Internet Safety, Security And Marketing Tools! Quiz

12 Questions | Total Attempts: 99

SettingsSettingsSettings
Please wait...
Internet Safety, Security And Marketing Tools! Quiz

.


Questions and Answers
  • 1. 
    Explain the similarities and differences between "Favorites" and "Social Bookmarking" sites.  (NOTE:  This constructed response will be scored separately.)
  • 2. 
    What is spam?
    • A. 

      Malicious code that includes virus and worms that can infect computers

    • B. 

      Unwanted or unsolicited electronic messages

    • C. 

      Software that runs at startup designed to take control of your computer

    • D. 

      Security Prevention And Maintenance (S.P.A.M)

  • 3. 
    The act of disguising a website as a  legitimate one in order to gain access to personally identifiable information (PII) is known as _____.
    • A. 

      Pharming

    • B. 

      Phishing

    • C. 

      Spamming

    • D. 

      Tracking

  • 4. 
    Mel receives and e-mail allegedly from his mobile phone service provider. It has the company logo prominently featured at the top of the communication and states that the company is updating all client records. Mel is asked to re-submit his account information including name, address, home phone number and the credit card number tied to his account for billing purposes.  This could be an example of _______
    • A. 

      Flaming, and Mel should sent a hostile reply.

    • B. 

      A legitimate request, and Mel should respond including all the required information.

    • C. 

      Phishing, and Mel should promptly delete the message.

    • D. 

      Spam, similar to other harmless, unsolicited email messages.

  • 5. 
    Sending insulting messages across peer-to-peer networks is an example of _______
    • A. 

      Flaming

    • B. 

      Jabbing

    • C. 

      Peering

    • D. 

      Networking

  • 6. 
    This sophisticated piece of software tracks what users are typing on a website.
    • A. 

      Flash cookie

    • B. 

      Tracker

    • C. 

      Beacon

    • D. 

      Third-party monitor

  • 7. 
    An IP or internet protocol address is an example of ______________
    • A. 

      Non PII

    • B. 

      PII

    • C. 

      A user profile

    • D. 

      Both A and B

  • 8. 
    You can optimize your search results on the Web by ____
    • A. 

      Using reliable resources such as EBSCO and recognized news sites.

    • B. 

      Using several different types of search engines.

    • C. 

      Sticking to your topic and avoiding distractions.

    • D. 

      All of the above.

  • 9. 
    Which of the following statements about meta-search engines is NOT true?
    • A. 

      Meta-search engines scan multiple search engine databases.

    • B. 

      Meta-search engines are a waste of time becasue they provide very few results.

    • C. 

      Meta-search engines provide results basd on the keyword(s) subited.

    • D. 

      Meta-search engines can save time, but you shouldn't rely on them exclusively

  • 10. 
    Which of the following is an example of an accurately constructed Boolean search string?
    • A. 

      Internet marketing

    • B. 

      Internet AND marketing

    • C. 

      Marketing ON internet

    • D. 

      Marketing (internet)

  • 11. 
    Flash cookies serve the following purpose:
    • A. 

      To remember preferences such as volume settings for video

    • B. 

      To allow you to watch videos on sites that use this Adobe tool

    • C. 

      To track your activities online for the purpose of targeted advertising

    • D. 

      All of the above

  • 12. 
    RSS provides an efficient way for an internet user to ______________
    • A. 

      Track Really Special Sites (RSS).

    • B. 

      Use a "reader" to review information compiled from a number of sources based on pre-selected preferences.

    • C. 

      Send information to a number of Real-Time Syndicated Sources (RSS) for posting.

    • D. 

      Access peer-to-peer communication by launching this Remote Surveillance System (RSS).

Back to Top Back to top