Internet Foundations 2

50 Questions | Attempts: 116
Share
Please wait...
Question 1 / 50
0 %
0/100
Score 0/100
1. What is the purpose of an e-mail autoresponder?
Submit
Please wait...
About This Quiz
Internet Quizzes & Trivia

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. To what does the term "netiquette" refer?

Explanation

The term netiquette has been coined to encourage common sense and politeness, and to establish general rules for e-mail messages.

Submit
3. With which prefix does a Web page's Uniform Resource Locator (URL) begin?  

Explanation

The components of a typical URL include the protocol, the Internet resource (server or host name) and the domain name. In a URL, the protocol component identifies the Internet Protocol used to send information from the server to a user's computer, and thus indicates both the type of server and Internet Service being used. HTTP is used to transfer Web Pages and other information over the WWW.

Submit
4. Anonymous browsing allows users to:

Explanation

Anonymous browsing allows users to use the browser and leave no cached information, effectively leaving behind no evidence on the hard drive of the sites or content they have browsed.

Submit
5. Which term is usd to describe a training session that is delivered over the Internet?  

Explanation

A Webinar (short for Web-based seminar) is training -- usually a PowerPoint presentation and/or lecture -- that is delivered over the Web. Webinars and Web conferences are essentially synonymous; although a Webinar is a type of Web conference that is typically one-way, from speaker to participants with limited audience participation.

Submit
6. Users can access and navigate an FTP server using an FTP client programme. For which action does the FTP client programme user the "get" command?  

Explanation

To download files, an FTP client programme uses the "get" command.

Submit
7. Which choice describes the file type(s) that can be attached to an e-mail message?  

Explanation

You can attach almost any type of file to an e-mail message. The ability to attach files (such as word processor documents, spreadsheets and images) to your messages makes e-mail a powerful tool, and allows users to share files and documents within their organisation or with users in other organisations.

Submit
8. What is the main advantage of using vector graphics instead of raster graphics to create animations?  

Explanation

The advantage of using vector graphics are that the files are relatively small (resulting in shorter download time) and they are easily resized without affecting image quality.

Submit
9. Which popular plug-in is Microsoft's response to Adobe Flash?  

Explanation

Silverlight is Microsoft's response to Adobe Flash. It is a software development tool used to write and run Internet applications. Silverlight originally focused on streaming audio and video, but now supports graphics, animations, and almost any multimedia.

Submit
10. Users can access and navigate an FTP server using an FTP client program. For which action does the FTP client programe use the "put" command?  

Explanation

To upload files, an FTP client use the"put" command.

Submit
11. While you are exploring a Web page in the Firefox browser, a file fails to properly display. You decide to install the required plug-in to view the file and are force to quit Firefox, install the plug-in, then restart Firefox. Which kind of installation is this?  

Explanation

There are two ways to install plug-ins, online and offline. Offline installation requires the user to download the plug-in file, quit the browser and start the installation file. When the installation is completed, the computer software maybe need to be restarted before the changes take effect.

Submit
12. Which of the following is a P2P application that you can use to download huge files because it dramatically reduces the demands on networking hardware and bandwidth?

Explanation

BitTorrent is a P2P (peer-to-peer network on the Internet) application used for downloading huge files (more than a gigabyte) because it dramatically reduces the demands on networking hardware and bandwidth.

Submit
13. You want to be able to access active content directly from your browser. Which type of application provides the efficient integration of multimedia formats with a browser or computer that will enable you to do this?  

Explanation

The primary goal of a plug-in is to provide efficient integration of multimedia formats with the browser and computer. Without this integration, a user would have to download multimedia files and play them back later with a separate application.

Submit
14. How can you view a Web page, including all related images, fonts, and scripts referenced by the HTML on the page, without connecting to the Internet?  

Explanation

You can save entire Web pages or elements of a Web page to your hard disk. When saving a Web page to hard disk, most browsers save all related images, fonts, and scripts referenced by the HTML on the page. You can open the page in your browser even when you are not connected to the Internet.

Submit
15. What is the term for the part of a browser responsible for reading a Web page and presenting it to an end user?  

Explanation

The rendering engine is the part of the browser responsible for reading the Web page and presenting it to an end user. It has the ability to read, parse, and represent HTML, images, and other tools.

