Internet Foundations 3

25 Questions

Settings
Please wait...
Internet Quizzes & Trivia

Questions and Answers
  • 1. 
    • A. 

      RSA encryption

    • B. 

      Asymmetric-key encryption

    • C. 

      Hash encryption

    • D. 

      Symmetric-key encryption

  • 2. 
    • A. 

      An encryption method in which a key is required to encrypt data for storage and verify its integrity

    • B. 

      An encryption method in which the same key is used to encrypt and decrypt a message

    • C. 

      An encryption method in which two separate keys -- a private key and a public key -- are used to encrypt and decrypt a message

    • D. 

      An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages.

  • 3. 
    Non-repudiation is the security principle of providing proof that a transaction occurred between identified parties. Which of the following can you use to enforce non-repudiation in an electronic data transfer?  
    • A. 

      Digital signature

    • B. 

      Encrypted key

    • C. 

      Digital certificate

    • D. 

      Firewall

  • 4. 
    • A. 

      Scramble text using mathematical algorithm

    • B. 

      Scramble text using benign viruses

    • C. 

      Remove all formatting and punctuation from the text

    • D. 

      Compress the text so that only abbreviated portions of words remain

  • 5. 
    • A. 

      An encryption method in which two seperate keys -- a private key and a public key -- are used to encrypt and decrypt a message

    • B. 

      An encryption method in which the same key is used to encrypt and decrypt a message

    • C. 

      An encryption method in which a key is required to encrypt data from storage and to verify its integrity

    • D. 

      An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages

  • 6. 
    • A. 

      Spyware

    • B. 

      Trojan

    • C. 

      Illicit server

    • D. 

      Malware

  • 7. 
    • A. 

      Purchase domain names that are similar to their actual domain names

    • B. 

      Host their Web sites on ilicit servers

    • C. 

      Encrypt all network transmissions with algorithms that use a minimum of 128-bit keys

    • D. 

      Automatically apply operating system updates and patches as they become available

  • 8. 
    • A. 

      A worm is capable of replicating itself automatically while affecting data.

    • B. 

      A worm and a virus synonymous terms for a malicious program designed to damage computer systems.

    • C. 

      A worm does not replicate itself, it assumes control of system operations

    • D. 

      A worm does not replicate itself; it damages or destroys data.

  • 9. 
    During a Web search, entering erroneous search criteria, clicking dead links or accessing a busy server is likely to;
    • A. 

      Use all the space in your browser cache

    • B. 

      Cause an error page to display

    • C. 

      Activate the robot or spider program

    • D. 

      Return less relevant results for your keywords

  • 10. 
    • A. 

      It requires the search results to include multiple keywords

    • B. 

      It requires the search results to include one keyword or the other or both

    • C. 

      It requires the search results to include one keyword and exclude another

    • D. 

      It requires the search results to include one keyword or one URL.

  • 11. 
    It is vital that you understand how to evaluate information you retrieve from resources on the Internet because the source of information can directly affect the quality and factuality of the information. Which of the following types of resources only accept input from scholars and recognised authorities?
    • A. 

      Authoritative peer-reviewd

    • B. 

      Open peer-reviewed

    • C. 

      Primary

    • D. 

      Individual

  • 12. 
    The <meta> tag can be used in Web pages for which purpose?
    • A. 

      Containing the content that appear on each Web page

    • B. 

      Linking the Web site to other related Web pages

    • C. 

      Providing search engines with a descriptive of the Web site

    • D. 

      Preventing early-version browsers from viewing the Web site

  • 13. 
    You want to find information about Great Danes. You visit a popular search engines and manually search through a directory tree of topics until you find a directory titled "Dogs" and a subdirectory titled "Breeds". You select the topic "Great Dane" and look through a list of indexed pages on that topic, then choose one page with which to begin your research.  Which type of search index did you use?
    • A. 

      Static index/site map

    • B. 

      Boolean index

    • C. 

      Full-text index

    • D. 

