1.
Software viruses can invade your computer but cannot spread to other programs or disks.
Correct Answer
B. False
Explanation
Software viruses have the ability to invade a computer and spread to other programs or disks, making copies of themselves and infecting other files or systems. This is one of the main characteristics of a virus, as it aims to replicate and spread its malicious code. Therefore, the statement that software viruses cannot spread to other programs or disks is false.
2.
Computer worms typically travel through computer network systems.
Correct Answer
A. True
Explanation
Computer worms are a type of malware that are designed to spread through computer networks. Unlike viruses, which require a host file to attach themselves to, worms are self-contained programs that can replicate and spread independently. They exploit vulnerabilities in network protocols and security systems to move from one computer to another, often causing widespread damage and disruption. Therefore, it is true that computer worms typically travel through computer network systems.
3.
Computer malicious code, or malware, includes but is not limited to the following: adware, computer viruses, spyware, Trojan horses, and worms.
Correct Answer
A. True
Explanation
The statement is true because computer malicious code, also known as malware, encompasses various types of harmful software such as adware, computer viruses, spyware, Trojan horses, and worms. These malicious programs are designed to disrupt computer systems, steal sensitive information, or gain unauthorized access to networks. Therefore, the given answer is correct.
4.
Information on the internet is frequently monitored by the Internet police.
Correct Answer
B. False
Explanation
The statement "Information on the internet is frequently monitored by the Internet police" is not true. While there may be some instances of monitoring by law enforcement agencies, it is not accurate to say that internet information is frequently monitored by the "Internet police" as a general rule. Monitoring internet activity on a large scale would be a massive undertaking and not practical for most law enforcement agencies. Additionally, there are privacy laws and protections in place that limit the extent to which internet information can be monitored without proper legal justification.
5.
Computer networks allow two-way transmission, which means information can flow back and forth.
Correct Answer
A. True
Explanation
Computer networks allow for two-way transmission, meaning that information can be sent and received between connected devices. This allows for efficient communication and sharing of data between multiple devices on the network. With two-way transmission, users can both send and receive information, enabling interactive and collaborative processes.
6.
It is important to check the date the webpage was last updated because information can quickly become obsolete.
Correct Answer
A. True
Explanation
Checking the date the webpage was last updated is important because information on the internet can become outdated quickly. Websites may contain information that is no longer accurate or relevant, especially in rapidly changing fields such as technology, news, or scientific research. By checking the date of the last update, users can ensure that they are accessing the most current and reliable information available.
7.
Electronic destruction of information and property is often more expensive than physical destruction of information and property.
Correct Answer
A. True
Explanation
Electronic destruction of information and property is often more expensive than physical destruction due to various factors. Firstly, electronic devices and systems are generally more complex and require specialized expertise to properly destroy and dispose of. This can involve hiring professionals or purchasing specialized equipment, which adds to the cost. Additionally, electronic destruction often requires additional measures to ensure data security, such as data wiping or encryption, which can further increase the expenses. On the other hand, physical destruction methods like shredding or incineration may be relatively simpler and more cost-effective.
8.
Anyone can put up a website on the Internet, so check your source of information.
Correct Answer
A. True
Explanation
This statement is true because anyone can indeed put up a website on the Internet. The Internet provides a platform for individuals and organizations to create and publish websites, allowing them to share information and content with a global audience. However, it is important to check the source of information found on websites, as not all sources may be reliable or accurate.
9.
When gathering research resources on the Internet, the domain name suffix .edu would be less reliable than the domain name suffix .com
Correct Answer
B. False
Explanation
The explanation for the given correct answer is that the domain name suffix .edu is actually more reliable than the domain name suffix .com when gathering research resources on the Internet. The .edu domain is reserved for educational institutions, such as universities and colleges, which often provide more credible and reliable information compared to commercial websites with the .com domain. Therefore, the statement that .edu would be less reliable is incorrect.
10.
A computer server's domain name is a name that represent's its IP number.
