardians to monitor and control what the children are doing online. By supervising, they can ensure that the children are not accessing inappropriate websites or engaging in risky online behavior. It provides an opportunity for adults to guide and educate children about internet safety, helping to protect them from potential online dangers.
29.
Which one of the following is a scheme where criminals send unsolicited e-mails or pop-up messages to get personal and financial information from unsuspecting victims?
Correct Answer
C. C. pHishing
Explanation
Phishing is a scheme where criminals send unsolicited e-mails or pop-up messages to deceive unsuspecting victims into providing personal and financial information. This information is then used for fraudulent purposes, such as identity theft or financial scams. Phishing attacks typically mimic legitimate organizations or websites, tricking individuals into believing that they are providing their information to a trusted source. This can lead to significant financial loss and compromise of sensitive data.
30.
Which of the following activities could be subject to fraud when purchasing goods over the internet?
Correct Answer
A. A. Entering your credit card details on an electronic form
Explanation
Entering your credit card details on an electronic form could be subject to fraud when purchasing goods over the internet. This is because when you enter your credit card information on an electronic form, there is a risk that the information could be intercepted or stolen by hackers or fraudsters. They could then use your credit card details to make unauthorized purchases or engage in identity theft. It is important to be cautious and ensure that you are entering your credit card details on secure websites to minimize the risk of fraud.
31.
Which one of the following statements about world wide web is true?
Correct Answer
C. C. The world wide web includes the use of hypertext to connect related web documents
Explanation
The correct answer is C. The world wide web includes the use of hypertext to connect related web documents. This statement is true because the world wide web is a system of interconnected documents and other resources, linked by hyperlinks and URLs. Hypertext is the technology that allows these links to be created, allowing users to navigate between different web pages and access related information.
32.
Malicious programs which attach themselves or inserts inside legitimate files are called?
Correct Answer
B. B. Viruses
Explanation
Malicious programs that attach themselves or insert inside legitimate files are commonly known as viruses. Viruses are designed to replicate and spread by infecting other files or programs. They can cause damage to computer systems, steal information, or disrupt normal operations. Home pages, hyperlinks, and cookies are not typically associated with malicious programs that attach themselves to legitimate files.