Telecommunications Open Note Test

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By V_burford
V
V_burford
Community Contributor
Quizzes Created: 2 | Total Attempts: 1,077
| Attempts: 112 | Questions: 17
Please wait...
Question 1 / 17
0 %
0/100
Score 0/100
1. Mr. Castle decides who can access what software in WHMS's network because he is 

Explanation

Mr. Castle decides who can access what software in WHMS's network because he is the network administrator. As the network administrator, Mr. Castle is responsible for managing and maintaining the network infrastructure, including user access and permissions. He has the authority to determine which users have access to specific software and can control and monitor their activities within the network. This role requires technical expertise and knowledge of the network's security protocols, making Mr. Castle the appropriate person to make such decisions.

Submit
Please wait...
About This Quiz
Telecommunications Open Note Test - Quiz

You may use your Telecommunications Notes 1 and Telecommunications Notes 2 to answer the questions on this test.

Personalize your quiz and earn a certificate with your name on it!
2. A ________________ is a software program used by a search site to find web pages that match certain criteria.  

Explanation

A search engine is a software program used by a search site to find web pages that match certain criteria. It scans the internet and indexes web pages based on keywords and other factors, allowing users to search for specific information. Search engines like Google, Bing, and Yahoo use complex algorithms to provide relevant search results to users based on their queries.

Submit
3. What is the computer software that keeps people from being able to access private information on your computer?

Explanation

Firewall software is designed to protect a computer or network from unauthorized access and threats from the internet. It acts as a barrier between the computer and the outside world, monitoring incoming and outgoing network traffic. It can block unauthorized access attempts and prevent hackers from accessing private information on the computer. Unlike a browser, which is a software application used to access and view websites, firewall software specifically focuses on security and preventing unauthorized access to private information. Filtering software is typically used to restrict or control access to certain websites or content, while a search engine is a tool used to search for information on the internet.

Submit
4. According to the state of North Carolina, what is most efficient way to send documents?

Explanation

E-mailing the documents is the most efficient way to send them according to the state of North Carolina. This method allows for quick and easy transmission of the documents, eliminating the need for physical delivery or manual transcription. It also ensures that the documents can be easily stored, accessed, and shared electronically, saving time and resources.

Submit
5. If you download something

Explanation

The correct answer is "you are receiving something from the Internet." When you download something, it means that you are retrieving data or files from the Internet onto your computer or device. This could include downloading documents, music, videos, or software. It is a common and legal activity that allows users to access and save content from the Internet for personal use.

Submit
6. What is the piece of HARDWARE that allows computers to connect to the Internet by using things like telephone lines?

Explanation

A modem is the correct answer because it is a piece of hardware that allows computers to connect to the internet using telephone lines. It converts digital signals from the computer into analog signals that can be transmitted over telephone lines, and vice versa, allowing for internet connectivity. A browser is a software application used to access and view websites, not a hardware component. A search engine is a website or software used to search for information on the internet. A printer is a device used to produce hard copies of digital documents and is not directly involved in connecting to the internet.

Submit
7. If a school has 100 computers that are all networked, what is the smallest number of printers that the school needs?

Explanation

In order for all the computers in the school to be able to print, there needs to be at least one printer. Even though there are 100 computers, it is still possible for all of them to use just one printer. Therefore, the smallest number of printers that the school needs is 1.

Submit
8. Why are some words on the Internet blue and underlined?

Explanation

The words on the Internet are blue and underlined because they represent hyperlinks. Hyperlinks are clickable elements that allow users to navigate to different web pages or resources. By making these words stand out with a different color and underlining them, it helps users identify which parts of the text are clickable and can take them to another page or website. This enhances the user experience and makes it easier for users to navigate and access relevant information.

Submit
9. A _________ is a software program used for viewing the Internet and/or the World Wide Web.

Explanation

A browser is a software program used for viewing the Internet and/or the World Wide Web. It allows users to access websites, search for information, and interact with web pages. Browsers interpret and display HTML files, allowing users to navigate through websites by clicking on links and buttons. They also support features like bookmarks, history, and extensions, enhancing the browsing experience. Overall, a browser is an essential tool for accessing and exploring the vast amount of information available on the internet.