Correct Answer
A. True
Explanation
A computer server's domain name is a unique name that is used to represent its IP number. The domain name system (DNS) translates domain names into IP addresses, allowing users to access websites and services using memorable names instead of numeric IP addresses. This system helps to simplify the process of connecting to servers on the internet. Therefore, the statement "A computer server's domain name is a name that represents its IP number" is true.
11.
A firewall could be considered a form of censorhip.
Correct Answer
A. True
Explanation
A firewall can be considered a form of censorship because it acts as a barrier between a private network and the internet, controlling the flow of information. It can block certain websites or restrict access to specific content, effectively limiting what users can see or do online. This control over information can be seen as a form of censorship, as it restricts the free flow of information and limits users' access to certain resources.
12.
The internet and the WWW are one and the same.
Correct Answer
B. False
Explanation
The internet and the World Wide Web (WWW) are not the same thing. The internet is a global network of interconnected computers that allows communication and data transfer between them. On the other hand, the WWW is a system of interconnected documents and other resources, linked by hyperlinks and URLs, that can be accessed via the internet. While the internet is the infrastructure that enables the WWW to exist, they are distinct entities with different purposes and functionalities.
13.
When searching the WWW, using the and boolean operator instead of the or will give you more results.
Correct Answer
B. False
Explanation
Using the "and" boolean operator when searching the WWW will actually give you fewer results, not more. The "and" operator narrows down the search by requiring all the search terms to be present in the results. On the other hand, using the "or" operator broadens the search by allowing any of the search terms to be present in the results. Therefore, the correct answer is false.
14.
When using MLA format, the pages that include all of the references that you used in your paper is called the Bibliography.
Correct Answer
B. False
Explanation
In MLA format, the pages that include all of the references used in a paper are called the Works Cited page, not the Bibliography. The Works Cited page is a list of all the sources cited in the paper, while the Bibliography includes all the sources consulted, whether or not they were directly cited. Therefore, the correct answer is False.
15.
One of the advantages of networking a computer lab or a workplace environment is that it reduces the amount of software that is installed.
Correct Answer
A. True
Explanation
Networking a computer lab or workplace environment allows for centralized management and control of software installations. Instead of installing software on each individual computer, it can be installed on a central server and accessed by all connected computers. This reduces the time and effort required for software installation and updates, as well as ensuring consistency across all devices. Additionally, it allows for easier license management and reduces the risk of unauthorized software installations. Therefore, the statement is true.
16.
When using MLA formatting, if you use an online source, then you should always include the date tat you accessed the website.
Correct Answer
A. True
Explanation
In MLA formatting, it is important to include the date that you accessed an online source because online content can change or be updated over time. Including the date allows readers to understand the context in which you accessed the information and ensures that they can locate the same version of the source if needed. This helps to maintain the accuracy and credibility of your research. Therefore, the statement "When using MLA formatting, if you use an online source, then you should always include the date that you accessed the website" is true.
17.
Web pages are created by authors using a language called:
Correct Answer
D. HTML
Explanation
Web pages are created by authors using a language called HTML. HTML stands for HyperText Markup Language and is the standard markup language for creating web pages. It is used to structure the content of a web page by using tags to define elements such as headings, paragraphs, images, links, and more. HTML is the foundation of the World Wide Web and is essential for creating and displaying web pages in browsers.
18.
To block communication to and from sources you do not permit, you could use:
Correct Answer
C. A firewall
Explanation
A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between trusted internal networks and untrusted external networks, allowing only authorized communication and blocking any unauthorized access or malicious activities. By configuring the firewall rules, you can restrict communication to and from specific sources that you do not permit, enhancing the overall network security. Therefore, a firewall is the most suitable option among the given choices to block communication with unauthorized sources.
19.
Computer worms can:
Correct Answer
D. All of the above
Explanation
Computer worms are a type of malicious software that can spread across computer networks, infecting multiple systems. They have the ability to replicate themselves and spread to other computers without any user intervention. Additionally, worms are designed to search for uninfected workstations to occupy, further propagating their presence. Therefore, the correct answer is "all of the above" as computer worms can travel over networks, reproduce, and search for uninfected workstations.
