Unit 3 Test On Internet Basics

By Selena Skipper
Selena Skipper, Business teacher
Selena, a dedicated Business Teacher with 26 years of experience, currently imparts knowledge at the Cullman Area Technology Academy. Her passion lies in guiding students to discover their career paths and achieve valuable certifications.
Quizzes Created: 12 | Total Attempts: 64,782
, Business teacher
Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
Questions: 30 | Attempts: 3,884

SettingsSettingsSettings
Unit 3 Test On Internet Basics - Quiz

Test on Internet Basics that include understanding networks, viruses, worms, URL's, evaluating websites and MLA formatting.


Questions and Answers
  • 1. 

    Software viruses can invade your computer but cannot spread to other programs or disks.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Software viruses have the ability to invade a computer and spread to other programs or disks, making copies of themselves and infecting other files or systems. This is one of the main characteristics of a virus, as it aims to replicate and spread its malicious code. Therefore, the statement that software viruses cannot spread to other programs or disks is false.

    Rate this question:

  • 2. 

    Computer worms typically travel through computer network systems.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Computer worms are a type of malware that are designed to spread through computer networks. Unlike viruses, which require a host file to attach themselves to, worms are self-contained programs that can replicate and spread independently. They exploit vulnerabilities in network protocols and security systems to move from one computer to another, often causing widespread damage and disruption. Therefore, it is true that computer worms typically travel through computer network systems.

    Rate this question:

  • 3. 

    Computer malicious code, or malware, includes but is not limited to the following:  adware, computer viruses, spyware, Trojan horses, and worms.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement is true because computer malicious code, also known as malware, encompasses various types of harmful software such as adware, computer viruses, spyware, Trojan horses, and worms. These malicious programs are designed to disrupt computer systems, steal sensitive information, or gain unauthorized access to networks. Therefore, the given answer is correct.

    Rate this question:

  • 4. 

    Information on the internet is frequently monitored by the Internet police.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement "Information on the internet is frequently monitored by the Internet police" is not true. While there may be some instances of monitoring by law enforcement agencies, it is not accurate to say that internet information is frequently monitored by the "Internet police" as a general rule. Monitoring internet activity on a large scale would be a massive undertaking and not practical for most law enforcement agencies. Additionally, there are privacy laws and protections in place that limit the extent to which internet information can be monitored without proper legal justification.

    Rate this question:

  • 5. 

    Computer networks allow two-way transmission, which means information can flow back and forth.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Computer networks allow for two-way transmission, meaning that information can be sent and received between connected devices. This allows for efficient communication and sharing of data between multiple devices on the network. With two-way transmission, users can both send and receive information, enabling interactive and collaborative processes.

    Rate this question:

  • 6. 

    It is important to check the date the webpage was last updated because information can quickly become obsolete.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Checking the date the webpage was last updated is important because information on the internet can become outdated quickly. Websites may contain information that is no longer accurate or relevant, especially in rapidly changing fields such as technology, news, or scientific research. By checking the date of the last update, users can ensure that they are accessing the most current and reliable information available.

    Rate this question:

  • 7. 

    Electronic destruction of information and property is often more expensive than physical destruction of information and property.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Electronic destruction of information and property is often more expensive than physical destruction due to various factors. Firstly, electronic devices and systems are generally more complex and require specialized expertise to properly destroy and dispose of. This can involve hiring professionals or purchasing specialized equipment, which adds to the cost. Additionally, electronic destruction often requires additional measures to ensure data security, such as data wiping or encryption, which can further increase the expenses. On the other hand, physical destruction methods like shredding or incineration may be relatively simpler and more cost-effective.

    Rate this question:

  • 8. 

    Anyone can put up a website on the Internet, so check your source of information.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    This statement is true because anyone can indeed put up a website on the Internet. The Internet provides a platform for individuals and organizations to create and publish websites, allowing them to share information and content with a global audience. However, it is important to check the source of information found on websites, as not all sources may be reliable or accurate.

    Rate this question:

  • 9. 

    When gathering research resources on the Internet, the domain name suffix .edu would be less reliable than the domain name suffix .com

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The explanation for the given correct answer is that the domain name suffix .edu is actually more reliable than the domain name suffix .com when gathering research resources on the Internet. The .edu domain is reserved for educational institutions, such as universities and colleges, which often provide more credible and reliable information compared to commercial websites with the .com domain. Therefore, the statement that .edu would be less reliable is incorrect.

    Rate this question:

  • 10. 

    A computer server's domain name is a name that represent's its IP number.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A computer server's domain name is a unique name that is used to represent its IP number. The domain name system (DNS) translates domain names into IP addresses, allowing users to access websites and services using memorable names instead of numeric IP addresses. This system helps to simplify the process of connecting to servers on the internet. Therefore, the statement "A computer server's domain name is a name that represents its IP number" is true.

    Rate this question:

  • 11. 