Submit
10. A website that wanted to sell you something would have _______________ in it's address

Explanation

A website that wanted to sell you something would have ".com" in its address because ".com" is the most commonly used top-level domain (TLD) for commercial websites. It stands for "commercial" and is widely recognized as indicating a website that is primarily focused on selling products or services. Other TLDs such as ".org" (for non-profit organizations), ".mil" (for military), and ".money" (for financial services) are less likely to be used by websites that are specifically designed for selling purposes.

Submit
11. If you wanted to keep an online journal about a specific topic and you wanted a lot of people to see it at one time, you would make 

Explanation

A blog would be the most suitable option for keeping an online journal about a specific topic and reaching a large audience. Unlike an email message, which is limited to the recipients you choose, a blog allows anyone with internet access to view and engage with your content. A flame refers to an aggressive and insulting online message, which is not relevant to the question. A.pdf document is a file format that is not specifically designed for sharing and interacting with a large number of people simultaneously.

Submit
12. Ms. Burford is sending you a secret message. She is going to mix up the letters in the message and only you will have a "key" that unscrambles the words. This is an example of

Explanation

This scenario describes the process of encryption, where Ms. Burford is scrambling the letters in the message to make it unreadable without a specific key to unscramble it. Encryption is a common technique used to protect sensitive information and ensure that only authorized individuals can access it.

Submit
13. How many times do you have to click on a hyperlink to go to another page/place?

Explanation

You only have to click on a hyperlink once to go to another page/place. A hyperlink is designed to redirect you to a different location with just one click.

Submit
14. Which of the following is a WAN?

Explanation

The Internet is a WAN (Wide Area Network) because it connects computers and networks across vast geographical distances, often spanning countries or even continents. It is a global network that allows for communication and data transfer between devices worldwide. Unlike a LAN (Local Area Network) which is limited to a specific area like a school building or a room, the Internet is accessible to users everywhere and enables connectivity on a much larger scale.

Submit
15. What is a procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.

Explanation

Encryption is the process of converting information or data into a code or cipher, making it unreadable to unauthorized individuals. It ensures that only authorized parties can access and understand the contents of a message or file, protecting it from being intercepted or understood by hackers or unauthorized users. Encryption is commonly used in various communication channels, such as email, messaging apps, and online transactions, to provide secure and private communication.

Submit
16. AUP stands for

Explanation

The correct answer is "Acceptable Use Policies". AUP stands for Acceptable Use Policies, which are a set of rules and guidelines that define the acceptable and appropriate use of a system, network, or service. These policies are put in place to ensure that users understand their responsibilities and obligations when using a particular resource. AUPs typically outline what actions are considered acceptable and unacceptable, as well as the consequences for violating these policies.

Submit
17. If you "flame" someone

Explanation

"Flaming" refers to the act of sending someone an angry or hostile email, typically in an online discussion or forum. This term originated from the idea of someone becoming so angry that their words could be seen as "flames" or insults. It does not involve setting up a firewall, destroying something posted online, or setting fire to CDs.

Submit
View My Results

Quiz Review Timeline (Updated): Dec 5, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Dec 05, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 31, 2009
    Quiz Created by
    V_burford
Cancel
  • All
    All (17)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Mr. Castle decides who can access what software in WHMS's network...
A ________________ is a software program used by a search site to...
What is the computer software that keeps people from being able to...
According to the state of North Carolina, what is most efficient way...
If you download something
What is the piece of HARDWARE that allows computers to connect to the...
If a school has 100 computers that are all networked, what is the...
Why are some words on the Internet blue and underlined?
A _________ is a software program used for viewing the ...
A website that wanted to sell you something would have _______________...
If you wanted to keep an online journal about a specific topic and you...
Ms. Burford is sending you a secret message. She is going to mix up...
How many times do you have to click on a hyperlink to go to another...
Which of the following is a WAN?
What is a procedure that renders the contents of a message ...
AUP stands for
If you "flame" someone
Alert!

Advertisement