1.
Where are advertisements usually located on the search results page of a search engine?
Correct Answer
D. At the top and on the right of the page
Explanation
Advertisements are usually located at the top and on the right of the search results page of a search engine. This is a common placement for ads because it ensures that they are highly visible to users and increases the likelihood of them being clicked on. Placing ads at the top of the page also allows them to be seen before the organic search results, making them more prominent and likely to attract attention. Additionally, placing ads on the right side of the page provides a balanced layout and doesn't interfere with the main content in the center of the page.
2.
Putting quotation marks on a phrase in a search engine will
Correct Answer
B. Tell the search engine to only search for that pHrase and not the words individually
Explanation
Putting quotation marks on a phrase in a search engine will tell the search engine to only search for that phrase and not the words individually. Quotation marks indicate to the search engine that the user is looking for an exact match of the phrase, rather than individual words. This can be helpful when searching for specific phrases or when trying to narrow down search results to be more precise.
3.
If two words commonly go together (surf board) and you only want to search for one of those words but not the other you can tell the search engine to exclude results for the word you don't want. How do you do this?
Correct Answer
D. Both A and C
Explanation
To exclude a specific word from the search results, you can either put a hyphen before the word without any space after it or use "NOT" in all caps before the word. Both options, A and C, allow you to exclude the unwanted word and refine your search.
4.
What is LAN?
Correct Answer
B. Local Area Network of two or more computers in a small geograpHic are (same building)
Explanation
A LAN stands for Local Area Network, which refers to a network of computers that are connected within a limited area such as a building or a campus. It allows the computers to share resources, such as files and printers, and enables communication between the connected devices. This option accurately describes the concept of a LAN, as it specifies that it involves two or more computers in a small geographic area, typically within the same building.
5.
What is WAN?
Correct Answer
D. Wide Area Network of two or more LANs
Explanation
A Wide Area Network (WAN) refers to a network that connects two or more Local Area Networks (LANs) over a wide geographic area. This means that it allows for the communication and sharing of resources between different LANs located in different locations, such as different offices or branches of an organization. The WAN enables the transmission of data, voice, and video across long distances, using various technologies like leased lines, satellites, or internet connections. It provides a larger network infrastructure that allows for efficient and secure communication between multiple LANs.
6.
The internet...
Correct Answer
D. All of the above
Explanation
The correct answer is "All of the above." This is because the internet is indeed the largest Wide Area Network (WAN), it is not the same thing as the World Wide Web, and it is a physical network of computers all over the world. Therefore, all of these statements accurately describe the internet.
7.
Which of the following is not a smart thing to do with your passwords?
Correct Answer
D. Use the same password for all your accounts so you can easily remember it
Explanation
Using the same password for all accounts is not a smart thing to do because if one account is compromised, then all other accounts will also be at risk. It is important to use unique passwords for each account to ensure better security.
8.
What is scareware?
Correct Answer
B. Malicious links in emails or advertisements disguised as security warnings which actually lead to malware
Explanation
Scareware refers to malicious links in emails or advertisements that are disguised as security warnings but actually lead to malware. This type of scam aims to deceive and scare users into clicking on the links, which then infect their devices with malware. It is important to be cautious and not fall for such tactics, as they can lead to serious security breaches and compromise personal information.
9.
When it comes to social media, potentially embarrassing photos...
Correct Answer
A. Should not be posted as they may affect your job and college applications in the future
Explanation
Posting potentially embarrassing photos on social media can have long-term consequences, especially when it comes to job and college applications. Employers and admissions officers often review applicants' social media profiles to get a sense of their character and professionalism. Inappropriate or embarrassing photos can create a negative impression and potentially harm your chances of getting hired or accepted. Therefore, it is advisable not to post such photos in order to safeguard your future opportunities.
10.
When it comes to social media, posting personal information such as birthdays and addresses...
Correct Answer
D. Help criminals track me and hack into my accounts
Explanation
Posting personal information such as birthdays and addresses on social media can help criminals track and hack into accounts. This is because such information can be used to gather more information about a person and potentially gain unauthorized access to their accounts. It is important to be cautious and mindful of the information shared online to protect personal privacy and security.
11.
In email CC...
