1.
Which one of the following refers to the Top Level domain name in the URL http://www.ecdl.org?
Correct Answer
A. .org
Explanation
The top-level domain (TLD) refers to the last part of a domain name in a URL. In this case, the TLD is ".org". TLDs are used to categorize websites based on their purpose or geographic location. ".org" is commonly used for non-profit organizations.
2.
Which one of the following describes software that is created and distributed for malicious purposes?
Correct Answer
C. Malware
Explanation
Malware refers to software that is specifically designed and distributed with malicious intent. It includes various types of malicious software such as viruses, worms, trojans, ransomware, and spyware. Unlike freeware, which is software that is available for free, or vaporware, which refers to software that is announced but never released, malware is created to cause harm to computer systems, steal sensitive information, or disrupt normal operations. It is important to have proper security measures in place to protect against malware and regularly update antivirus software to detect and remove any potential threats.
3.
Which one of the following statements is true?
Correct Answer
B. E-mail is a low cost way to send and receive messages.
Explanation
The given statement "e-mail is a low cost way to send and receive messages" is true. Email is a widely used communication method that allows users to send and receive messages electronically. Compared to traditional mail or other forms of communication, email is considered a low-cost option as it eliminates the need for physical postage and paper. Additionally, email allows for quick and efficient communication, making it a convenient and cost-effective choice for sending and receiving messages.
4.
Which one of the following allows voice communication across the Internet?
Correct Answer
A. VoIP
Explanation
VoIP (Voice over Internet Protocol) allows voice communication across the Internet. It is a technology that converts voice signals into digital data packets and transmits them over an IP network. This enables users to make phone calls over the Internet, bypassing traditional telephone networks and using the Internet as the medium for communication. VoIP is commonly used for voice calls, video calls, and other multimedia communication services.
5.
What is a Search Engine?
Correct Answer
B. A program that searches the Internet by key words
Explanation
A search engine is a program that searches the internet by using keywords. It helps users find relevant information by indexing web pages and retrieving results based on the user's query. By entering specific keywords, the search engine scans its database and displays a list of web pages that match the search criteria. This allows users to quickly and efficiently find the information they are looking for on the internet.
6.
What is a protected Web site?
Correct Answer
A. A Web site that requires a user name and password to protect against access of unauthorized persons.
Explanation
A protected website is one that requires a user name and password to access, ensuring that only authorized individuals can view its content. This security measure prevents unauthorized persons from gaining access to sensitive information or performing unauthorized actions on the website.
7.
Which one of the following is an example of online (virtual) communities?
Correct Answer
C. Chat Rooms
Explanation
Chat rooms are an example of online (virtual) communities because they provide a platform for individuals with similar interests to connect and interact with each other in real-time. Users can join specific chat rooms based on their preferences and engage in conversations with other members. This fosters a sense of community and allows people to share ideas, opinions, and experiences with like-minded individuals, even if they are geographically dispersed. Chat rooms facilitate communication and collaboration, making them an essential component of online communities.
8.
What is a digital certificate?
Correct Answer
B. A verification that authenticates a Web site.
Explanation
A digital certificate is a verification method that authenticates a website. It is a digital document issued by a trusted third party known as a Certificate Authority (CA). The certificate contains information about the website's identity and public key, which is used to encrypt and decrypt data sent between the website and its users. By verifying the digital certificate, users can be confident that the website they are accessing is legitimate and secure, as it has been authenticated by a trusted authority.
9.
Which one of the following is the most likely to infect your computer with a virus while you are browsing the Internet?
Correct Answer
A. Downloading files from a web site
Explanation
Downloading files from a web site is the most likely action to infect a computer with a virus while browsing the Internet. When downloading files, there is a risk of inadvertently downloading a file that contains malware or a virus. This can happen if the file is disguised as something harmless or if the website itself is compromised. It is important to be cautious when downloading files from the Internet and to use reliable sources to minimize the risk of virus infections.
10.
Which one of the following is a commonly used web browser?
Correct Answer
A. Windows Internet Explorer
Explanation
Windows Internet Explorer is a commonly used web browser. It is developed by Microsoft and comes pre-installed on Windows operating systems. It has been one of the most popular web browsers for many years, although its usage has declined in recent years with the rise of other browsers such as Mozilla Firefox and Google Chrome.
11.
What is a digital signature?
Correct Answer
C. An electronic signature that is used to validate the identity of the source of a message
Explanation
A digital signature is an electronic signature that is used to validate the identity of the source of a message. It is a cryptographic technique that ensures the integrity and authenticity of digital documents or messages. By using a digital signature, the recipient can verify that the message has not been tampered with and that it originated from the claimed sender. This provides a level of trust and security in electronic communication.
12.
Which one of the following is a scheme where criminals send unsolicited e-mail or pop-up messages to get personal and financial information from unsuspecting victims?
Correct Answer
B. pHishing
Explanation
Phishing is a scheme where criminals send unsolicited e-mail or pop-up messages to deceive and trick unsuspecting victims into providing personal and financial information. This information is then used for fraudulent purposes such as identity theft or financial fraud.
13.
What does the https indicate in a URL address?