    A firewall could be considered a form of censorhip.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A firewall can be considered a form of censorship because it acts as a barrier between a private network and the internet, controlling the flow of information. It can block certain websites or restrict access to specific content, effectively limiting what users can see or do online. This control over information can be seen as a form of censorship, as it restricts the free flow of information and limits users' access to certain resources.

    Rate this question:

  • 12. 

    The internet and the WWW are one and the same.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The internet and the World Wide Web (WWW) are not the same thing. The internet is a global network of interconnected computers that allows communication and data transfer between them. On the other hand, the WWW is a system of interconnected documents and other resources, linked by hyperlinks and URLs, that can be accessed via the internet. While the internet is the infrastructure that enables the WWW to exist, they are distinct entities with different purposes and functionalities.

    Rate this question:

  • 13. 

    When searching the WWW, using the  and boolean operator instead of the or will give you more results.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Using the "and" boolean operator when searching the WWW will actually give you fewer results, not more. The "and" operator narrows down the search by requiring all the search terms to be present in the results. On the other hand, using the "or" operator broadens the search by allowing any of the search terms to be present in the results. Therefore, the correct answer is false.

    Rate this question:

  • 14. 

    When using MLA format, the pages that include all of the references that you used in your paper is called the Bibliography.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    In MLA format, the pages that include all of the references used in a paper are called the Works Cited page, not the Bibliography. The Works Cited page is a list of all the sources cited in the paper, while the Bibliography includes all the sources consulted, whether or not they were directly cited. Therefore, the correct answer is False.

    Rate this question:

  • 15. 

    One of the advantages of networking a computer lab or a workplace environment is that it reduces the amount of software that is installed.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Networking a computer lab or workplace environment allows for centralized management and control of software installations. Instead of installing software on each individual computer, it can be installed on a central server and accessed by all connected computers. This reduces the time and effort required for software installation and updates, as well as ensuring consistency across all devices. Additionally, it allows for easier license management and reduces the risk of unauthorized software installations. Therefore, the statement is true.

    Rate this question:

  • 16. 

    When using MLA formatting, if you use an online source, then you should always include the date tat you accessed the website.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    In MLA formatting, it is important to include the date that you accessed an online source because online content can change or be updated over time. Including the date allows readers to understand the context in which you accessed the information and ensures that they can locate the same version of the source if needed. This helps to maintain the accuracy and credibility of your research. Therefore, the statement "When using MLA formatting, if you use an online source, then you should always include the date that you accessed the website" is true.

    Rate this question:

  • 17. 

    Web pages are created by authors using a language called:

    • A.

      Basic

    • B.

      COBOL

    • C.

      WWW

    • D.

      HTML

    Correct Answer
    D. HTML
    Explanation
    Web pages are created by authors using a language called HTML. HTML stands for HyperText Markup Language and is the standard markup language for creating web pages. It is used to structure the content of a web page by using tags to define elements such as headings, paragraphs, images, links, and more. HTML is the foundation of the World Wide Web and is essential for creating and displaying web pages in browsers.

    Rate this question:

  • 18. 

    To block communication to and from sources you do not permit, you could use:

    • A.

      A router

    • B.

      A Trojan Horse

    • C.

      A firewall

    • D.

      A network card

    Correct Answer
    C. A firewall
    Explanation
    A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between trusted internal networks and untrusted external networks, allowing only authorized communication and blocking any unauthorized access or malicious activities. By configuring the firewall rules, you can restrict communication to and from specific sources that you do not permit, enhancing the overall network security. Therefore, a firewall is the most suitable option among the given choices to block communication with unauthorized sources.

    Rate this question:

  • 19. 

    Computer worms can:

    • A.

      Travel over computer networks

    • B.

      Reproduce

    • C.

      Search uninfected workstations to occupy

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    Computer worms are a type of malicious software that can spread across computer networks, infecting multiple systems. They have the ability to replicate themselves and spread to other computers without any user intervention. Additionally, worms are designed to search for uninfected workstations to occupy, further propagating their presence. Therefore, the correct answer is "all of the above" as computer worms can travel over networks, reproduce, and search for uninfected workstations.

    Rate this question:

  • 20. 

    The URL is a

    • A.

      Web browser

    • B.

      Web photo

    • C.

      Web address

    • D.

      Web engine

    Correct Answer
    C. Web address
    Explanation
    A web address, also known as a URL (Uniform Resource Locator), is a unique identifier that specifies the location of a resource on the internet. It is used by web browsers to locate and access websites or specific web pages. A web address consists of various components, including the protocol (such as HTTP or HTTPS), the domain name, and the path to the specific resource. It is different from a web browser, which is a software application used to access and view websites, or a web engine, which is the core software component that processes and displays web content.

    Rate this question:

  • 21. 

    How can you determine if a web page is outdated?

    • A.

      Email the author

    • B.

      Check the date posted and/or last updated

    • C.

      Check the hyperlinks

    • D.

