Jm Computer Literacy Assessment - Internet

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Dsaldivar
D
Dsaldivar
Community Contributor
Quizzes Created: 6 | Total Attempts: 13,658
| Attempts: 928 | Questions: 30
Please wait...
Question 1 / 30
0 %
0/100
Score 0/100
1. The Internet is just made up of many other networks all interacting together.

Explanation

The Internet is indeed composed of numerous interconnected networks. These networks, which can be of various sizes and types, are linked together through a system of routers and switches. This interconnected structure allows for the transmission of data and communication between devices and users across the globe. Each network contributes to the overall functioning of the Internet, making it a vast and interconnected web of networks. Therefore, the statement "The Internet is just made up of many other networks all interacting together" is true.

Submit
Please wait...
About This Quiz
Computer Quizzes & Trivia

This an assessment test only. This means the score you receive when taking this quiz will not be the actual grades posted in Powerschool. Everyone will receive credit... see morefor just taking the test. see less

2. What does ISP stand for?

Explanation

ISP stands for Internet Service Provider. An ISP is a company that provides internet access to individuals, businesses, and other organizations. They offer various types of internet connections, such as broadband, DSL, or fiber optic, and typically charge a monthly fee for their services. ISPs play a crucial role in connecting users to the internet by providing the necessary infrastructure and network services. They also offer additional services like email accounts, web hosting, and virtual private networks (VPNs) to enhance the internet experience for their customers.

Submit
3. All of the following are forms of technology used to cyberbully except:

Explanation

Television is not a form of technology used to cyberbully. Cyberbullying refers to the use of electronic communication platforms such as emails, instant messaging, and web pages to harass or intimidate others. While television can be used to spread harmful content or messages, it is not considered a direct form of cyberbullying as it does not involve the use of electronic communication platforms.

Submit
4. If the web site has an author and looks professional

Explanation

The answer suggests that if a website has an author and looks professional, it is important to conduct further research. This includes investigating the author, examining the domain, checking the links, looking for errors, and assessing for any potential bias. This is necessary to ensure the credibility and reliability of the information presented on the website.

Submit
5. Which one should you never do in a cyberbullying situation?

Explanation

In a cyberbullying situation, responding to the messages in an angry way is not recommended. Reacting angrily can escalate the situation and provide the bully with the satisfaction they seek. It may also lead to further harassment and negative consequences for the victim. Instead, it is important to remain calm and composed, block harmful messages, and seek help from a responsible adult who can provide guidance and support in dealing with the situation effectively.

Submit
6. Unsolicited emails are called  

Explanation

Unsolicited emails are commonly referred to as "spams". These are unwanted and often promotional or advertising messages that are sent to a large number of recipients without their consent. These emails are often sent in bulk and can be a nuisance to recipients, as they clutter their inbox and can potentially contain malicious content or phishing attempts. Therefore, the correct answer is "Spams".

Submit
7. All computers are identified with a 4 digit number separated by periods. This is called

Explanation

Computers are identified with a 4 digit number separated by periods, which is referred to as an IP address. The IP address is a unique numerical label assigned to each device connected to a computer network. It serves as an identifier for locating and communicating with devices on the network. Domain names, on the other hand, are user-friendly names used to identify websites, while host names refer to the name assigned to a specific device or host on a network. However, the given question specifically asks about the 4 digit number separated by periods, which is the IP address.

Submit
8. Which screenname is the most dangerous for a child to have?

Explanation

Dave93_CA is the most dangerous screenname for a child to have because it includes personal information (Dave's name and location) which can make it easier for predators to track and target the child. The inclusion of "CA" also indicates the location, further narrowing down the child's whereabouts. This screenname provides more identifiable information compared to the other options, making it riskier for a child's online safety.

Submit
9. Which of the following domains is LEAST reliable?

Explanation

The .net domain is generally considered to be the least reliable among the given options. This is because .net domains are commonly associated with network infrastructure and service providers, making them more susceptible to potential security vulnerabilities and unreliable hosting services compared to the other options.

Submit
10. The .com domain web sites are

Explanation

The .com domain is primarily used for commercial purposes, such as businesses or mixed sites that offer products or services. This domain is commonly associated with e-commerce and online businesses. Government institutions usually have their own specific domain extensions, such as .gov, while non-profit institutions and education institutions often use .org or .edu respectively. Therefore, the correct answer is business or other mixed sites.

Submit
11. The purpose of a web browser is what?

Explanation

The purpose of a web browser is not solely to do internet searches. While internet searches are a common activity performed using a web browser, the primary purpose of a web browser is to display web pages from websites. It allows users to access and navigate through different websites, view content, interact with web applications, and perform various tasks online.

Submit
12. To be safer, what should you do if you post pictures online?

Explanation

To be safer when posting pictures online, it is advisable to blur the pictures. Blurring the pictures helps to protect your privacy and prevent any potential misuse of the images. By blurring the pictures, you can make it more difficult for others to identify you or any other individuals in the photos, reducing the risk of unauthorized use or potential harm. This precautionary measure adds an extra layer of security and safeguards your personal information.

