Jm Computer Literacy Assessment - Internet

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Dsaldivar
D
Dsaldivar
Community Contributor
Quizzes Created: 6 | Total Attempts: 12,939
Questions: 30 | Attempts: 905

SettingsSettingsSettings
Computer Literacy Quizzes & Trivia

This an assessment test only. This means the score you receive when taking this quiz will not be the actual grades posted in Powerschool. Everyone will receive credit for just taking the test.


Questions and Answers
  • 1. 

    The Internet is just made up of many other networks all interacting together.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The Internet is indeed composed of numerous interconnected networks. These networks, which can be of various sizes and types, are linked together through a system of routers and switches. This interconnected structure allows for the transmission of data and communication between devices and users across the globe. Each network contributes to the overall functioning of the Internet, making it a vast and interconnected web of networks. Therefore, the statement "The Internet is just made up of many other networks all interacting together" is true.

    Rate this question:

  • 2. 

    The purpose of a web browser is what?

    • A.

      To do internet searches.

    • B.

      Search for cob webs in your house

    • C.

      Is to display web page from websites

    Correct Answer
    A. To do internet searches.
    Explanation
    The purpose of a web browser is not solely to do internet searches. While internet searches are a common activity performed using a web browser, the primary purpose of a web browser is to display web pages from websites. It allows users to access and navigate through different websites, view content, interact with web applications, and perform various tasks online.

    Rate this question:

  • 3. 

    What does ISP stand for?

    • A.

      Internet Service Provider

    • B.

      Internet Service Protection

    • C.

      Internet Signal Piping

    Correct Answer
    A. Internet Service Provider
    Explanation
    ISP stands for Internet Service Provider. An ISP is a company that provides internet access to individuals, businesses, and other organizations. They offer various types of internet connections, such as broadband, DSL, or fiber optic, and typically charge a monthly fee for their services. ISPs play a crucial role in connecting users to the internet by providing the necessary infrastructure and network services. They also offer additional services like email accounts, web hosting, and virtual private networks (VPNs) to enhance the internet experience for their customers.

    Rate this question:

  • 4. 

    A group of related web pages form

    • A.

      Www

    • B.

      Html

    • C.

      Website

    • D.

      Home page

    Correct Answer
    C. Website
    Explanation
    A group of related web pages form a website. A website is a collection of interconnected web pages that are hosted on a server and can be accessed by users through a web browser. It typically includes a home page, which serves as the main entry point to the website and provides links to other pages within the site. The term "website" is commonly used to refer to a complete online presence, including all the web pages, images, multimedia, and other content associated with a particular domain or URL.

    Rate this question:

  • 5. 

    The Internet and World Wide Web is really the same thing

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement "The Internet and World Wide Web is really the same thing" is false. While the terms are often used interchangeably, they refer to different concepts. The Internet is a global network of interconnected computers that allows for the transfer of data and information. On the other hand, the World Wide Web is a system of interconnected documents and resources, accessed through the Internet, using specific protocols such as HTTP. The Internet is the infrastructure that enables the World Wide Web to exist.

    Rate this question:

  • 6. 

    What is the language used to build web pages?

    • A.

      Http

    • B.

      Www

    • C.

      Html

    • D.

      Url

    Correct Answer
    C. Html
    Explanation
    HTML (Hypertext Markup Language) is the language used to build web pages. It is the standard markup language for creating the structure and presentation of web content. HTML uses a set of tags to define the elements and layout of a webpage, including headings, paragraphs, images, links, and more. It is the backbone of every web page and is interpreted by web browsers to display the content to users.

    Rate this question:

  • 7. 

    Which of the following is considered a Directory/Index Internet search engine?

    • A.

      Google

    • B.

      Yahoo

    • C.

      Ask Jeeves

    • D.

      Dogpile

    Correct Answer
    B. Yahoo
    Explanation
    Yahoo is considered a Directory/Index Internet search engine because it organizes websites into categories and subcategories, making it easier for users to navigate and find specific information. Unlike traditional search engines like Google, Yahoo relies on human editors to review and categorize websites, creating a curated directory of resources. This directory-based approach allows for a more structured and organized search experience, particularly for users looking for specific topics or industries.

    Rate this question:

  • 8. 

    Which of the following Top Level Domain is considered the MOST credible?

    • A.

      .org

    • B.

      .biz

    • C.

      .com

    • D.

      .edu

    Correct Answer
    D. .edu
    Explanation
    The .edu top-level domain is considered the most credible because it is exclusively used by educational institutions such as universities and colleges. This domain extension is regulated by the United States Department of Commerce and is only granted to institutions that meet specific criteria, ensuring that the websites under .edu are trustworthy and reliable sources of educational information.