      Keyword index

  • 14. 
    You access a search engine and enter the words "African" and "Safari" in the search box. The search engine returns links to Web sites in its index that include these words. Which types of search index did you use?
    • A. 

      Structured directory index

    • B. 

      Keyword index

    • C. 

      Full-text index

    • D. 

      Static index/site map

  • 15. 
    Which of the following search engines was the first to determine a site's relevance based upon the number of links that point to it, in addition to ranking its relevance according to keywords you enter?  
    • A. 

      Google

    • B. 

      Yahoo

    • C. 

      Excite

    • D. 

      WebCrawler

  • 16. 
    • A. 

      An information portal allows only keyword index searches.

    • B. 

      An information portal will only index Web sites based on manual submissions.

    • C. 

      An information portal allows only static index/site map searches.

    • D. 

      An information portal uses a robot or spider program to browse the Web and index the content that it finds.

  • 17. 
    After you have found the information you need on the Web, you must still evaluate its accuracy and value. To determine whether information is reliable or factual, you should:
    • A. 

      Consult secondary resources.

    • B. 

      Consult open peer-reviewed resources

    • C. 

      Consult authoritative peer-reviewed resources

    • D. 

      Consult popular resources

  • 18. 
    Search engines use a ranking system to help you determine how closely a site matches the topic for which you are searching. Generally, how does this ranking system work?
    • A. 

      The more frequently you specified keywords are found in a particular document, the higher the relevancy score that document receives.

    • B. 

      The more reference sources included in a Web document, the higher the relevancy score that document receives.

    • C. 

      The more hyperlinks included in a Web document, the higher the relevancy score that document receives

    • D. 

      The more keywords you specify in your search criteria, the higher the relevancy scores assigned to the retrieved documents.

  • 19. 
    • A. 

      Smartphones use infrared-based keyboards for inputting information into PIM applications.

    • B. 

      Smartphones rarely have enough memory to support full-featured PIM applications.

    • C. 

      Smartphones PIM applications are designed to work in tandem with traditional desktop or laptop computers.

    • D. 

      Smartphones save changes you make in PIM applications in random-access memory (RAM), the content of which are erased when you turn the smartphone off.

  • 20. 
    Any tool used to schedule appointments and meeting, store contact information, and manage tasks is known as:
    • A. 

      Personal Digital Assistant (PDA).

    • B. 

      Message Transfer Agent (MTA).

    • C. 

      Personal Information Management (PIM) program.

    • D. 

      Mail User Agent (MUA).

  • 21. 
    In order to help you with your job tasks, your supervisor has given you a PIM application to install and user. PIM is an acronym for a type of program with which you can:
    • A. 

      Filter span at the server.

    • B. 

      Translate dotted-quad IP addresses into easily recognise text-based names, and vice versa.

    • C. 

      Filter spam at the client.

    • D. 

      Schedule appointments and meetings, store contact information and manage tasks.

  • 22. 
    • A. 

      DOC, EXE and HTM

    • B. 

      DOC, TXT, and PDF

    • C. 

      PNG, GIF and JPG

    • D. 

      BMP, JPG and TIFF

  • 23. 
    • A. 

      Install the latest version of a browser, or install any available upgrades.

    • B. 

      Compress the files, then decompress them before you attempt to open them.

    • C. 

      Open the files in the Windows operating system only.

    • D. 

      Open the files in an operating system other than Windows.

  • 24. 
    • A. 

      By using a file compression utility to compress large files

    • B. 

      By dividing the file in half and sending two halves seperately

    • C. 

      By increasing the mail server's attachment size limit

    • D. 

      By using smaller fonts in the files

  • 25. 
    You download a file with the unusual file name extension of ".wow". When you attempt to open this file, Windows displays a message indicating that it does not know how to open this particular file type. Which of the following determines a document type and the application required to open it?
    • A. 

      MIME

    • B. 

      HTTP

    • C. 

      TCP/IP

    • D. 

      FTP