1.
A network can be very small, but it must consist of at least ______
Correct Answer
B. Two computers
Explanation
A network can be very small, but it must consist of at least two computers. This is because a network is a collection of interconnected devices that can communicate with each other and share resources. In order for communication and resource sharing to occur, there must be at least two devices present. Therefore, having only one computer would not meet the minimum requirement for a network.
2.
What type of network is formed when computers are connected with one server computer
sharing its resources with multiple computers?
Correct Answer
A. Client/server
Explanation
When computers are connected with one server computer sharing its resources with multiple computers, a client/server network is formed. In this type of network, the server computer provides services and resources to the client computers. The clients request and access these resources from the server. This type of network allows for centralized control and management of resources, making it efficient and scalable for organizations.
3.
Who were the main users of the first edition of the Internet?
Correct Answer
B. The military and defence contractors
Explanation
During its early stages, the first edition of the Internet was primarily used by the military and defense contractors. It was initially developed as a means of communication and data sharing among military organizations and research institutions. The Internet's infrastructure and technology were mainly funded and utilized by these entities for strategic and security purposes. It wasn't until later that the Internet expanded its user base to include the general public, major banks, retailers, and programmers at companies like Microsoft.
4.
Which statement is true about the Internet?
Correct Answer
A. It uses the TCP/IP protocol
Explanation
The statement that is true about the Internet is that it uses the TCP/IP protocol. TCP/IP (Transmission Control Protocol/Internet Protocol) is the set of protocols that enables communication between devices on the Internet. It provides a reliable and standardized method for data transmission and ensures that data packets are correctly delivered from the source to the destination. TCP/IP is the foundation of the Internet and is used for various applications such as email, web browsing, file transfer, and more.
5.
Which type of modem provides an Internet connection through the telephone network
without interrupting telephone connectivity?
Correct Answer
B. Cable modem
Explanation
A cable modem provides an Internet connection through the television cable network, allowing users to access the Internet without interrupting their telephone connectivity. This type of modem uses the existing cable infrastructure to transmit data, providing high-speed Internet access. Unlike dial-up modems, which require a telephone line and can interrupt telephone service, cable modems operate independently, allowing users to use both the Internet and telephone simultaneously. DSL modems also provide Internet connectivity through the telephone network, but they can interrupt telephone service. Satellite modems, on the other hand, use satellite signals for Internet access and do not rely on the telephone network.
6.
What are the two most used services on the Internet?
Correct Answer
C. The Web and E-mail
Explanation
The Web and E-mail are the two most used services on the Internet because they are widely accessible and commonly used by individuals and businesses. The Web allows users to access and share information through websites, while E-mail allows for communication and exchange of messages electronically. These services are integral to the functioning of the Internet and are utilized by a large number of people on a daily basis.
7.
How do you start a particular Web browser in Windows 10?
Correct Answer
B. You double-click its icon on the desktop or find it in the Start menu
Explanation
To start a particular web browser in Windows 10, you can either double-click its icon on the desktop or find it in the Start menu. This action will open the web browser and allow you to begin browsing the internet.
8.
A Web page address is generally referred to as a _________
Correct Answer
D. Uniform Resource Locator
Explanation
A Web page address is generally referred to as a Uniform Resource Locator (URL). A URL is a specific character string that provides the location of a resource on the internet. It includes the protocol used to access the resource (such as HTTP or HTTPS), the domain name or IP address of the server hosting the resource, and the specific path or location of the resource on the server. URLs are used to navigate and access web pages, files, images, videos, and other resources on the internet.
9.
How do you use a URL to browse the Web?
Correct Answer
B. Enter the URL in the address box of the Web browser.
Explanation
To browse the web using a URL, you need to enter the URL in the address box of the web browser. The address box is where you type the website address or URL you want to visit. Once you enter the URL, the web browser will connect to the server hosting the website and display the requested webpage. This is the standard and most common method of accessing websites on the internet.
10.
What are the three types of links you can find on Web pages?
Correct Answer
A. Text links, image links and image map links.
Explanation
The correct answer is text links, image links, and image map links. These are the three types of links commonly found on web pages. Text links are hyperlinks that are embedded within text, allowing users to click on specific words or phrases to navigate to another page. Image links are clickable images that redirect users to another page when clicked. Image map links are specific areas within an image that act as clickable links, allowing users to navigate to different destinations based on where they click on the image.
11.
How are website shortcuts organized in a Web browser?
Correct Answer
C. By sorting them by date and time
Explanation
Website shortcuts in a web browser are organized by sorting them by date and time. This means that the browser arranges the shortcuts based on when they were added or accessed, with the most recent ones appearing at the top. This helps users easily find and access their frequently visited websites, as the shortcuts are presented in a chronological order.
12.
An Internet search tool such as Google, Bing or Yahoo! is referred to as ________
Correct Answer
A. A search engine
Explanation
An Internet search tool such as Google, Bing or Yahoo! is commonly referred to as a search engine. It is designed to help users find specific information on the internet by searching through a vast database of web pages and returning relevant results based on the user's query.
13.
Which information is not true about search engines?
Correct Answer
A. The results for your search is the same no matter which search engine you use (such
as Google, Bing, or Yahoo)
Explanation
This statement is not true because different search engines use different algorithms and have different databases, which can lead to variations in search results.