      Call the library

    Correct Answer
    B. Check the date posted and/or last updated
    Explanation
    To determine if a web page is outdated, one can check the date posted and/or last updated. This information provides a clear indication of when the content was last modified, allowing users to assess the relevance and accuracy of the information provided. By checking the date, users can make informed decisions about whether to trust the content or seek more up-to-date sources.

    Rate this question:

  • 22. 

    Which of the following definitions best describes an IP address?

    • A.

      Network interface card

    • B.

      32 bit address assigned to host/servers

    • C.

      Standardized link layer

    • D.

      The register in the CPR that holds the address of the next instruction

    Correct Answer
    B. 32 bit address assigned to host/servers
    Explanation
    An IP address is a 32-bit numerical label assigned to devices connected to a computer network. It serves as an identifier for the host or server within the network, allowing for communication and data transfer between devices. The IP address is essential for routing data packets across the internet and ensures that they reach the correct destination.

    Rate this question:

  • 23. 

    The http://www part of a web address is known as the

    • A.

      URL

    • B.

      Domain

    • C.

      Folder

    • D.

      Protocol

    Correct Answer
    D. Protocol
    Explanation
    The http://www part of a web address is known as the protocol. The protocol is the set of rules that determines how data is transmitted over the internet. In this case, "http" stands for Hypertext Transfer Protocol, which is the protocol used for transmitting web pages and other resources on the World Wide Web. The "www" is a subdomain that is commonly used to indicate that the website is part of the World Wide Web. Therefore, the correct answer is protocol.

    Rate this question:

  • 24. 

    To set or create double spacing, you would:

    • A.

      Hit the enter key twice

    • B.

      Depress the Ctrl and 2 key simultaneously

    • C.

      Go to Format Paragraph

    • D.

      Both b & c

    Correct Answer
    D. Both b & c
    Explanation
    To set or create double spacing, you can either depress the Ctrl and 2 key simultaneously or go to Format Paragraph. Both options are correct and will achieve the desired result of double spacing.

    Rate this question:

  • 25. 

    The malicious activity that a computer virus or worm causes is called:

    • A.

      Trojan

    • B.

      Payload

    • C.

      Piggyback

    • D.

      Incident

    Correct Answer
    B. Payload
    Explanation
    The correct answer is "Payload". In the context of computer viruses or worms, the term "payload" refers to the malicious activity or code that is designed to cause harm to a system or network. It can include actions such as deleting files, stealing data, or spreading the virus to other computers. The payload is the primary objective of the virus or worm and is what distinguishes it from other types of malware.

    Rate this question:

  • 26. 

    In MLA formatting, parenthetical references should appear as:

    • A.

      (Skipper 17)

    • B.

      (Skipper, p. 17)

    • C.

      (SKIPPER 17)

    • D.

      (Skipper, 1971, p. 17)

    Correct Answer
    A. (Skipper 17)
    Explanation
    The correct answer is "(Skipper 17)". In MLA formatting, parenthetical references should include the author's last name and the page number of the source being cited. In this case, the author's last name is "Skipper" and the page number is "17".

    Rate this question:

  • 27. 

    Who invented hyperlinking, HTML code and came up with the WWW?

    Correct Answer
    Tim Lee
    Tim Berners Lee
    Tim Berners
    tim berners lee
    Explanation
    Tim Berners-Lee is the correct answer. He is credited with inventing hyperlinking, HTML code, and coming up with the World Wide Web (WWW). His contributions revolutionized the way information is shared and accessed on the internet.

    Rate this question:

  • 28. 

    Approximately when did the military come up with the idea of "The Internet"?

    • A.

      Late 1940's

    • B.

      Early 1950's

    • C.

      Late 1950's

    • D.

      1960's

    Correct Answer
    C. Late 1950's
    Explanation
    In the late 1950s, the military came up with the idea of "The Internet". During this time, the Advanced Research Projects Agency (ARPA) in the United States initiated research on creating a network of computers that could communicate with each other. This eventually led to the development of ARPANET, the precursor to the modern internet.

    Rate this question:

  • 29. 

    Three different network topologies.

    Correct Answer
    Star
    Bus
    Ring
    Circle
    Explanation
    The given answer lists four different network topologies: Star, Bus, Ring, and Circle. These are all valid examples of network topologies. A star topology consists of a central node connected to multiple peripheral nodes, resembling a star shape. A bus topology uses a single cable to connect all devices in a linear manner. A ring topology connects devices in a circular loop, where each device is connected to two neighboring devices. A circle topology is similar to a ring topology but allows for bidirectional communication between devices.

    Rate this question:

  • 30. 

    How would  you know if the author of a website is an authority on the subject for which he/she has published?

Selena Skipper |Business teacher
Selena, a dedicated Business Teacher with 26 years of experience, currently imparts knowledge at the Cullman Area Technology Academy. Her passion lies in guiding students to discover their career paths and achieve valuable certifications.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 15, 2010
    Quiz Created by
    Selena Skipper
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.