Submit
16. You have activated pop-up blockers in your Web browser to prevent pop-up windows from continually interrupting your browsing experience. What could be an unintended consequence of this action?  

Explanation

Pop-up windows are small browser windows that appear in from of the browser window you are viewing. Pop-up windows display on their own, and remain open until you click an option inside or close them. Because pop-up windows can be annoying, pop-up blockers are included in most browsers. Although it seems like a great idea, keep in mind that it may prevent vital features of some Web sites (such as logon windows) from displaying.

Submit
17. A cookie is a text file that is placed on a Web site visitor's computer. Cookies allow a Web site manager to:

Explanation

Cookies are small text files placed on Web site visitors' computers so Web site managers can customise their sites to their visitors' preferences.

Submit
18. Which TCP/IP troubleshooting command should you use to determine whether a client and server are communicating with each other?

Explanation

Ping command can be used to ensure connectivity between two systems.

Submit
19. What is contained in your e-mail application's Outbook folder?
Submit
20. When you sign in to your instant messaging (IM) service, your online status is advertised (or published) to the people on your contacts list. What does this scenario represent?

Explanation

Presence information is a status indicator that conveys a person's willingness and ability to engage in communication. For example, when a user signs in to an instant messaging (IM) service, his or her status (e.g. online) is advertised (or published) to the people on a contact list.

Submit
21. Your company wants to simplify the customer support process for its distributors by enabling them to obtain company forms and reports online  You and your Web team are in charge of implementing this capability Which Web based system should you implement?

Explanation

An extranet is an internal network designed to provide access to selected external users and is not available to the Internet public. Extranets are an efficient way for business partners to share and exchange information. Customer support tasks can also be performed using an extranet. For example , if customers need to access a sales report generated by your company they will first access the Internet then enter in their browsers the URL of your company's extranet Web server. Once they access the Web server they must log on to the Web server with usernames and passwords. When they are logged on customers access your company's extranet which appears as a normal Web site and provides all the same services. The only difference is that the extranet provides security to exclude the Internet public. Customers can then download sales reports instead of calling your office and asking someone to fax or mail them.

Submit
22. Which of the following statements is true about Voice over IP (VoIP)

Explanation

VoIP is voice information delivered in digital form as packets of data using Internet Protocol (IP).

Submit
23. Computer viruses can cause damage ranging from relatively minor to debilitating. You can protect your system against viruses by using commercial virus-detection software to find and defeat viruses. Because new viruses are created so rapidly, what must you do to ensure that your anti-virus software can protect you?

Explanation

To ensure that your anti-virus software can protect you, install program updates to the software to keep the signature profiles current.

Submit
24. You want to learn more about CIW certifications and access a PDF document at https://www.ciwcertified.com/ _resources/CIW_Roadmap.pdf. Which type of URL does this represent?  

Explanation

A URL that goes deeper into a Web site than the home page, such as www.ciwcertified.com/index.php is called a deep URL because it includes a path that penetrates the folder structure of the Web site.

Submit
25. You want to attend a training session remotely. The presenter has recommended an application for you to download that uses VoIP audio technology so you can interact with the presenter and the other participants. Which Web-based system does this scenario describe?
Submit
26. As part of the IT department, you configure the employee workstations for your company. When configuring a user's system, you always set the browser security levels to the company standard settings. What is restricted from downloading to the user's system when you configure browser security levels?

Explanation

You can configure your browser for added security by controlling active content that is downloaded from a Web site and run locally on the client's browser.

Submit
27. Using command-line FTP on a Windows system, how do you gain access to an FTP server?

Explanation

You need to use the "open" command to access an FTP server, and you must use the "get" command to copy a file to your computer. The "put" command is used to upload a file from your system to the FTP server.

Submit
28. Which protocol do e-mail programs use to identify the file types of attached files?
Submit
29. Which audio file format is inherently supported by most browsers?  

Explanation

Firefox and Internet Explorer include native, or built-in, support for standard audio formats such as AU, MIDI, Audio Interchange File Format (AIFF) and Waveform (WAV). AU is an audio format used by UNIX servers. Most browsers provide built-in support for AU files. Users can play sound files embedded in HTML documents using their browsers, which automatically identify and play most major formats embedded in or linked to a Web page.