14.
How can you search the Web for an exact phrase in Google or Yahoo!?
Correct Answer
C. Place the pHrase in quotation marks
Explanation
To search for an exact phrase in Google or Yahoo!, you need to place the phrase in quotation marks. This ensures that the search engine looks for the exact phrase rather than individual words. By using quotation marks, the search results will only display pages that contain the exact phrase as it is typed, providing more accurate and relevant results.
15.
Every valid e-mail address must contain _______ .
Correct Answer
C. The @ symbol
Explanation
Every valid e-mail address must contain the @ symbol. The @ symbol is a crucial component of an e-mail address as it separates the local part (before the @ symbol) from the domain part (after the @ symbol). Without the @ symbol, the e-mail address would not be recognized as valid.
16.
When setting up an e-mail account in Gmail, how can you tell if the e-mail address you
chose is available?
Correct Answer
B. The setup program displays a list of all its existing e-mail addresses so you can
choose one that will not be a duplicate.
Explanation
The correct answer is that the setup program displays a list of all existing email addresses in Gmail, allowing the user to choose an address that is not already taken. This feature helps to ensure that the chosen email address is unique and available for use.
17.
Which statement about e-mail is true?
Correct Answer
A. An e-mail message can be sent to multiple users at the same time.
Explanation
One of the true statements about email is that it allows the sender to send a message to multiple users simultaneously. This is one of the key advantages of email as it allows for efficient communication with multiple recipients without the need for individual messages.
18.
What happens when you send a blind carbon copy (bcc) of an e-mail message?
Correct Answer
C. The recipient of the bcc receives a copy of the e-mail message without any other
recipients knowing.
Explanation
When you send a blind carbon copy (bcc) of an email message, the recipient of the bcc receives a copy of the email without any other recipients knowing. This means that the main recipient, as well as any other recipients in the cc or bcc fields, are unaware that the email has been sent to the bcc recipient. It allows for discreet communication or sending the same message to multiple recipients without revealing their identities to each other.
19.
What does saving a draft do?
Correct Answer
A. It saves an outgoing e-mail message without sending it so that you can get back to it
later and revise it before sending it.
Explanation
Saving a draft allows the user to save an outgoing email message without sending it immediately. This feature is useful when the user wants to revisit and make revisions to the email before sending it. By saving the draft, the user can ensure that the email is not accidentally sent in an incomplete or incorrect state.
20.
How do folders work in Microsoft Outlook?
Correct Answer
C. Managing Microsoft Outlook folders is similar to managing folders in File Explorer
21.
Gmail system labels cannot be ________ .
Correct Answer
B. Hidden
Explanation
Gmail system labels cannot be hidden. This means that users are unable to hide or remove system labels such as "Inbox," "Sent," or "Trash" from their Gmail interface. While users can customize their labels by renaming, deleting, or adding additional labels under them, hiding system labels is not an option.
22.
What should you do if you receive an e-mail message with an unsolicited file attached to
it from somebody you don’t know?
Correct Answer
A. Delete the e-mail without opening it.
Explanation
If you receive an e-mail message with an unsolicited file attached to it from somebody you don't know, it is best to delete the e-mail without opening it. Opening or downloading files from unknown sources can potentially expose your computer to viruses, malware, or other security threats. It is important to exercise caution and prioritize your online safety by avoiding interactions with suspicious or untrusted emails.
23.
Which type of malicious software does not attach itself to files, but runs in active
memory and does not require human action to cause harm or replicate itself
Correct Answer
D. Trojan Horse
Explanation
A Trojan Horse is a type of malicious software that does not attach itself to files, but instead runs in active memory. It does not require human action to cause harm or replicate itself. Unlike viruses, which attach themselves to files and require human action to spread, Trojan Horses can enter a system undetected and perform malicious actions without the user's knowledge. They often disguise themselves as legitimate programs or files, tricking users into downloading or installing them. Once inside a system, Trojan Horses can steal sensitive information, modify or delete files, or even give remote control of the infected system to the attacker.
24.
Which method would be the most useful if you end up with unwanted or unknown
software on your computer through downloading and installing programs?
Correct Answer
B. Run an uninstaller program
Explanation
Running an uninstaller program would be the most useful method if you end up with unwanted or unknown software on your computer through downloading and installing programs. Uninstaller programs are specifically designed to remove software from a computer system completely. By running an uninstaller program, you can effectively remove the unwanted or unknown software, ensuring that all associated files, folders, and registry entries are deleted from your computer. This helps to free up disk space and eliminate any potential issues or conflicts caused by the unwanted software.
25.
What action on your part will guarantee that your computer will never be infected with
any malware?
Correct Answer
D. There is no practical way to guarantee that your computer will never be infected
unless you don’t use it at all.
Explanation
The correct answer states that there is no practical way to guarantee that your computer will never be infected unless you don't use it at all. This means that no matter what actions you take, there is always a possibility of your computer getting infected with malware. While simple common sense, the installation of anti-virus software, and refusing to install software obtained from other people can reduce the risk of infection, they cannot completely eliminate it. Therefore, the only way to guarantee no infection is to not use the computer at all.