Internet Foundations 3

25 Questions | Attempts: 111
Share
Please wait...
Question 1 / 25
0 %
0/100
Score 0/100
1. How can you reduce file size so that files can be sent more efficiently across the Internet?
Submit
Please wait...
About This Quiz
Internet Foundations 3 - Quiz

2.
We’ll put your name on your report, certificate, and leaderboard.
2. You access a search engine and enter the words "African" and "Safari" in the search box. The search engine returns links to Web sites in its index that include these words. Which types of search index did you use?
Submit
3. Which term is used to describe a software application that is secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes?

Explanation

Spyware (or adware) is a software application that a secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes.

Submit
4. You download a file with the unusual file name extension of ".wow". When you attempt to open this file, Windows displays a message indicating that it does not know how to open this particular file type. Which of the following determines a document type and the application required to open it?

Explanation

MIME types used to identify a document type and the application required to open it.

Submit
5. What do encryption applications do to render text unreadable?

Explanation

Encryption applications dramatically reduce the risk of information theft by scrambling the information using mathematical algorithm. Encrypted data is referred to as ciphertext; unencrypted data is referred to as a plaintext.

Submit
6. Which of the following is an effective way for Web site owners to prevent typosquatting?

Explanation

Typosquatting refers to an unethical practice in which the perpetrator (i.e. typosquatter) capitalises on typing mistakes that users make when entering the URL of a Web site into a browser. When a Web user accidentally enters an incorrect Web site address, he or she may end up viewing an alternative Web site owned by a typosquatter. Web site owners can try to avoid falling victim to a typosquatter by purchasing domain names that are similar to their actual domain name.

Submit
7. It is vital that you understand how to evaluate information you retrieve from resources on the Internet because the source of information can directly affect the quality and factuality of the information. Which of the following types of resources only accept input from scholars and recognised authorities?
Submit
8. Which of the following search engines was the first to determine a site's relevance based upon the number of links that point to it, in addition to ranking its relevance according to keywords you enter?  

Explanation

Explanation/Reference: Google determines a site's popularity according to the number of other sites that link to it. Like other sites, Google's Web search engine is designed to rank the relevance of a particular site according to the keywords entered by the user.

Submit
9. During a Web search, entering erroneous search criteria, clicking dead links or accessing a busy server is likely to;

Explanation

Search engines sometimes yield unexpected results such as an error page, an alternative search engine or an advertisement instead of the topic for which you were searching. Error pages most commonly occur when you enter erroneous search criteria, click a dead link or try to access a busy server.

Submit
10. In order to help you with your job tasks, your supervisor has given you a PIM application to install and user. PIM is an acronym for a type of program with which you can:
Submit
11. What distinguishes a worm from a virus?

Explanation

The different between a worm and a virus is that a worm has the ability to replicate itself automatically, whereas a virus requires user action.

Submit
12. Which statement best describes symmetric-key encryption?

Explanation

Symmetric encryption (also called symmetric-key encryption or private-key encryption) is an encryption method in which same key is used to encrypt and decrypt a message.

Submit
13. Which statement best describe asymmetric-key encryption?

Explanation

Asymmetric encryption (also called asymmetric-key encryption or public-key encryption) refers to an encryption method in which two keys are used to encrypt and decrypt a message: a private and a public key. The public key is known to all sending and receiving parties involved in the communication.

Submit
14. Non-repudiation is the security principle of providing proof that a transaction occurred between identified parties. Which of the following can you use to enforce non-repudiation in an electronic data transfer?  

Explanation

Digital signatures can be used to enforce non-repudiation, which is the ability to prove that a transaction occurred. Sending data with a digital signature proves that the message was both sent and received.

Submit
15. What is the purpose of the Boolean operator OR?

Explanation

The results will contain one keyword or the other or both.

Submit
16. The <meta> tag can be used in Web pages for which purpose?
Submit
17. What can you do to eliminate the need to define a MIME type for files that you download from Web sites?
Submit
18. Which encryption method provides data integrity because, even though encrypted data is not decrypted, you can verify whether the data was altered after encryption.

Explanation

Hash encryption provides data integrity because, even though encrypted data is not decrypted, you can verify whether the data was altered after encryption. Hash encryption is useful for protecting passwords from disclosure.

Submit
19. Any tool used to schedule appointments and meeting, store contact information, and manage tasks is known as:
Submit
20. Search engines use a ranking system to help you determine how closely a site matches the topic for which you are searching. Generally, how does this ranking system work?
Submit
21. Which choice lists some file types that are often already compressed and thus may not be significantly reduced in file size by compression utilities?
Submit
22. After you have found the information you need on the Web, you must still evaluate its accuracy and value. To determine whether information is reliable or factual, you should:
Submit
23. You want to find information about Great Danes. You visit a popular search engines and manually search through a directory tree of topics until you find a directory titled "Dogs" and a subdirectory titled "Breeds". You select the topic "Great Dane" and look through a list of indexed pages on that topic, then choose one page with which to begin your research.  Which type of search index did you use?

Explanation

A static index/site map enables users to manually search information portals to locate indexed information.

Submit
24. Which of the following is true regarding smartphones and PIM applications?
Submit
25. What distinguishes an information portal from a search engine?

Explanation

An information portal differs from a search engine in that an information portal will only index Web sites that are submitted manually. Information portals do not use spider programs to seek out Web sites. Thus, if you do not manually submit your site's address to the information portal, it will never know about or index your site, and never list your site in search results.

Submit
View My Results

Quiz Review Timeline (Updated): May 12, 2013 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • May 12, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • May 11, 2013
    Quiz Created by
    Philanderson888
Cancel
  • All
    All (25)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
How can you reduce file size so that files can be sent more...
You access a search engine and enter the words "African" and...
Which term is used to describe a software application that is secretly...
You download a file with the unusual file name extension of...
What do encryption applications do to render text unreadable?
Which of the following is an effective way for Web site owners to...
It is vital that you understand how to evaluate information you...
Which of the following search engines was the first to determine a...
During a Web search, entering erroneous search criteria, clicking dead...
In order to help you with your job tasks, your supervisor has given...
What distinguishes a worm from a virus?
Which statement best describes symmetric-key encryption?
Which statement best describe asymmetric-key encryption?
Non-repudiation is the security principle of providing proof that a...
What is the purpose of the Boolean operator OR?
The <meta> tag can be used in Web pages for which purpose?
What can you do to eliminate the need to define a MIME type for files...
Which encryption method provides data integrity because, even though...
Any tool used to schedule appointments and meeting, store contact...
Search engines use a ranking system to help you determine how closely...
Which choice lists some file types that are often already compressed...
After you have found the information you need on the Web, you must...
You want to find information about Great Danes....
Which of the following is true regarding smartphones and PIM...
What distinguishes an information portal from a search engine?
Alert!

Back to Top Back to top
Advertisement