Submit
30. How does a proxy server protect a corporate network from unwanted Internet activity?

Explanation

A proxy server replaces the network IP address with another, contingent address. This process effectively hides the actual IP address from the rest of the Internet, thereby protecting the entire network.

Submit
31. Which cookie type remains on your system after you end your browser session?

Explanation

A persistent cookie is stored as a file on your computer and remains there after you end your browser session.

Submit
32. You want to receive e-mail messages, announcements and advertising on a regular basis about digital animation. Which action could you take to accomplish this?

Explanation

A list server is a server that automates the collection and distribution of messages from an authorised group of participants, allowing collaboration among multiple users. A group of users that subscribes to a mailing list is called a listserve group.

Submit
33. What is an anonymous FTP site?
Submit
34. Why can it be advantageous to write e-mail folders to files on your computer's local disk?
Submit
35. Which file format retains formatting information through all platforms and can be created and read on any computer, regardless of the local operating system?  

Explanation

Adobe created the PDF, a general file format that can be created and read on any computer, regardless of the local operating system. These files are suitable for transmission over the Web.

Submit
36. You send an e-mail message to a co-worker to help plan a surprise going-away party for a mutual friend before she embarks on a six-month around-the-world cruise. Which statement reflects your right to e-mail privacy?

Explanation

An employer has legal ownership of everything an employee creates while on the job, including personal messages. Your employer has the right to read e-mail you send using company equipment and Internet connections.

Submit
37. Which of the following plug-ins can be used to show MOV files, which can combine video, animation, text and audio into one file?  

Explanation

QuickTime is a plug-in created by Apple Computer for running video and audio files. The QuickTime Movie (MOV) file format was created by Apple and is supported by all QuickTime versions. Video, animation, text and audio are combined into one file.

Submit
38. Which of the following is an example of ethical Internet behaviour?

Explanation

Shareware is not free, you can download it for free and try it. Download songs and movies from the internet or peer-to-peer network without obtaining permission or paying a fee is an illegal use of copyrighted information. You should not ask other users to divulge personal information via these sessions.

Submit
39. Which of the following is a drawback of requiring SMTP authentication?

Explanation

SMTP is a plain text protocol which means that when it is not encrypted, passwords can be sent in plain text. This means that a password which is also used elsewhere may be 'sniffed' from the SMTP protocol and used to attack the network elsewhere, thus SMTP passwords are a vulnerability.

Submit
40. The graphics you are probably most familiar with, GIFs, and JPEGs, are raster graphics. What are raster graphics?  

Explanation

Raster graphics are images that map bits directly to a display space.

Submit
41. Two requirements are necessary to upload files to an FTP site. One requirement is gaining access to an FTP client program. What is the other requirement?

Explanation

It also requires permission, which is usually provided by the FTP server administrator.

Submit
42. Virtual Network Computing (VNC) is a program that allows you to control a computer at a remote location. VNC consists of which two components?  

Explanation

VNC consists of two components the server and the viewer. The server listens on a specific port (for example, TCP 5800 on Windows) and allows clients to connect The viewer

Submit
43. Companies increasingly want to allow employees to share files directly without having to maintain servers to provide FTP access. Which technology can companies use to maximise processing power while protecting privacy and sensitive materials?

Explanation

Corporations are beginning to consider P2P as a way for employees to share file directly, eliminating the cost and maintenance associated with a centralised server.

Submit
44. You work for your company's IT department diagnosing and servicing the employees's workstations. A user complains that since she has been conducting a lot of research online, performance is slowing. You increase the size of her browser cache. Why might performance slow if the browser cache is too small?

Explanation

If the browser cache is too small, the user will sacrifice performance because he or she will spend a lot of time waiting while pages download from the server.

Submit
45. Which statement best describes hash encryption?

Explanation

Hash encryption (also called one-way encryption) is an encryption method in which hashes are used to verify the integrity of transmitted messages. A hash (also called a message digest) is a number generated by an algorithm from a string of text. The generated hash value is smaller than the text itself, and is generated in such a way that it is nearly impossible fro the same hash value to be generated from some other text.

Submit
46. What distinguishes S/MIME from MIME?