    Rate this question:

  • 9. 

    Online fights using electronic messages with angry and vulgar language is called what?

    • A.

      Impersonation

    • B.

      Cyberbullying

    • C.

      Flaming

    Correct Answer
    C. Flaming
    Explanation
    Flaming refers to the act of engaging in online fights using angry and vulgar language. It involves the use of aggressive and offensive comments to attack or insult others in a digital environment. This behavior is often seen in online forums, social media platforms, or chat rooms where individuals express their anger or frustration through inflammatory language. Cyberbullying, on the other hand, refers to the deliberate and repeated harassment or intimidation of others online, which can include flaming as one of its tactics. Impersonation, however, is unrelated to the given question and refers to pretending to be someone else online.

    Rate this question:

  • 10. 

    Which one should you never do in a cyberbullying situation?

    • A.

      Tell a responsable adult

    • B.

      Block harmful messages

    • C.

      Respond to the messages in an angry way

    Correct Answer
    C. Respond to the messages in an angry way
    Explanation
    In a cyberbullying situation, responding to the messages in an angry way is not recommended. Reacting angrily can escalate the situation and provide the bully with the satisfaction they seek. It may also lead to further harassment and negative consequences for the victim. Instead, it is important to remain calm and composed, block harmful messages, and seek help from a responsible adult who can provide guidance and support in dealing with the situation effectively.

    Rate this question:

  • 11. 

    Which screenname is the most dangerous for a child to have?

    • A.

      Basketballstar19

    • B.

      Carlvr1232

    • C.

      Dave93_CA

    Correct Answer
    C. Dave93_CA
    Explanation
    Dave93_CA is the most dangerous screenname for a child to have because it includes personal information (Dave's name and location) which can make it easier for predators to track and target the child. The inclusion of "CA" also indicates the location, further narrowing down the child's whereabouts. This screenname provides more identifiable information compared to the other options, making it riskier for a child's online safety.

    Rate this question:

  • 12. 

    What is the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others?

    • A.

      Hacking

    • B.

      Cyberbullying

    • C.

      Predator

    Correct Answer
    B. Cyberbullying
    Explanation
    Cyberbullying refers to the use of information and communication technologies to intentionally harm others through repeated and hostile behavior. This can include sending threatening messages, spreading rumors, or sharing embarrassing photos or videos online. It is a form of harassment that occurs in the digital space, often targeting individuals or groups with the intention of causing emotional distress and harm. Cyberbullying can have severe psychological and emotional consequences for the victims, making it a serious issue that needs to be addressed.

    Rate this question:

  • 13. 

    All of the following are forms of technology used to cyberbully except:

    • A.

      E-Mails

    • B.

      Instant Messaging

    • C.

      Web Pages

    • D.

      Television

    Correct Answer
    D. Television
    Explanation
    Television is not a form of technology used to cyberbully. Cyberbullying refers to the use of electronic communication platforms such as emails, instant messaging, and web pages to harass or intimidate others. While television can be used to spread harmful content or messages, it is not considered a direct form of cyberbullying as it does not involve the use of electronic communication platforms.

    Rate this question:

  • 14. 

    What technology do teens use the most for cyberbullying?

    • A.

      Email

    • B.

      Cell Phones

    • C.

      Instant Messages

    • D.

      Mail

    Correct Answer
    C. Instant Messages
    Explanation
    Teens use instant messages the most for cyberbullying because it provides them with a quick and direct way to communicate with their peers. Instant messaging platforms allow for real-time conversations, making it easier for bullies to send hurtful messages, spread rumors, or engage in other forms of online harassment. Additionally, instant messages can be easily shared and forwarded, amplifying the impact of cyberbullying incidents.

    Rate this question:

  • 15. 

    To be safer, what should you do if you post pictures online?

    • A.

      Have a picture of only yourself

    • B.

      Blur the pictures

    • C.

      Have everyone in the picture tagged with their full name

    Correct Answer
    B. Blur the pictures
    Explanation
    To be safer when posting pictures online, it is advisable to blur the pictures. Blurring the pictures helps to protect your privacy and prevent any potential misuse of the images. By blurring the pictures, you can make it more difficult for others to identify you or any other individuals in the photos, reducing the risk of unauthorized use or potential harm. This precautionary measure adds an extra layer of security and safeguards your personal information.

    Rate this question:

  • 16. 

    What is the safest things to do in public chatrooms?

    • A.

      Don't invite anyone to them

    • B.

      Make a screen name that has nothing to do with yourself

    • C.

