1.
Which statement describe a website with “.ac.th” as extension (e.g. “www.websitename.ac.th”)
Correct Answer
C. The website is an academic website in Thailand
Explanation
The correct answer is that the website is an academic website in Thailand. The ".ac.th" extension is commonly used by academic institutions in Thailand. This indicates that the website is specifically related to education and is likely to contain information about universities, colleges, or other educational organizations in Thailand.
2.
What is the URL?
Correct Answer
A. Website Locator
Explanation
The correct answer is "Website Locator" because a URL (Uniform Resource Locator) is a web address that is used to locate and access a specific website or web page on the internet. It specifies the protocol to be used (such as HTTP or HTTPS), the domain name or IP address of the server, and the specific path to the resource. Therefore, a URL serves as a locator for websites on the World Wide Web.
3.
From the screen below, identify where you could enter your URL.
Correct Answer
D. Circle 1 and 2
Explanation
The correct answer is Circle 1 and 2. This is because both Circle 1 and Circle 2 are pointing to areas on the screen where you can enter your URL.
4.
Which website is located in Thailand for sure?
Correct Answer
A. Www.websitename.co.th
Explanation
The correct answer is www.websitename.co.th. The ".co.th" domain extension is specifically designated for websites located in Thailand. This indicates that the website is registered in Thailand and is therefore located in Thailand for sure. The other domain extensions (.org, .gov, .edu) do not provide any indication of the website's location.
5.
What is Internet?
Correct Answer
B. World Wide Computer Network
Explanation
The correct answer is "World Wide Computer Network." The Internet is a global network of interconnected computers that allows communication and sharing of information between users worldwide. It is not limited to wireless computer systems or social media networks, although they are part of the Internet. The term "web application system" is too specific and does not encompass the full scope of the Internet.
6.
From the screen below, how to solve the error?
Correct Answer
A. Restart the internet router
Explanation
To solve the error, restarting the internet router is the correct answer. Restarting the router can help resolve connectivity issues and refresh the network connection. It is a common troubleshooting step to fix problems related to internet connectivity.
7.
From the picture below, judging by the intension of the website, what is it?
Correct Answer
B. An online marketplace
Explanation
Based on the picture provided, it is likely that the website is an online marketplace. This can be inferred from the fact that the image shows multiple products being displayed, suggesting that it is a platform for buying and selling various goods.
8.
From the screen below, why does this website is trustworthy?
Correct Answer
C. Because the site is using HTTPS
Explanation
The website is trustworthy because it is using HTTPS. HTTPS is a secure protocol that encrypts the data exchanged between the user's browser and the website, ensuring that it cannot be intercepted or tampered with by malicious actors. This helps protect sensitive information such as login credentials, personal details, and financial transactions.
9.
What are the most essential things for a trustworthy website?
Correct Answer
C. A SSL standard
Explanation
A SSL standard is one of the most essential things for a trustworthy website. SSL (Secure Sockets Layer) is a security protocol that encrypts the communication between the website and the user's browser, ensuring that any sensitive information shared on the website remains secure. It establishes trust and credibility by protecting user data from being intercepted or tampered with by unauthorized parties. A website with a SSL standard indicates that it takes security seriously and is committed to safeguarding user information, making it more trustworthy for users.
10.
From the picture below, should you perform the payment? Why?
Correct Answer
C. Yes, because the site got a lock symbol from the browser
Explanation
The correct answer is "Yes, because the site got a lock symbol from the browser." This is because the lock symbol indicates that the website has a secure connection, usually through SSL encryption. This means that any information entered on the website, such as payment details, will be encrypted and protected from unauthorized access. Therefore, it is safe to perform the payment on this website.
11.
From the picture below, what factor is NOT indicate that the site is trustworthy?
Correct Answer
D. All of the above
Explanation
The correct answer is "All of the above." The question asks for a factor that does not indicate that the site is trustworthy. The name of the university can be misleading as it may not necessarily guarantee the trustworthiness of the site. A well-written article can be persuasive, but it does not necessarily mean that the information is accurate or reliable. Similarly, a beautiful layout may be visually appealing, but it does not guarantee the credibility of the content. Therefore, all of the factors mentioned do not indicate that the site is trustworthy.
12.
What is NOT the essential topic that should be included on an e-commerce website?
Correct Answer
D. Product Article
Explanation
An e-commerce website is primarily focused on selling products online. Therefore, the essential topics that should be included on such a website are the store location, product price, and shipping condition. However, the product article is not an essential topic as it is not necessary for customers to have detailed information about the product on the website. They can usually find this information through product descriptions, images, and customer reviews.
13.
What is Email?