20.
The URL is a
Correct Answer
C. Web address
Explanation
A web address, also known as a URL (Uniform Resource Locator), is a unique identifier that specifies the location of a resource on the internet. It is used by web browsers to locate and access websites or specific web pages. A web address consists of various components, including the protocol (such as HTTP or HTTPS), the domain name, and the path to the specific resource. It is different from a web browser, which is a software application used to access and view websites, or a web engine, which is the core software component that processes and displays web content.
21.
How can you determine if a web page is outdated?
Correct Answer
B. Check the date posted and/or last updated
Explanation
To determine if a web page is outdated, one can check the date posted and/or last updated. This information provides a clear indication of when the content was last modified, allowing users to assess the relevance and accuracy of the information provided. By checking the date, users can make informed decisions about whether to trust the content or seek more up-to-date sources.
22.
Which of the following definitions best describes an IP address?
Correct Answer
B. 32 bit address assigned to host/servers
Explanation
An IP address is a 32-bit numerical label assigned to devices connected to a computer network. It serves as an identifier for the host or server within the network, allowing for communication and data transfer between devices. The IP address is essential for routing data packets across the internet and ensures that they reach the correct destination.
23.
The http://www part of a web address is known as the
Correct Answer
D. Protocol
Explanation
The http://www part of a web address is known as the protocol. The protocol is the set of rules that determines how data is transmitted over the internet. In this case, "http" stands for Hypertext Transfer Protocol, which is the protocol used for transmitting web pages and other resources on the World Wide Web. The "www" is a subdomain that is commonly used to indicate that the website is part of the World Wide Web. Therefore, the correct answer is protocol.
24.
To set or create double spacing, you would:
Correct Answer
D. Both b & c
Explanation
To set or create double spacing, you can either depress the Ctrl and 2 key simultaneously or go to Format Paragraph. Both options are correct and will achieve the desired result of double spacing.
25.
The malicious activity that a computer virus or worm causes is called:
Correct Answer
B. Payload
Explanation
The correct answer is "Payload". In the context of computer viruses or worms, the term "payload" refers to the malicious activity or code that is designed to cause harm to a system or network. It can include actions such as deleting files, stealing data, or spreading the virus to other computers. The payload is the primary objective of the virus or worm and is what distinguishes it from other types of malware.
26.
In MLA formatting, parenthetical references should appear as:
Correct Answer
A. (Skipper 17)
Explanation
The correct answer is "(Skipper 17)". In MLA formatting, parenthetical references should include the author's last name and the page number of the source being cited. In this case, the author's last name is "Skipper" and the page number is "17".
27.
Who invented hyperlinking, HTML code and came up with the WWW?
Correct Answer
Tim Lee
Tim Berners Lee
Tim Berners
tim berners lee
Explanation
Tim Berners-Lee is the correct answer. He is credited with inventing hyperlinking, HTML code, and coming up with the World Wide Web (WWW). His contributions revolutionized the way information is shared and accessed on the internet.
28.
Approximately when did the military come up with the idea of "The Internet"?
Correct Answer
C. Late 1950's
Explanation
In the late 1950s, the military came up with the idea of "The Internet". During this time, the Advanced Research Projects Agency (ARPA) in the United States initiated research on creating a network of computers that could communicate with each other. This eventually led to the development of ARPANET, the precursor to the modern internet.
29.
Three different network topologies.
Correct Answer
Star
Bus
Ring
Circle
Explanation
The given answer lists four different network topologies: Star, Bus, Ring, and Circle. These are all valid examples of network topologies. A star topology consists of a central node connected to multiple peripheral nodes, resembling a star shape. A bus topology uses a single cable to connect all devices in a linear manner. A ring topology connects devices in a circular loop, where each device is connected to two neighboring devices. A circle topology is similar to a ring topology but allows for bidirectional communication between devices.
30.
How would you know if the author of a website is an authority on the subject for which he/she has published?