      Block any unknown people that talk to you

    • D.

      Don't say a word

    Correct Answer
    C. Block any unknown people that talk to you
    Explanation
    Blocking any unknown people that talk to you is the safest thing to do in public chatrooms. This helps to protect your personal information and ensures that you only interact with people you trust. By blocking unknown individuals, you can avoid potential scams, cyberbullying, and other online threats. It is important to maintain a level of caution and privacy when engaging in public chatrooms to ensure your safety and security.

    Rate this question:

  • 17. 

    What is one of the problems that makes cyberbullying easy?

    • A.

      Computers are in a teen's private room which keeps their parents from seeing the problem

    • B.

      The bully doesn't think that it makes more of an impact since it is over the internet

    • C.

      The bully doesn't have to see the victim's reaction to being bullie

    • D.

      Online predators are very good at grooming them into talking to the

    Correct Answer
    A. Computers are in a teen's private room which keeps their parents from seeing the problem
    Explanation
    One of the problems that makes cyberbullying easy is the fact that computers are often located in a teen's private room, which keeps their parents from seeing the problem. This lack of parental supervision allows cyberbullying to occur without immediate intervention or awareness from adults.

    Rate this question:

  • 18. 

    Schools and businesses most often connect to the Internet through a ___________.

    • A.

      Firewall

    • B.

      LAN (Local Area Network)

    • C.

      Internet Service Provider

    • D.

      World Wide Web

    Correct Answer
    B. LAN (Local Area Network)
    Explanation
    Schools and businesses typically connect to the Internet through a LAN (Local Area Network). A LAN is a network that connects computers and devices within a limited area, such as a school or office building. It allows for the sharing of resources, such as printers and files, and provides a secure and efficient way for users to access the Internet. A LAN is usually connected to the Internet through a router, which acts as a gateway between the LAN and the Internet. The other options, such as a firewall, Internet Service Provider, and World Wide Web, are not the primary means by which schools and businesses connect to the Internet.

    Rate this question:

  • 19. 

    All computers are identified with a 4 digit number separated by periods. This is called

    • A.

      Domain name

    • B.

      Host name

    • C.

      Ip address

    Correct Answer
    C. Ip address
    Explanation
    Computers are identified with a 4 digit number separated by periods, which is referred to as an IP address. The IP address is a unique numerical label assigned to each device connected to a computer network. It serves as an identifier for locating and communicating with devices on the network. Domain names, on the other hand, are user-friendly names used to identify websites, while host names refer to the name assigned to a specific device or host on a network. However, the given question specifically asks about the 4 digit number separated by periods, which is the IP address.

    Rate this question:

  • 20. 

    Which of the following domains is LEAST reliable?

    • A.

      .edu

    • B.

      .net

    • C.

      .gov

    Correct Answer
    B. .net
    Explanation
    The .net domain is generally considered to be the least reliable among the given options. This is because .net domains are commonly associated with network infrastructure and service providers, making them more susceptible to potential security vulnerabilities and unreliable hosting services compared to the other options.

    Rate this question:

  • 21. 

    The .com domain web sites are

    • A.

      Government Institutions

    • B.

      Business or other mixed sites.

    • C.

      Non-profit Institutions

    • D.

      Education Institutions

    Correct Answer
    B. Business or other mixed sites.
    Explanation
    The .com domain is primarily used for commercial purposes, such as businesses or mixed sites that offer products or services. This domain is commonly associated with e-commerce and online businesses. Government institutions usually have their own specific domain extensions, such as .gov, while non-profit institutions and education institutions often use .org or .edu respectively. Therefore, the correct answer is business or other mixed sites.

    Rate this question:

  • 22. 

    The .org domains

    • A.

      Contain reputable non-profit organizations with reliable information always.

    • B.

      Are always non-profit organizations that are reputable.

    • C.

      Contain only advocacy group web sites with political agendas

    • D.

      Must be evaluated well because this domain contains both very reputable non-profit organization web sites and advocacy groups with hidden agendas

    Correct Answer
    D. Must be evaluated well because this domain contains both very reputable non-profit organization web sites and advocacy groups with hidden agendas
    Explanation
    The correct answer is that .org domains must be evaluated well because this domain contains both very reputable non-profit organization web sites and advocacy groups with hidden agendas. This means that not all .org websites are reliable and trustworthy, as there are both reputable non-profit organizations and advocacy groups with hidden agendas operating within this domain. Therefore, it is important to thoroughly evaluate the content and credibility of a .org website before considering the information provided as reliable.

    Rate this question:

  • 23. 