Correct Answer
C. An electronic communication
Explanation
An email is considered an electronic communication because it involves the transmission of messages electronically between individuals or groups. Unlike traditional letters, emails are sent and received through electronic devices such as computers or smartphones. They can contain both text and various multimedia elements, making them versatile for different types of communication. Additionally, emails can be exchanged between multiple parties, allowing for efficient and convenient communication across different locations.
14.
From the screen below identify the email address of the sender of this Email.
ExplanationThe correct answer is
[email protected]. This is the email address of the sender of the email. The other options listed are not email addresses.
15.
From the question above, identify the date that the email is sent (DD/MM/YYYY)
Correct Answer
A. 10/11/2005
Explanation
The correct answer is 10/11/2005. This is because the date format provided is in DD/MM/YYYY format, where the first number represents the day, the second number represents the month, and the third number represents the year. In this case, 10 represents the day, 11 represents the month, and 2005 represents the year.
16.
What is Email Address?
Correct Answer
B. A electronic mail box locator
Explanation
An email address is a electronic mail box locator. It is a unique identifier that allows individuals to send and receive electronic mail messages. The email address acts as a locator, directing messages to the specific mailbox associated with that address. It serves as a means of communication, enabling individuals to stay connected and exchange information electronically.
17.
From the screen below, which button is for attaching a file to the email?
Correct Answer
B. Circle 2
18.
From the previous question, which button is used for copying the email and send it to other people?
Correct Answer
A. Circle 1
19.
If you are to write an email to compliant about your purchased product, what is the most essential topic to be included in the email?
Correct Answer
D. Write about what you want them to do about it
Explanation
The most essential topic to be included in the email when complaining about a purchased product is to write about what you want the company to do about the issue. This is important because it clearly communicates your expectations and desired resolution. By stating your desired outcome, you provide the company with a clear understanding of how they can address your complaint and potentially resolve the issue to your satisfaction.
20.
If you are to schedule a formal meeting with high-rank managers of your company, is email suitable for your task? Why?
Correct Answer
A. Yes, because it is the most formal way to do it
Explanation
Email is suitable for scheduling a formal meeting with high-rank managers because it is the most formal way to communicate in a professional setting. It allows for a clear and documented exchange of information, ensuring that all details and expectations are conveyed accurately. Additionally, email provides a professional platform for all parties involved to review and respond at their convenience, eliminating the risk of missing important information. The preference of the boss for all communications to be via email further supports its suitability for this task.
21.
From the picture below, identify the purpose of the email.
Correct Answer
C. Complaining
Explanation
The purpose of the email can be identified as complaining because the tone and content of the message suggest dissatisfaction or frustration with a certain situation. It is likely that the sender is expressing their grievances or dissatisfaction with a particular issue or incident.
22.
If you want to send a 1 GB file to your friend, is email suitable for your task? Why?
Correct Answer
D. No, because email cannot be used to send a file that large
Explanation
Email has file size limitations, typically ranging from a few megabytes to a few tens of megabytes. Sending a 1 GB file via email would exceed these limitations, making it unsuitable for the task. Alternative methods, such as file-sharing services or cloud storage, should be used to send large files.
23.
From the picture below, identify the purpose of the email.
Correct Answer
D. A and B
Explanation
The purpose of the email can be identified as both requesting and apologizing. This can be inferred from the content of the email, which may include a polite request for something and an apology for any inconvenience caused.
24.
If you are to write an email to postpone a meeting, what should NOT be included in the email?
Correct Answer
C. New meeting topic
Explanation
In an email to postpone a meeting, it is not necessary to include a new meeting topic. The purpose of the email is to inform the recipients about the change in schedule and apologize for any inconvenience caused. The new meeting topic can be discussed and shared at a later time when the meeting is rescheduled.
25.
“Firewall is the wall between you and online threats”, what can you tell from this statement?
Correct Answer
D. Firewall is a barrier that control and prevent unwanted communications
Explanation
The statement "Firewall is the wall between you and online threats" suggests that a firewall acts as a barrier that controls and prevents unwanted communications. It implies that the firewall is responsible for blocking any communication that may pose a threat to the user's online security. It does not imply that the firewall will scan every file that is downloaded or that it is a type of antivirus.
26.
What is a spyware?
Correct Answer
A. A software that steal information form the infected computer
Explanation
Spyware refers to a type of malicious software that is designed to secretly gather information from an infected computer without the user's knowledge or consent. It typically operates in the background, collecting sensitive data such as passwords, credit card details, browsing history, and personal information. This stolen information is then often used for malicious purposes, such as identity theft or financial fraud. Therefore, the correct answer is "A software that steal information from the infected computer."
27.
"Your information been leak to unwanted hand", what kind of threat are you facing?
