1.
How do you change your Web browser's home page?
Correct Answer
D. Use menu options to set the current page as the home page
Explanation
To change your Web browser's home page, you can use menu options to set the current page as the home page. This means accessing the browser's settings or preferences menu and finding the option that allows you to designate the current page as the one that should load whenever you open the browser. By selecting this option, you can easily change your browser's home page to the page you are currently on.
2.
1. What is a digital certificate?
Correct Answer
C. A verification that authenticates a web site
Explanation
A digital certificate is a verification that authenticates a web site. It is a cryptographic credential that is issued by a trusted third party, known as a Certificate Authority (CA). The certificate contains information about the identity of the website owner, such as their domain name and public key. It is used to establish a secure connection between the user's browser and the website, ensuring that the website is legitimate and that any data exchanged between the user and the website is encrypted and secure.
3.
1. Which one of the following is the process of encoding data to prevent unauthorised access, especially during transmission?
Correct Answer
C. Encryption
Explanation
Encryption is the process of encoding data to prevent unauthorized access, especially during transmission. It involves converting plain text into cipher text using an encryption algorithm and a key. This ensures that even if the data is intercepted, it cannot be read or understood without the correct decryption key. Encryption is commonly used to secure sensitive information such as passwords, credit card numbers, and personal data when transmitting over networks or storing in databases. It helps protect the confidentiality and integrity of data, ensuring that only authorized individuals can access and understand it.
4.
1. A _____________ is a connection between a part of a Web page and a different part of the same Web page or another Web Page. The connection is activated by a mouse click. Which one of the following completes the sentence?
Correct Answer
D. Hyperlink
Explanation
A hyperlink is a connection between a part of a Web page and a different part of the same Web page or another Web Page. The connection is activated by a mouse click.
5.
1. Malicious programs which attach themselves or inserts inside legitimate files are called
Correct Answer
B. Viruses
Explanation
Malicious programs that attach themselves or insert inside legitimate files are known as viruses. Viruses are designed to replicate and spread, often causing damage to computer systems and files. They can be transmitted through various means such as email attachments, infected websites, or shared files. Once a virus infects a system, it can perform harmful actions such as deleting or corrupting files, stealing personal information, or slowing down the computer's performance. Therefore, viruses pose a significant threat to the security and functionality of computer systems.
6.
1. _________ is an address for a resource on the World Wide Web
Correct Answer
A. ) URL or Universal/Uniform Resource Locator
Explanation
A URL, also known as a Universal/Uniform Resource Locator, is an address that is used to locate and access a resource on the World Wide Web. It specifies the protocol to be used, such as HTTP or HTTPS, followed by the domain name or IP address of the server hosting the resource, and optionally the path to the specific resource. This allows users to easily navigate and access websites and web pages by simply entering the URL into a web browser.
7.
Which one of the following is the best method to ensure access to an network is secure?
Correct Answer
A. The network requires a user name and password
Explanation
The best method to ensure access to a network is secure is by requiring a user name and password. This is because using a combination of both user name and password adds an extra layer of security to the network. It ensures that only authorized individuals with the correct credentials can access the network, reducing the risk of unauthorized access and potential security breaches.
8.
Which one of the following actions could lead to a computer being infected with a virus?
Correct Answer
D. Opening an executable file that is attached to an email message
Explanation
Opening an executable file that is attached to an email message could lead to a computer being infected with a virus. Executable files have the ability to run code on a computer, and if the file is infected with a virus, it can execute malicious code that can harm the computer and infect it with the virus. Therefore, opening such a file can potentially infect the computer.
9.
1. Which three-letter suffix in an email address identifies an organization as non-commercial?
Correct Answer
A. Edu
Explanation
The three-letter suffix "edu" in an email address identifies an organization as non-commercial. This suffix is commonly used by educational institutions such as universities and colleges.
10.
Which one of the following best describes the difference between the Cc and Bcc fields?
Correct Answer
B. The Bcc recipient’s name in a mail message is NOT visible to other
recipients of the message.
Explanation
The Bcc field allows the sender to add recipients to the email without their names being visible to other recipients. This means that when the email is sent, the Bcc recipients will receive the email, but their names will not be visible to anyone else who receives the email. This is different from the Cc field, where the names of the recipients are visible to everyone who receives the email.
11.
Which one of the following is an example of an online (virtual) community?
Correct Answer
B. Chat Room
Explanation
A chat room is an example of an online (virtual) community because it is a platform where individuals can connect and interact with each other through real-time messaging. It allows people with similar interests or goals to come together, share information, engage in discussions, and build relationships. Chat rooms often have specific topics or themes, creating a sense of community and fostering a sense of belonging among its members.
12.
Which one of the following gives you the ability to know if a desired contact is online?
Correct Answer
C. Instant messaging (IM).
Explanation
Instant messaging (IM) is the correct answer because it allows users to see if a desired contact is online. IM platforms typically display the online status of users, indicating whether they are currently active and available for communication. This feature enables users to know if their desired contact is available for a conversation in real-time. RSS, SMS, and URL do not provide this specific ability to determine the online status of a contact.
13.
What is a protected Web site?
Correct Answer
B. A web site that requires a user name and password for access
Explanation
A protected website refers to a web page that requires a user to enter a username and password in order to gain access. This additional layer of security ensures that only authorized individuals can view the content or perform certain actions on the website.
14.
In a web address identified by geographical area how many letters would a country code contain?
Correct Answer
B. 2
Explanation
A country code in a web address identified by geographical area typically contains two letters. Country codes are used to represent specific countries or territories in web addresses, such as .us for the United States or .uk for the United Kingdom.
15.
Which one of the following actions would help to prevent children from accessing harmful content on the internet?
Correct Answer
B. Supervise computer usage sessions
Explanation
Supervising computer usage sessions would help prevent children from accessing harmful content on the internet because it allows parents or guardians to monitor and control what websites and online activities the children are engaging in. This way, they can ensure that the children are not exposed to inappropriate or harmful content.
16.
Which one of the following is a scheme where criminals send unsolicited e-mails or pop-up messages to get personal and financial information from unsuspecting victims?
Correct Answer
C. pHishing
Explanation
Phishing is a scheme where criminals send unsolicited e-mails or pop-up messages to deceive and trick unsuspecting victims into revealing their personal and financial information. This information is then used for fraudulent purposes, such as identity theft or financial scams.
17.
Which of the following activities could be subject to fraud when purchasing goods over the internet?
Correct Answer
A. Entering your credit card details on an electronic form
Explanation
Entering your credit card details on an electronic form could be subject to fraud when purchasing goods over the internet. This is because cybercriminals can intercept the information during transmission or gain unauthorized access to the website's database where the information is stored. They can then use the credit card details for fraudulent activities such as making unauthorized purchases or identity theft. It is important to ensure that the website is secure and trustworthy before entering sensitive information like credit card details.
18.
Which one of the following statements about world wide web is true?
Correct Answer
C. The world wide web includes the use of hypertext to connect related
web documents
Explanation
The correct answer is "The world wide web includes the use of hypertext to connect related web documents." This statement is true because the world wide web, also known as the web, is a system of interconnected documents and resources that are accessed through the internet. Hypertext is the technology that allows users to navigate between these documents by clicking on links. Therefore, the web uses hypertext to connect related web documents and provide a seamless browsing experience.