    If the web site has an author and looks professional

    • A.

      You should look at the domain

    • B.

      You should expect good research

    • C.

      You should research the author, look at the domain, check the links, check for errors, look for bias, etc.

    Correct Answer
    C. You should research the author, look at the domain, check the links, check for errors, look for bias, etc.
    Explanation
    The answer suggests that if a website has an author and looks professional, it is important to conduct further research. This includes investigating the author, examining the domain, checking the links, looking for errors, and assessing for any potential bias. This is necessary to ensure the credibility and reliability of the information presented on the website.

    Rate this question:

  • 24. 

    Which of the following are considered a meta search engine?

    • A.

      Dogpile

    • B.

      Yahoo

    • C.

      Google

    Correct Answer
    A. Dogpile
    Explanation
    Dogpile is considered a meta search engine because it gathers results from multiple search engines and displays them in one consolidated list. It does not have its own database of indexed web pages, but instead retrieves results from other search engines like Google, Yahoo, and Bing. This allows users to compare and analyze results from different search engines in one place, making it a meta search engine. Yahoo and Google, on the other hand, are not meta search engines as they have their own search algorithms and databases.

    Rate this question:

  • 25. 

    All of the following are BOOLEAN operators used in Google EXCEPT

    • A.

      But

    • B.

      And

    • C.

      Or

    • D.

      And Not

    Correct Answer
    A. But
    Explanation
    The given correct answer is "But". In the context of Google, "But" is not a BOOLEAN operator. The other options listed (And, Or, and And Not) are all valid BOOLEAN operators used in Google. These operators are used to refine search queries and retrieve more accurate and relevant search results.

    Rate this question:

  • 26. 

    The language of the Internet, allowing cross-network communication

    • A.

      TCP/IP

    • B.

      Internetworking

    • C.

      ISP

    • D.

      Router

    Correct Answer
    A. TCP/IP
    Explanation
    TCP/IP is the correct answer because it is the language of the Internet that allows cross-network communication. TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a set of protocols used for communication between devices on the Internet. It provides a standardized method for sending and receiving data packets across different networks, ensuring reliable and efficient communication. TCP/IP is essential for the functioning of the Internet and enables devices to connect and communicate with each other regardless of their specific network configurations.

    Rate this question:

  • 27. 

    Web entry station that offer quick and easy access to a variety of general- interest links

    • A.

      Portals

    • B.

      Consumer portals

    • C.

      Corporate portals

    • D.

      Vertical portals

    Correct Answer
    A. Portals
    Explanation
    A web entry station refers to a website that serves as a starting point for users to access a wide range of general-interest links. These links can lead to various types of portals, including consumer portals, corporate portals, and vertical portals. Portals are websites that provide centralized access to information, services, and resources related to a specific topic or industry. Therefore, the given answer "portals" is correct as it encompasses all the mentioned types of portals that can be accessed through a web entry station.

    Rate this question:

  • 28. 

    That part of the web that standard search engines don't access is referred to as

    • A.

      Blind Web

    • B.

      Lost Web

    • C.

      Invisible Web

    • D.

      Non-access Web

    Correct Answer
    C. Invisible Web
    Explanation
    The correct answer is "Invisible Web." The term "Invisible Web" refers to the part of the web that cannot be accessed by standard search engines. This includes content that is not indexed or linked to by other websites, such as dynamically generated pages, password-protected content, and unlinked databases. The Invisible Web is estimated to be much larger than the surface web that search engines can access, making it a significant component of the overall web.

    Rate this question:

  • 29. 

    Unsolicited emails are called  

    • A.

      Spams

    • B.

      Viruses

    • C.

      Trojans

    • D.

      Spyware

    Correct Answer
    A. Spams
    Explanation
    Unsolicited emails are commonly referred to as "spams". These are unwanted and often promotional or advertising messages that are sent to a large number of recipients without their consent. These emails are often sent in bulk and can be a nuisance to recipients, as they clutter their inbox and can potentially contain malicious content or phishing attempts. Therefore, the correct answer is "Spams".

    Rate this question:

  • 30. 

    Doing a Search on the Internet using the Boolean Operator  of  "OR" will find all websites that

    • A.

      Contain all keywords used

    • B.

      Contain one or the other keywords

    • C.

      Contain all BUT the keywords

    Correct Answer
    B. Contain one or the other keywords
    Explanation
    When conducting a search on the Internet using the Boolean Operator "OR," the search results will include websites that contain either one or the other keywords. This means that the search results will include websites that have at least one of the keywords used in the search query.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 07, 2009
    Quiz Created by
    Dsaldivar
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.