Correct Answer
D. Spyware
Explanation
The correct answer is Spyware. Spyware is a type of threat that infiltrates a device or network without the user's consent and collects personal information or monitors online activities. In this scenario, the phrase "Your information been leak to unwanted hand" suggests that someone unauthorized has obtained and potentially misused the user's information. Spyware is specifically designed to gather sensitive data without the user's knowledge, making it the most fitting threat in this context.
28.
What is a Trojan virus?
Correct Answer
C. A software that act like it harmless but in fact it was not
Explanation
A Trojan virus is a type of malware that disguises itself as harmless software but is actually harmful. It tricks users into downloading or executing it, often by pretending to be a legitimate program or file. Once installed, it can perform various malicious activities, such as stealing sensitive information, damaging files, or allowing unauthorized access to the infected computer. Therefore, the correct answer is "A software that act like it harmless but in fact it was not."
29.
From the screen below, if you want to allow all incoming connections for your private network, which button you need to click?
Correct Answer
B. Circle 2
30.
From the previous question, if you want to Block all incoming connections for the public network, which button you need to click?
Correct Answer
C. Circle 3
Explanation
In order to block all incoming connections for the public network, you need to click on Circle 3.
31.
What is the best way to avoid password hacking?
Correct Answer
B. Use one time password
Explanation
Using a one-time password is considered the best way to avoid password hacking because it provides an extra layer of security. Unlike traditional passwords that can be reused or easily guessed, one-time passwords are unique and expire after a single use. This makes it extremely difficult for hackers to gain unauthorized access to an account even if they manage to obtain the password. By constantly generating new passwords, the risk of password theft and hacking is significantly reduced.
32.
What is the best way to protect yourself from an online threat?
Correct Answer
B. Keep your security software up-to-date
Explanation
Keeping your security software up-to-date is the best way to protect yourself from an online threat. Security software, such as antivirus programs, is designed to detect and remove malware, viruses, and other online threats. By regularly updating your security software, you ensure that it has the latest virus definitions and patches to effectively identify and block new threats. This helps to prevent unauthorized access to your personal information and keeps your devices and data safe from potential cyberattacks.
33.
Which statement is true about the DoS attack?
Correct Answer
C. Dos attack is a network attack
Explanation
The correct answer is that a DoS attack is a network attack. A denial-of-service (DoS) attack is a malicious attempt to disrupt the normal functioning of a network, service, or website by overwhelming it with a flood of internet traffic. It is not a virus and does not involve the multiplication of viruses. Additionally, it is not related to monitoring or watching a network.
34.
From the picture below, should you do what the email suggests you to do? Why?
Correct Answer
D. No, because I don’t know this person
Explanation
The correct answer is "No, because I don’t know this person." This is because knowing the person who sent the email is important when deciding whether to follow their suggestions or not. If the sender is unknown, it is generally not advisable to trust their recommendations or take any action suggested in the email.
35.
Choose the best match between threat and countermeasure.
Correct Answer
A. Remote Hacking - Firewall
Explanation
The correct answer is "Remote Hacking - Firewall". A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. It acts as a barrier between a trusted internal network and an untrusted external network, such as the internet, and helps protect against unauthorized access and remote hacking attempts.
36.
From the screen below, if the person receiving those messages was you and the other two persons were your friends, would you do what they urge you to do? Why?
Correct Answer
D. No, because the pattern of these messages is like a spam.
Explanation
The correct answer is "No, because the pattern of these messages is like a spam." This answer is based on the information given in the question, which states that the pattern of the messages is like spam. Spam messages are often unsolicited and can be potentially harmful or deceptive. Therefore, it is reasonable to be cautious and not follow the instructions given in these messages, even if they are from friends.
37.
In order to achieve a highly secured home Wi-Fi, what should you do first?
Correct Answer
A. Change the password that comes from the factory
Explanation
To achieve a highly secured home Wi-Fi, the first step is to change the password that comes from the factory. This is because the default passwords provided by the manufacturer are often widely known and can be easily exploited by hackers. By changing the password to a unique and strong one, the risk of unauthorized access to the Wi-Fi network is significantly reduced. Upgrading the router or installing anti-virus software can provide additional security measures, but changing the default password is the essential first step. Using a cellular internet instead of Wi-Fi is not directly related to securing the home Wi-Fi network.
38.
Identify the site that provides cloud storage service.
Correct Answer
C. OneDrive
Explanation
OneDrive is the correct answer because it is a cloud storage service provided by Microsoft. It allows users to store and access their files from any device with an internet connection. OneDrive offers free storage space and also provides paid plans with additional features and larger storage capacities. It is widely used by individuals and businesses for storing and sharing files in the cloud.
39.
What is audio steaming?
