Electronic Communication & Internet Safety

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Melinda.fornes
M
Melinda.fornes
Community Contributor
Quizzes Created: 3 | Total Attempts: 7,870
| Attempts: 3,783 | Questions: 13
Please wait...
Question 1 / 13
0 %
0/100
Score 0/100
1.  Which of the following information types are the MOST dangerous to disclose?

Explanation

Disclosing your social security number is the most dangerous among the given information types. This is because social security numbers are unique identifiers that can be used by identity thieves to commit various types of fraud, such as opening fraudulent accounts, accessing financial information, or filing false tax returns. Unlike the other information types listed, your social security number is directly linked to your personal and financial identity, making it highly valuable and vulnerable to misuse.

Submit
Please wait...
About This Quiz
Electronic Communication & Internet Safety - Quiz

This quiz covers various aspects of electronic communication and internet safety, focusing on best practices, security protocols, and identifying unsafe online behavior.

2. To promote professionalism and credibility, which word processing tool should ALWAYS be used before sending an e-mail?
       

Explanation

To promote professionalism and credibility, it is important to use the spell and grammar check tool before sending an email. This tool helps to ensure that there are no spelling mistakes or grammatical errors in the email, which can negatively impact the credibility of the sender. By using this tool, the sender can present a polished and error-free email, demonstrating professionalism and attention to detail.

Submit
3. Identity Theft impacts individuals in all of the following ways EXCEPT:

Explanation

Identity theft impacts individuals in all of the following ways except for their pet names. Identity theft typically involves the fraudulent use of someone's personal information, such as their credit and criminal records, financial records and bank accounts. Pet names, on the other hand, are not typically used or targeted in identity theft incidents.

Submit
4. What is the term for an on-line digital media file that can be audio or video and does not require a media player only a computer with Internet access?

Explanation

A podcast is an on-line digital media file that can be audio or video and does not require a media player only a computer with Internet access. It is a form of digital media that is typically episodic and can be downloaded or streamed online. Podcasts have gained popularity for their convenience and accessibility, allowing users to listen or watch content on various topics at their own convenience.

Submit
5.  The “s” in https:// reveals that the site is:

Explanation

The "s" in https:// stands for "secure" and indicates that the site is using a secure and encrypted connection. This means that any information transmitted between the user's browser and the website is encrypted and protected from potential eavesdropping or tampering. Therefore, the correct answer is "Secure and protected."

Submit
6. A cyber bully uses all of the following on-line methods to intimidate EXCEPT:

Explanation

The correct answer is "Pushing, hitting, screaming in person." This is because cyberbullying refers to bullying that takes place online, not in person. The other options listed are all examples of cyberbullying methods, such as using all uppercase to yell, posting fraudulent or malicious information, and posting fake or demeaning pictures of the victim.

Submit
7. Spyware tracks and monitors individual user habits through the use of:

Explanation

Spyware tracks and monitors individual user habits through the use of cookies. Cookies are small text files that are stored on a user's computer by websites they visit. These files contain information about the user's browsing history, preferences, and login details. Spyware can access and collect this data without the user's knowledge or consent, allowing it to track their online activities and gather personal information. Therefore, cookies are commonly used by spyware to monitor and track individual user habits.

Submit
8. With the many types of electronic communication, which is the best for regular entries, commentaries, and most like an on-line diary?

Explanation

A blog is the best option for regular entries, commentaries, and most like an online diary. A blog allows individuals to regularly post their thoughts, experiences, and opinions in a chronological manner. It provides a platform for self-expression and allows readers to engage through comments and feedback. Unlike a discussion board or chat room, a blog provides a more personal and structured format for sharing content. While a podcast may also involve regular entries, it is primarily an audio-based medium and may not offer the same level of interactivity and written expression as a blog.

Submit
9.  Real-time conversations and group on-line discussion needs are best served by:

Explanation

Real-time conversations and group online discussion needs are best served by chat rooms. Chat rooms provide a platform for instant messaging and real-time interaction between multiple participants. They allow users to engage in live discussions, exchange ideas, and collaborate in a more immediate and interactive manner compared to other options like discussion boards, blogs, or podcasts. Chat rooms facilitate quick responses and enable participants to have dynamic conversations, making them an ideal choice for real-time communication and group discussions.

Submit
10. Which of the following e-mail parts should be updated frequently to make sure that the topic is relevant to the body?

Explanation

The subject of an email should be updated frequently to ensure that it accurately reflects the topic discussed in the body of the email. This is important because it helps the recipient quickly understand the purpose of the email and allows them to prioritize and organize their inbox effectively. By updating the subject, the sender can also ensure that the email remains relevant over time, especially if there are multiple email exchanges on the same thread.

Submit
11. E-mail is not confidential. Which of the following notations in an e-mail header indicate that a copy has been sent without that person’s knowledge?

Explanation

The correct answer is BCC. BCC stands for "Blind Carbon Copy" and it is a notation in an email header that indicates that a copy of the email has been sent to someone without the knowledge of the other recipients. When using BCC, the recipients in the "To" and "CC" fields are not able to see the email addresses of the BCC recipients, maintaining their anonymity. This allows for discreet communication and ensures that the BCC recipients remain unaware of each other's involvement in the email conversation.

Submit
12.  Netiquette is BEST defined as:        

Explanation

Netiquette refers to the set of rules and guidelines for proper behavior and communication on the internet. It involves showing respect, being polite, and using appropriate language and tone when interacting with others online. Netiquette helps to create a positive and respectful online environment.

Submit
13. Discussion Boards are safer when they are:

Explanation

Moderated discussion boards are safer because they have someone overseeing the content and ensuring that inappropriate or harmful posts are removed. This helps to create a more positive and respectful environment for users. Unmoderated boards can lead to the spread of misinformation, harassment, and other harmful behavior. Secure and accessible are important factors for discussion boards, but moderation is the key aspect that ensures safety.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 22, 2008
    Quiz Created by
    Melinda.fornes
Cancel
  • All
    All (13)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
 Which of the following information types are the MOST dangerous...
To promote professionalism and credibility, which word processing tool...
Identity Theft impacts individuals in all of the following ways...
What is the term for an on-line digital media file that can be audio...
 The “s” in https:// reveals that the site is:
A cyber bully uses all of the following on-line methods to intimidate...
Spyware tracks and monitors individual user habits through the use of:
With the many types of electronic communication, which is the best for...
 Real-time conversations and group on-line discussion needs are...
Which of the following e-mail parts should be updated frequently to...
E-mail is not confidential. Which of the following notations in an...
 Netiquette is BEST defined as: ...
Discussion Boards are safer when they are:
Alert!

Advertisement