Electronic Communication & Internet Safety

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Melinda.fornes
M
Melinda.fornes
Community Contributor
Quizzes Created: 3 | Total Attempts: 7,721
Questions: 13 | Attempts: 3,765

SettingsSettingsSettings
Electronic Communication & Internet Safety - Quiz

Electronic Communication & Internet Safety


Questions and Answers
  • 1. 

    With the many types of electronic communication, which is the best for regular entries, commentaries, and most like an on-line diary?

    • A.

      Discussion Board

    • B.

      Blog

    • C.

      Chat Room

    • D.

      Podcast

    Correct Answer
    B. Blog
    Explanation
    A blog is the best option for regular entries, commentaries, and most like an online diary. A blog allows individuals to regularly post their thoughts, experiences, and opinions in a chronological manner. It provides a platform for self-expression and allows readers to engage through comments and feedback. Unlike a discussion board or chat room, a blog provides a more personal and structured format for sharing content. While a podcast may also involve regular entries, it is primarily an audio-based medium and may not offer the same level of interactivity and written expression as a blog.

    Rate this question:

  • 2. 

     Real-time conversations and group on-line discussion needs are best served by:

    • A.

      Discussion Boards

    • B.

      Blogs

    • C.

      Chat Rooms

    • D.

      Podcasts

    Correct Answer
    C. Chat Rooms
    Explanation
    Real-time conversations and group online discussion needs are best served by chat rooms. Chat rooms provide a platform for instant messaging and real-time interaction between multiple participants. They allow users to engage in live discussions, exchange ideas, and collaborate in a more immediate and interactive manner compared to other options like discussion boards, blogs, or podcasts. Chat rooms facilitate quick responses and enable participants to have dynamic conversations, making them an ideal choice for real-time communication and group discussions.

    Rate this question:

  • 3. 

    What is the term for an on-line digital media file that can be audio or video and does not require a media player only a computer with Internet access?

    • A.

      Blog

    • B.

      Chat Room

    • C.

      Discussion Board

    • D.

      Podcast

    Correct Answer
    D. Podcast
    Explanation
    A podcast is an on-line digital media file that can be audio or video and does not require a media player only a computer with Internet access. It is a form of digital media that is typically episodic and can be downloaded or streamed online. Podcasts have gained popularity for their convenience and accessibility, allowing users to listen or watch content on various topics at their own convenience.

    Rate this question:

  • 4. 

     Which of the following information types are the MOST dangerous to disclose?

    • A.

      Your first name

    • B.

      Your birth date

    • C.

      Your hair color

    • D.

      Your social security number

    Correct Answer
    D. Your social security number
    Explanation
    Disclosing your social security number is the most dangerous among the given information types. This is because social security numbers are unique identifiers that can be used by identity thieves to commit various types of fraud, such as opening fraudulent accounts, accessing financial information, or filing false tax returns. Unlike the other information types listed, your social security number is directly linked to your personal and financial identity, making it highly valuable and vulnerable to misuse.

    Rate this question:

  • 5. 

    A cyber bully uses all of the following on-line methods to intimidate EXCEPT:

    • A.

      On-line yelling—typing all uppercase

    • B.

      Fraudulent or malicious information posted to a webpage, blog, or other format

    • C.

      Pushing, hitting, screaming in person

    • D.

      Posting fake, misleading, or demeaning pictures of the victim

    Correct Answer
    C. Pushing, hitting, screaming in person
    Explanation
    The correct answer is "Pushing, hitting, screaming in person." This is because cyberbullying refers to bullying that takes place online, not in person. The other options listed are all examples of cyberbullying methods, such as using all uppercase to yell, posting fraudulent or malicious information, and posting fake or demeaning pictures of the victim.

    Rate this question:

  • 6. 

     The “s” in https:// reveals that the site is:

    • A.

      Similar to http://

    • B.

      Sentinel software

    • C.

      Secure and protected

    • D.

      Susceptible to virus attacks

    Correct Answer
    C. Secure and protected
    Explanation
    The "s" in https:// stands for "secure" and indicates that the site is using a secure and encrypted connection. This means that any information transmitted between the user's browser and the website is encrypted and protected from potential eavesdropping or tampering. Therefore, the correct answer is "Secure and protected."

