1.
Which of the following must you use to access the Internet?
Correct Answer
D. Web Browser
Explanation
The Correct Answer is
D) Web Browsers are an essential item to allow you to access the Internet
2.
List two devices you must have to connect to the Internet
Correct Answer(s)
A. Computing Device
B. Connection Device
Explanation
The correct answers are
A and B
You connect your to the Internet using a computing and connection device
3.
Which language can you use to create and publish a Web page?
Correct Answer
A. Hypertext Markup Language
Explanation
The correct answer is
A) Hypertext Markup Language enables you to build HTML pages
4.
NotAttempted
As you read your e-mail messages in Windows Mail, you notice that some messages require a follow-up activity.
What will you do to ensure that you remember to do the follow-up activities for the messages?
Correct Answer
D. Set a flag
Explanation
The correct answer is
D) Flagging messages will enable you to remember them later
5.
You use Windows Mail to exchange e-mail. You want to track the details of the people with whom you communicate.
Which method will allow you to easily access all of the contact details in alphabetical order?
Correct Answer
A. Sort by name
Explanation
The correct answer is
A) Sorting by name enables you to put emails in alphabetical order
6.
What information do you need to easily identify and access a particular Web site?
Correct Answer
C. Domain name
Explanation
The correct answer is
C) Domain names can be looked up to determine ip addresses
7.
You will go camping next week. You want to connect to the Internet at the campground location, but do not have time or money to buy any cables. Which of the following connection methods will you most likely use?
Correct Answer
A. Wireless
Explanation
The correct answer is
A) You will most likely connect to the internet using a wireless method
8.
Joe uses Microsoft® Windows® Vista on his office computer. He wants to connect to the Internet using a wireless method. Therefore, he specifies a wireless device and password to log on to the connection.
Which process does a computer system use to validate a user's logon information?
Correct Answer
D. Authentication
Explanation
The correct answer is
D) Authentication is
(1) Verifying the integrity of a transmitted message.
(2) Verifying the identity of a user logging into a network. Passwords, digital certificates, smart cards and biometrics can be used to prove the identity of the client to the network. Passwords and digital certificates can also be used to identify the network to the client. The latter is important in wireless networks to ensure that the desired network is being accessed.
9.
Which part of the computer is used to connect the computer to a network?
Correct Answer
D. Network Interface Card (NIC)
Explanation
The correct answer is
D) A network interface controller (also known as a network interface card, network adapter, LAN adapter and by similar terms) is a computer hardware component that connects a computer to a computer network.
10.
Four of your friends simultaneously download a large article from the Internet.
If your friends have the connections shown in the following exhibit, who will be the last one to finish downloading the file?
Correct Answer
A. Nikhil
Explanation
IThe correct answer is
A) Nikhil has the fastest connection
11.
You own a small bookstore. You want to provide online services for your customers.
Where will you go to get an Internet connection for your computer?
Correct Answer
B. Internet Service Provider
Explanation
The correct answer is
B) Internet Service Provider is the only dedicated company that will help you connect your online store
12.
What information should you not tell someone in a chat room on the Internet as it is considered personal information
Correct Answer(s)
B. Home Address
D. Phone Number
E. Checking Account
Explanation
The correct answers are:
B) Home Address should never be given in a chat room as you are not sure who is listening
D) Name should not be given in a chatroom as a person could find information about you using your name
E) Checking Account and routing information should not be given in a chat room unless you want someone to empty your account
13.
You are searching for information on the Internet. Of the information listed below, what information is the least questionable?
Correct Answer
B. Information from a validated source
Explanation
The correct answer is:
B) All information should be validated to ensure it is accurate
14.
You open the home page for www.google.com. You want to see results for all articles related to Kevin Johnson that do not include his basketball career. What type of searching is this?
Correct Answer
C. Boolean Searching
Explanation
The correct answer is:
B) Boolean searching is the best choice
15.
You open the home page for www.alpineskihouse.com. On the home page, you see a link for the weather report. You want to view the weather report in a separate window, but you do not want to close the home page.
What will you do to view the weather report in a separate window?
Correct Answer
C. Right Click the link for the weather report and choose Open in New Window
Explanation
The correct answer is:
C) Right Click the link for the weather report and choose the option open in new window