Correct Answer
C. Stands for carbon copy and sends a copy of your email to those recipients
Explanation
The correct answer is "Stands for carbon copy and sends a copy of your email to those recipients." This is because in email, CC stands for carbon copy, which means that when you include someone in the CC field, they will receive a copy of the email along with the primary recipient. This allows you to send the same email to multiple people without having to individually address each one.
12.
In email BCC...
Correct Answer
B. Stands for blind carbon copy and hides the email address which are sent a copy
Explanation
The correct answer is "Stands for blind carbon copy and hides the email address which are sent a copy." BCC stands for blind carbon copy and is a feature in email that allows the sender to send a copy of the email to recipients without revealing their email addresses to each other. This ensures privacy and confidentiality in communication.
13.
CC and BCC are useful for
Correct Answer
B. Keeping a recipient in the loop while letting them know they don't need to respond
Explanation
CC and BCC are useful for keeping a recipient in the loop while letting them know they don't need to respond. When you CC someone on an email, it means you are including them in the conversation for their information, but they are not expected to take any action or respond. BCC, on the other hand, allows you to send the email to multiple recipients without revealing their identities to each other. This is useful when you want to keep the recipients' information private while still keeping them informed about the conversation.
14.
An easy way to send an email to a large number of recipients is
Correct Answer
A. To keep a contact group for those recipients
Explanation
Keeping a contact group for a large number of recipients is an easy way to send an email to them. By creating a contact group, you can save time and effort by simply selecting the group instead of individually typing or copying and pasting each email address. This ensures that all recipients receive the email without any errors or omissions.
15.
Which of the following is NOT good email etiquette?
Correct Answer
B. Write just as you would talking with a friend in person
Explanation
Writing an email just as you would talk with a friend in person is not good email etiquette. Emails should be more formal and professional in tone and language compared to casual conversations with friends. It is important to maintain a level of professionalism and clarity in written communication, which may require adjusting the tone and style of writing to suit the context of an email.
16.
To attach a file to an email...
Correct Answer
D. Click the icon that looks like a paper clip and choose the file to upload
Explanation
To attach a file to an email, you need to click the icon that looks like a paper clip and choose the file to upload. This is a common method used in email clients to indicate the action of attaching a file. By clicking on the paper clip icon, a file selection dialog box opens up, allowing the user to browse and choose the desired file to attach to the email.
17.
What is phishing?
Correct Answer
D. An email that pretends to be a trusted source but is actually looking for information that can be used to defraud you
Explanation
Phishing refers to an email that appears to be from a reliable source but is actually designed to deceive and extract personal information in order to commit fraud. This type of cyber attack aims to trick individuals into disclosing sensitive data, such as passwords or credit card details, which can then be exploited for malicious purposes. It is important to be cautious and verify the authenticity of emails before sharing any personal information to protect oneself from falling victim to phishing scams.
18.
Which of the following is NOT a useful tip for avoiding cyber-bullying/harassment?
Correct Answer
C. Always speak up and tell people exactly how you feel
Explanation
The correct answer is "always speak up and tell people exactly how you feel" because openly expressing your feelings can potentially escalate the situation and make you more vulnerable to further harassment. It is generally advised to avoid engaging with the harasser and instead focus on blocking them, reporting the incident, and seeking support from trusted individuals or authorities.
19.
Which one of the following is NOT a helpful tip for using mobile devices?
Correct Answer
D. Text only while stopped at a stop light
Explanation
The given answer, "Text only while stopped at a stop light," is NOT a helpful tip for using mobile devices. It implies that it is acceptable to use a mobile device for texting while stopped at a stop light, which can still be distracting and potentially dangerous. It is important to avoid any form of mobile device usage while driving, even when stopped at a stop light, to ensure full attention is given to the road.
20.
Treat the internet just as you would a public place if you were there in person. Don't display personal, sensitive or financial information. Be very cautious talking to strangers or avoid it altogether. Don't do embarrassing things or display them. Once it goes online you can't get it back!
Correct Answer
A. Yes Mr. Romney, you're right as always.
Explanation
The correct answer is "Yes Mr. Romney, you're right as always." because the person acknowledges that treating the internet with caution and following the mentioned guidelines is important, even though they may initially dismiss it as advice for little kids. They recognize that Mr. Romney's statement is valid and should be taken seriously.