Correct Answer
A. Encrypted transaction of data
Explanation
The "https" in a URL address indicates that the data being transmitted between the user's browser and the website is encrypted. This ensures that any sensitive information, such as passwords or credit card details, is secure and cannot be intercepted by unauthorized individuals.
14.
What would cause a problem when sending an email.
Correct Answer
B. Attaching an executable file
Explanation
Attaching an executable file can cause a problem when sending an email because executable files can contain malicious code or viruses that can harm the recipient's computer or network. Many email providers and spam filters have restrictions in place to prevent the sending or receiving of executable files for security reasons. Therefore, attempting to send an email with an executable file attached may result in the email being blocked or flagged as potentially harmful.
15.
What is a Spam?
Correct Answer
B. Unsolicited email which are sent to a large number of recipients
Explanation
Spam refers to unsolicited emails that are sent to a large number of recipients. These emails are typically unwanted and often contain advertisements, scams, or other forms of unwanted content. The term "spam" originated from a Monty Python sketch where a group of Vikings continuously sang the word "spam," which eventually came to represent unwanted and excessive messages. Therefore, the correct answer accurately describes the definition of spam as unsolicited emails sent to a large number of recipients.
16.
During communication over the internet, there is an expression for how users should formulate and express themselves correctly. What is this called?
Correct Answer
B. Netiquette
Explanation
Netiquette refers to the guidelines and rules for proper behavior and communication while using the internet. It involves using polite and respectful language, avoiding spamming or trolling, and being mindful of others' privacy and online presence. Netiquette helps maintain a positive and harmonious online environment, ensuring effective and respectful communication between internet users.
17.
What is a Cookie?
Correct Answer
A. A cookie is a small identifer file placed on the hard disk
Explanation
A cookie is a small identifier file that is placed on the hard disk. It is used by websites to store information about the user's browsing activity and preferences. This information is then used to personalize the user's experience on the website, such as remembering login credentials or keeping items in a shopping cart. Cookies are also commonly used for tracking purposes, allowing websites to gather data on user behavior for analytics and advertising purposes.
18.
A Google Docs account can be created:
Correct Answer
A. By using any active email address.
Explanation
The correct answer is "by using any active email address." This means that you can create a Google Docs account using any email address, not just a Gmail account. This allows users to have flexibility and convenience in creating their Google Docs account, as they can use their preferred email provider.
19.
Google Docs allows you to create the following documents:
Correct Answer
D. All of the above
Explanation
Google Docs is a web-based platform that offers various document creation tools. It allows users to create documents, spreadsheets, and presentations. Therefore, the correct answer is "all of the above" because Google Docs provides the functionality to create all three types of documents mentioned in the options.
20.
Your edits and additions are saved almost instantly. There is no need to hit ‘save’ multiple times, since Google Doc does it for you, automatically.
Correct Answer
A. True
Explanation
The given statement explains that edits and additions made in Google Docs are saved almost instantly without the need to hit the save button multiple times. This means that the document is automatically saved by Google Docs, ensuring that the changes made are immediately recorded and no data is lost. Therefore, the correct answer is "True".
21.
With Google presentations, you can easily create, share, and edit online presentations. Some things you can do with Google presentations include:
Correct Answer
E. All of the above
Explanation
The correct answer is "all of the above" because the statement mentions that with Google presentations, you can import presentations in .ppt and .pps file types, export your online ones, insert images and videos, format your slides as you want, allow simultaneous real-time viewing of presentations from remote locations, and publish and embed your presentations in a website for the world to view. Therefore, all of these options are included in what you can do with Google presentations.
22.
Google Docs does not allow you to publish a document or presentation to the public Internet.
Correct Answer
B. False
Explanation
Google Docs actually does allow you to publish a document or presentation to the public Internet. By changing the sharing settings of a document or presentation, you can generate a link that can be accessed by anyone with the link. This allows you to share your document or presentation with a wider audience, including those who do not have a Google account. Therefore, the correct answer is False.
23.
Google docs are
Correct Answer
B. Only accessible to others that you explicitly share them with.
Explanation
Google Docs are only accessible to others that you explicitly share them with. This means that you have control over who can view, edit, or comment on your documents. By default, Google Docs are not accessible to everyone on the internet, ensuring that your documents remain private and secure.
24.
When sharing documents there are two options, depending on how much access you would like others to have. These are
Correct Answer
A. Viewers or collaborators
Explanation
The correct answer is viewers or collaborators. When sharing documents, you can choose to give others either viewing access or collaborative access. Viewers can only see the document and make comments, while collaborators can actively edit and make changes to the document. This allows for different levels of involvement and control when sharing documents with others.
25.
Do you download the newest and latest players of your web browser, adobe flash, or Java Player?
Correct Answer
B. Yea, I'd say I do. I'm not obsessed, but if some website like Youtube or Additinggames needs it, I'll agree and download.
Explanation
The person agrees to download the newest and latest players of their web browser, Adobe Flash, or Java Player if a website like Youtube or Addictinggames requires it. They are not obsessed with keeping up to date with their computer, but they will download the necessary players when needed.
26.
What does Gmail stand for? And while you're at it, what is elgooG?
Correct Answer
Gmail? That is like insanely easy. Gmail stands for Google Mail. elgooG is Google backwards. Is this quiz supposed to be hard?