Correct Answer
A. Playing an audio without downloading the whole file
Explanation
Audio streaming refers to the process of playing an audio file in real-time without the need to download the entire file beforehand. Instead of waiting for the entire audio file to be downloaded, streaming allows the user to start listening to the audio while it is being transmitted over the internet. This enables a seamless and uninterrupted playback experience, as the audio is delivered in small, manageable portions. Streaming is commonly used in various platforms and applications, such as music streaming services, podcasts, and online radio stations.
40.
From the screen below, identify which button you should click to report the post
Correct Answer
B. Circle 2
Explanation
Circle 2 is the correct answer because it is the only circle that is labeled "Report." The question asks which button to click to report the post, and Circle 2 clearly indicates the action of reporting.
41.
What is Big data?
Correct Answer
A. Large volume of structured and unstructured data
Explanation
Big data refers to a large volume of both structured and unstructured data. Structured data is organized and easily searchable, while unstructured data lacks a specific format and is more difficult to analyze. The correct answer states that big data encompasses both types of data, indicating that it includes a significant amount of structured data as well as unstructured data.
42.
Identify the site that provide audio streaming service.
Correct Answer
B. JOOX
Explanation
JOOX is the correct answer because it is a site that provides audio streaming service. Line TV is a video streaming platform, while Google and Yahoo are search engines and do not specifically offer audio streaming services.
43.
From the screen below, identify which button you should click to upload a new file.
Correct Answer
B. Circle 2
Explanation
Based on the information provided, Circle 2 is the correct answer because it is the only circle that is associated with the action of uploading a new file. Circles 1 and 3 are not mentioned or indicated to be related to uploading a file, so they are not the correct options.
44.
From the screen below, if you what to set your privacy so that the only people who could see your post are your friends, which button you would click?
Correct Answer
A. Circle 1
Explanation
Circle 1 is the correct answer because it is the only option that implies setting privacy to only friends. The other circles do not provide any indication of privacy settings or specify that only friends can see the post.
45.
If you would like to upload an mp3 file to share with your friend to download and edit, which online service would you use?
Correct Answer
A. Google Drive
Explanation
Google Drive is the correct answer because it is an online service that allows users to store and share files, including mp3 files. It provides a secure and convenient platform for uploading files and sharing them with others. Additionally, Google Drive offers various features such as file organization, collaboration, and easy accessibility across different devices, making it an ideal choice for sharing and editing mp3 files.
46.
If you want to send a very small document file to your supervisor, which service provider should you use?
Correct Answer
C. Hotmail
Explanation
Hotmail should be used to send a very small document file to your supervisor because it is an email service provider that allows users to send and receive emails with attachments. It provides a convenient and secure way to share files, including documents, with others. YouTube and Sound Cloud are platforms for sharing videos and music, respectively, and are not suitable for sending documents. Google Drive is a cloud storage service that can also be used to send files, but Hotmail is specifically designed for email communication and file sharing.
47.
What is the best way to prevent social media addiction?
Correct Answer
A. Find a positive hobby
Explanation
Finding a positive hobby is the best way to prevent social media addiction because it helps to divert one's attention and focus towards a productive and fulfilling activity. Engaging in a hobby provides a sense of purpose and satisfaction, reducing the desire to constantly use social media. It also allows individuals to develop new skills, meet new people, and explore different interests, which can help in creating a healthy balance between online and offline activities. Avoiding a friend who uses social media and isolating oneself may provide temporary relief, but they do not address the root cause of addiction or provide a long-term solution.
48.
If you want to share a file with your friends, which service provider should you use?
Correct Answer
D. Google Drive
Explanation
Google Drive is the most appropriate service provider for sharing files with friends because it is specifically designed for file storage and sharing. It allows users to easily upload, store, and share files with others by providing a secure link. Additionally, Google Drive offers a generous amount of free storage space and allows for collaboration on documents, making it a convenient and reliable choice for sharing files.
49.
If you want to automate an industrial factory in order to let the factory operate without humans, what technology should you use?
Correct Answer
B. Internet of Things
Explanation
To automate an industrial factory and enable it to operate without humans, the technology that should be used is the Internet of Things (IoT). IoT allows for the interconnection of various devices and systems within the factory, enabling them to communicate and share data. This connectivity enables real-time monitoring, control, and automation of processes, optimizing efficiency and reducing the need for human intervention. By utilizing IoT, the factory can achieve seamless integration and coordination of its operations, leading to increased productivity and cost-effectiveness.
50.
What is the best response to an online mean comment?
Correct Answer
C. Report that person
Explanation
The best response to an online mean comment is to report that person. By reporting the person, you are bringing the issue to the attention of the platform or website administrators who can take appropriate action. This helps to maintain a safe and respectful online environment for everyone. Attacking the comment with your own or ignoring it may escalate the situation or allow the negativity to continue. Blocking the person may prevent further interaction, but it does not address the issue or protect others from potential harm.