    Rate this question:

  • 7. 

    Identity Theft impacts individuals in all of the following ways EXCEPT:

    • A.

      Credit and criminal records

    • B.

      Financial records and bank accounts

    • C.

      Personal information

    • D.

      Pet names

    Correct Answer
    D. Pet names
    Explanation
    Identity theft impacts individuals in all of the following ways except for their pet names. Identity theft typically involves the fraudulent use of someone's personal information, such as their credit and criminal records, financial records and bank accounts. Pet names, on the other hand, are not typically used or targeted in identity theft incidents.

    Rate this question:

  • 8. 

    Discussion Boards are safer when they are:

    • A.

      Unmoderated

    • B.

      Secure

    • C.

      Accessible

    • D.

      Moderated

    Correct Answer
    D. Moderated
    Explanation
    Moderated discussion boards are safer because they have someone overseeing the content and ensuring that inappropriate or harmful posts are removed. This helps to create a more positive and respectful environment for users. Unmoderated boards can lead to the spread of misinformation, harassment, and other harmful behavior. Secure and accessible are important factors for discussion boards, but moderation is the key aspect that ensures safety.

    Rate this question:

  • 9. 

    Spyware tracks and monitors individual user habits through the use of:

    • A.

      Cookies

    • B.

      Cache

    • C.

      Scripts

    • D.

      Tags

    Correct Answer
    A. Cookies
    Explanation
    Spyware tracks and monitors individual user habits through the use of cookies. Cookies are small text files that are stored on a user's computer by websites they visit. These files contain information about the user's browsing history, preferences, and login details. Spyware can access and collect this data without the user's knowledge or consent, allowing it to track their online activities and gather personal information. Therefore, cookies are commonly used by spyware to monitor and track individual user habits.

    Rate this question:

  • 10. 

    E-mail is not confidential. Which of the following notations in an e-mail header indicate that a copy has been sent without that person’s knowledge?

    • A.

      BC

    • B.

      BCC

    • C.

      CC

    • D.

      CCC

    Correct Answer
    B. BCC
    Explanation
    The correct answer is BCC. BCC stands for "Blind Carbon Copy" and it is a notation in an email header that indicates that a copy of the email has been sent to someone without the knowledge of the other recipients. When using BCC, the recipients in the "To" and "CC" fields are not able to see the email addresses of the BCC recipients, maintaining their anonymity. This allows for discreet communication and ensures that the BCC recipients remain unaware of each other's involvement in the email conversation.

    Rate this question:

  • 11. 

    Which of the following e-mail parts should be updated frequently to make sure that the topic is relevant to the body?

    • A.

      Header

    • B.

      Body

    • C.

      Subject

    • D.

      Signature

    Correct Answer
    C. Subject
    Explanation
    The subject of an email should be updated frequently to ensure that it accurately reflects the topic discussed in the body of the email. This is important because it helps the recipient quickly understand the purpose of the email and allows them to prioritize and organize their inbox effectively. By updating the subject, the sender can also ensure that the email remains relevant over time, especially if there are multiple email exchanges on the same thread.

    Rate this question:

  • 12. 

    To promote professionalism and credibility, which word processing tool should ALWAYS be used before sending an e-mail?

    • A.

      Language tool bar

    • B.

      Spell and grammar check

    • C.

      Picture viewer

    • D.

      Word count

    Correct Answer
    B. Spell and grammar check
    Explanation
    To promote professionalism and credibility, it is important to use the spell and grammar check tool before sending an email. This tool helps to ensure that there are no spelling mistakes or grammatical errors in the email, which can negatively impact the credibility of the sender. By using this tool, the sender can present a polished and error-free email, demonstrating professionalism and attention to detail.

    Rate this question:

  • 13. 

     Netiquette is BEST defined as:  

    • A.

      Internet etiquette

    • B.

      Internet accessibility

    • C.

      Network knowledge

    • D.

      Good manners

    Correct Answer
    A. Internet etiquette
    Explanation
    Netiquette refers to the set of rules and guidelines for proper behavior and communication on the internet. It involves showing respect, being polite, and using appropriate language and tone when interacting with others online. Netiquette helps to create a positive and respectful online environment.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 22, 2008
    Quiz Created by
    Melinda.fornes
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.