Adv. Bta Internet Basics

17 Questions

Settings
Please wait...
Questions and Answers
  • 1. 
    List two things that are considered proper ways to interact online.
  • 2. 
    List two waysto protect your information while using the Internet.
  • 3. 
    Discuss two rules of etiquette and safety when texting.
  • 4. 
     A software system that is designed to find information on the World Wide Web.
    • A. 

      Web Browser

    • B. 

      Web Search Engine

    • C. 

      HTML

  • 5. 
     A software system that is designed to allow access to the Internet.
    • A. 

      Web Browser

    • B. 

      Web Search Engine

    • C. 

      HTML

  • 6. 
    Select the Item Below that is not a Web Browser
    • A. 

      Google Chrome

    • B. 

      Yahoo

    • C. 

      Safari

    • D. 

      Opera

  • 7. 
    Which browser below is one of the best to use.
    • A. 

      Google Chrome

    • B. 

      FireFox

    • C. 

      Avant

    • D. 

      Safari

  • 8. 
    Harassement by email, text, online games, and comments on social network sites is considered to be:
    • A. 

      Socializing

    • B. 

      Cyberbullying

    • C. 

      Communicating Online

  • 9. 
    Send inappropriate images and/or videos from mobile phones is called....
    • A. 

      Data Sharing

    • B. 

      Sexting

    • C. 

      Software Piracy

  • 10. 
    Viruses and spyware that steal personal information and send spam is considered to be.....
    • A. 

      Phishing

    • B. 

      Malware

    • C. 

      Piracy

  • 11. 
    The process enables tow or more people to chat in real time and make notification when someone on your buddy lis is online.
    • A. 

      Chat Room

    • B. 

      Instant Messaging

    • C. 

      Blog

  • 12. 
    This is a site where you regularly post personal observations on the Internet.
    • A. 

      Blog

    • B. 

      Instant Messaging

    • C. 

      Hacking

  • 13. 
    This process is the act of breaking into a computer or network by evading or disabling security measures.
    • A. 

      Hacking

    • B. 

      Blocking Software

    • C. 

      Malware

  • 14. 
    When people are tricked into disclosing personal, financial, and other sensitive information by the use of pop-ups, or text messages.
    • A. 

      Hacking

    • B. 

      Phishing

    • C. 

      Virus

  • 15. 
    This is a computer simulated online place where people use avatars to represent themselves.
    • A. 

      Social Networking

    • B. 

      Peer-to-Peer

    • C. 

      Virtual World

  • 16. 
    When Interacting with tact on the Internet, which statement below is correct.
    • A. 

      Politeness and speaking up is important when communicating online

    • B. 

      Avatars are not people and do not have feelings

  • 17. 
    • A. 

      Email, Cell Phone, & DVD Player

    • B. 

      Texting, Email, Chat, & IM

    • C. 

      Chat, IM, MP3 Player & IPod