Jm Computer Literacy Assessment - Internet

30 Questions | Total Attempts: 705

SettingsSettingsSettings
Please wait...
Computer Literacy Quizzes & Trivia

This an assessment test only. This means the score you receive when taking this quiz will not be the actual grades posted in Powerschool. Everyone will receive credit for just taking the test.


Questions and Answers
  • 1. 
    The Internet is just made up of many other networks all interacting together.
    • A. 

      True

    • B. 

      False

  • 2. 
    The purpose of a web browser is what?
    • A. 

      To do internet searches.

    • B. 

      Search for cob webs in your house

    • C. 

      Is to display web page from websites

  • 3. 
    What does ISP stand for?
    • A. 

      Internet Service Provider

    • B. 

      Internet Service Protection

    • C. 

      Internet Signal Piping

  • 4. 
    A group of related web pages form
    • A. 

      Www

    • B. 

      Html

    • C. 

      Website

    • D. 

      Home page

  • 5. 
    The Internet and World Wide Web is really the same thing
    • A. 

      True

    • B. 

      False

  • 6. 
    What is the language used to build web pages?
    • A. 

      Http

    • B. 

      Www

    • C. 

      Html

    • D. 

      Url

  • 7. 
    Which of the following is considered a Directory/Index Internet search engine?
    • A. 

      Google

    • B. 

      Yahoo

    • C. 

      Ask Jeeves

    • D. 

      Dogpile

  • 8. 
    Which of the following Top Level Domain is considered the MOST credible?
    • A. 

      .org

    • B. 

      .biz

    • C. 

      .com

    • D. 

      .edu

  • 9. 
    Online fights using electronic messages with angry and vulgar language is called what?
    • A. 

      Impersonation

    • B. 

      Cyberbullying

    • C. 

      Flaming

  • 10. 
    Which one should you never do in a cyberbullying situation?
    • A. 

      Tell a responsable adult

    • B. 

      Block harmful messages

    • C. 

      Respond to the messages in an angry way

  • 11. 
    Which screenname is the most dangerous for a child to have?
    • A. 

      Basketballstar19

    • B. 

      Carlvr1232

    • C. 

      Dave93_CA

  • 12. 
    What is the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others?
    • A. 

      Hacking

    • B. 

      Cyberbullying

    • C. 

      Predator

  • 13. 
    All of the following are forms of technology used to cyberbully except:
    • A. 

      E-Mails

    • B. 

      Instant Messaging

    • C. 

      Web Pages

    • D. 

      Television

  • 14. 
    What technology do teens use the most for cyberbullying?
    • A. 

      Email

    • B. 

      Cell Phones

    • C. 

      Instant Messages

    • D. 

      Mail

  • 15. 
    To be safer, what should you do if you post pictures online?
    • A. 

      Have a picture of only yourself

    • B. 

      Blur the pictures

    • C. 

      Have everyone in the picture tagged with their full name

  • 16. 
    What is the safest things to do in public chatrooms?
    • A. 

      Don't invite anyone to them

    • B. 

      Make a screen name that has nothing to do with yourself

    • C. 

      Block any unknown people that talk to you

    • D. 

      Don't say a word

  • 17. 
    What is one of the problems that makes cyberbullying easy?
    • A. 

      Computers are in a teen's private room which keeps their parents from seeing the problem

    • B. 

      The bully doesn't think that it makes more of an impact since it is over the internet

    • C. 

      The bully doesn't have to see the victim's reaction to being bullie

    • D. 

      Online predators are very good at grooming them into talking to the

  • 18. 
    Schools and businesses most often connect to the Internet through a ___________.
    • A. 

      Firewall

    • B. 

      LAN (Local Area Network)

    • C. 

      Internet Service Provider

    • D. 

      World Wide Web

  • 19. 
    All computers are identified with a 4 digit number separated by periods. This is called
    • A. 

      Domain name

    • B. 

      Host name

    • C. 

      Ip address

  • 20. 
    Which of the following domains is LEAST reliable?
    • A. 

      .edu

    • B. 

      .net

    • C. 

      .gov

  • 21. 
    The .com domain web sites are
    • A. 

      Government Institutions

    • B. 

      Business or other mixed sites.

    • C. 

      Non-profit Institutions

    • D. 

      Education Institutions

  • 22. 
    The .org domains
    • A. 

      Contain reputable non-profit organizations with reliable information always.

    • B. 

      Are always non-profit organizations that are reputable.

    • C. 

      Contain only advocacy group web sites with political agendas

    • D. 

      Must be evaluated well because this domain contains both very reputable non-profit organization web sites and advocacy groups with hidden agendas

  • 23. 
    If the web site has an author and looks professional
    • A. 

      You should look at the domain

    • B. 

      You should expect good research

    • C. 

      You should research the author, look at the domain, check the links, check for errors, look for bias, etc.

  • 24. 
    Which of the following are considered a meta search engine?
    • A. 

      Dogpile

    • B. 

      Yahoo

    • C. 

      Google

  • 25. 
    All of the following are BOOLEAN operators used in Google EXCEPT
    • A. 

      But

    • B. 

      And

    • C. 

      Or

    • D. 

      And Not

  • 26. 
    The language of the Internet, allowing cross-network communication
    • A. 

      TCP/IP

    • B. 

      Internetworking

    • C. 

      ISP

    • D. 

      Router

  • 27. 
    Web entry station that offer quick and easy access to a variety of general- interest links
    • A. 

      Portals

    • B. 

      Consumer portals

    • C. 

      Corporate portals

    • D. 

      Vertical portals

  • 28. 
    That part of the web that standard search engines don't access is referred to as
    • A. 

      Blind Web

    • B. 

      Lost Web

    • C. 

      Invisible Web

    • D. 

      Non-access Web

  • 29. 
    Unsolicited emails are called  
    • A. 

      Spams

    • B. 

      Viruses

    • C. 

      Trojans

    • D. 

      Spyware

  • 30. 
    Doing a Search on the Internet using the Boolean Operator  of  "OR" will find all websites that
    • A. 

      Contain all keywords used

    • B. 

      Contain one or the other keywords

    • C. 

      Contain all BUT the keywords