Explanation

Multipurpose Internet Mail Extension (MIME) controls the way that messages and attachments are organised and distinguished from one another, whereas Secure MIME (S/MIME) controls the way that encryption information and digital certificates can be included as part of an e-mail message.

Submit
47. Because file attachments may contain malicious code that can be used to damage or infiltrate systems, your company routinely scans all file attachments in incoming e-mail. Where does attachment scanning take place?
Submit
48. You visit the Web site of a business from which you make online purchases and set up an account on your smartphone. The site requests your mobile phone in order to send you promotional text messages. What type of service does this scenario describe?

Explanation

You use an opt-in e-mail marketing service when you consent to receiving e-mails regarding special promotions or other types of updates. Opt-in mass texting services are similar, but are used most often on mobile devices. The service is technicall a SMS used by phone carriers, not an Internet Service, but it serves the same purpose as mass e-mail.

Submit
49. You make it a point to send e-mail messages, text messages and instant messages that are considered "safe for work." This is a good way to ensure that your messages:

Explanation

Sending threatening e-mail messages, text messages or instant messages is illegal, just as if the threats were made via telephone. Keep in mind that any messages you send, especially while at work or at school, should always be "safe for work" (SFW). SFW means that the content of your message can safely be viewed by anyone and does not contain any controversial, sexually explicit, profane or otherwise inappropriate content

Submit
50. If you use a Web browser's built-in FTP client, which FTP command would you need to use to download a file from your company's FTP site?

Explanation

You would not need to use any FTP commands for any reason.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • May 09, 2013
    Quiz Created by
    Philanderson888
Cancel
  • All
    All (50)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is the purpose of an e-mail autoresponder?
To what does the term "netiquette" refer?
With which prefix does a Web page's Uniform Resource Locator (URL)...
Anonymous browsing allows users to:
Which term is usd to describe a training session that is delivered...
Users can access and navigate an FTP server using an FTP client...
Which choice describes the file type(s) that can be attached to an...
What is the main advantage of using vector graphics instead of raster...
Which popular plug-in is Microsoft's response to Adobe Flash?...
Users can access and navigate an FTP server using an FTP client...
While you are exploring a Web page in the Firefox browser, a file...
Which of the following is a P2P application that you can use to...
You want to be able to access active content directly from your...
How can you view a Web page, including all related images, fonts, and...
What is the term for the part of a browser responsible for reading a...
You have activated pop-up blockers in your Web browser to prevent...
A cookie is a text file that is placed on a Web site visitor's...
Which TCP/IP troubleshooting command should you use to determine...
What is contained in your e-mail application's Outbook folder?
When you sign in to your instant messaging (IM) service, your online...
Your company wants to simplify the customer support process for its...
Which of the following statements is true about Voice over IP (VoIP)
Computer viruses can cause damage ranging from relatively minor to...
You want to learn more about CIW certifications and access a PDF...
You want to attend a training session remotely. The presenter has...
As part of the IT department, you configure the employee workstations...
Using command-line FTP on a Windows system, how do you gain access to...
Which protocol do e-mail programs use to identify the file types of...
Which audio file format is inherently supported by most browsers?...
How does a proxy server protect a corporate network from unwanted...
Which cookie type remains on your system after you end your browser...
You want to receive e-mail messages, announcements and advertising on...
What is an anonymous FTP site?
Why can it be advantageous to write e-mail folders to files on your...
Which file format retains formatting information through all platforms...
You send an e-mail message to a co-worker to help plan a surprise...
Which of the following plug-ins can be used to show MOV files, which...
Which of the following is an example of ethical Internet behaviour?
Which of the following is a drawback of requiring SMTP authentication?
The graphics you are probably most familiar with, GIFs, and JPEGs, are...
Two requirements are necessary to upload files to an FTP site. One...
Virtual Network Computing (VNC) is a program that allows you to...
Companies increasingly want to allow employees to share files directly...
You work for your company's IT department diagnosing and servicing...
Which statement best describes hash encryption?
What distinguishes S/MIME from MIME?
Because file attachments may contain malicious code that can be used...
You visit the Web site of a business from which you make online...
You make it a point to send e-mail messages, text messages and instant...
If you use a Web browser's built-in FTP client, which FTP command...
Alert!

Advertisement