Submit
13. Schools and businesses most often connect to the Internet through a ___________.

Explanation

Schools and businesses typically connect to the Internet through a LAN (Local Area Network). A LAN is a network that connects computers and devices within a limited area, such as a school or office building. It allows for the sharing of resources, such as printers and files, and provides a secure and efficient way for users to access the Internet. A LAN is usually connected to the Internet through a router, which acts as a gateway between the LAN and the Internet. The other options, such as a firewall, Internet Service Provider, and World Wide Web, are not the primary means by which schools and businesses connect to the Internet.

Submit
14. Web entry station that offer quick and easy access to a variety of general- interest links

Explanation

A web entry station refers to a website that serves as a starting point for users to access a wide range of general-interest links. These links can lead to various types of portals, including consumer portals, corporate portals, and vertical portals. Portals are websites that provide centralized access to information, services, and resources related to a specific topic or industry. Therefore, the given answer "portals" is correct as it encompasses all the mentioned types of portals that can be accessed through a web entry station.

Submit
15. What is the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others?

Explanation

Cyberbullying refers to the use of information and communication technologies to intentionally harm others through repeated and hostile behavior. This can include sending threatening messages, spreading rumors, or sharing embarrassing photos or videos online. It is a form of harassment that occurs in the digital space, often targeting individuals or groups with the intention of causing emotional distress and harm. Cyberbullying can have severe psychological and emotional consequences for the victims, making it a serious issue that needs to be addressed.

Submit
16. What is the safest things to do in public chatrooms?

Explanation

Blocking any unknown people that talk to you is the safest thing to do in public chatrooms. This helps to protect your personal information and ensures that you only interact with people you trust. By blocking unknown individuals, you can avoid potential scams, cyberbullying, and other online threats. It is important to maintain a level of caution and privacy when engaging in public chatrooms to ensure your safety and security.

Submit
17. A group of related web pages form

Explanation

A group of related web pages form a website. A website is a collection of interconnected web pages that are hosted on a server and can be accessed by users through a web browser. It typically includes a home page, which serves as the main entry point to the website and provides links to other pages within the site. The term "website" is commonly used to refer to a complete online presence, including all the web pages, images, multimedia, and other content associated with a particular domain or URL.

Submit
18. What technology do teens use the most for cyberbullying?

Explanation

Teens use instant messages the most for cyberbullying because it provides them with a quick and direct way to communicate with their peers. Instant messaging platforms allow for real-time conversations, making it easier for bullies to send hurtful messages, spread rumors, or engage in other forms of online harassment. Additionally, instant messages can be easily shared and forwarded, amplifying the impact of cyberbullying incidents.

Submit
19. What is one of the problems that makes cyberbullying easy?

Explanation

One of the problems that makes cyberbullying easy is the fact that computers are often located in a teen's private room, which keeps their parents from seeing the problem. This lack of parental supervision allows cyberbullying to occur without immediate intervention or awareness from adults.

Submit
20. Doing a Search on the Internet using the Boolean Operator  of  "OR" will find all websites that

Explanation

When conducting a search on the Internet using the Boolean Operator "OR," the search results will include websites that contain either one or the other keywords. This means that the search results will include websites that have at least one of the keywords used in the search query.

Submit
21. What is the language used to build web pages?

Explanation

HTML (Hypertext Markup Language) is the language used to build web pages. It is the standard markup language for creating the structure and presentation of web content. HTML uses a set of tags to define the elements and layout of a webpage, including headings, paragraphs, images, links, and more. It is the backbone of every web page and is interpreted by web browsers to display the content to users.

Submit
22. The Internet and World Wide Web is really the same thing

Explanation

The statement "The Internet and World Wide Web is really the same thing" is false. While the terms are often used interchangeably, they refer to different concepts. The Internet is a global network of interconnected computers that allows for the transfer of data and information. On the other hand, the World Wide Web is a system of interconnected documents and resources, accessed through the Internet, using specific protocols such as HTTP. The Internet is the infrastructure that enables the World Wide Web to exist.

Submit
23. The .org domains

Explanation

The correct answer is that .org domains must be evaluated well because this domain contains both very reputable non-profit organization web sites and advocacy groups with hidden agendas. This means that not all .org websites are reliable and trustworthy, as there are both reputable non-profit organizations and advocacy groups with hidden agendas operating within this domain. Therefore, it is important to thoroughly evaluate the content and credibility of a .org website before considering the information provided as reliable.

Submit
24. The language of the Internet, allowing cross-network communication

Explanation

TCP/IP is the correct answer because it is the language of the Internet that allows cross-network communication. TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a set of protocols used for communication between devices on the Internet. It provides a standardized method for sending and receiving data packets across different networks, ensuring reliable and efficient communication. TCP/IP is essential for the functioning of the Internet and enables devices to connect and communicate with each other regardless of their specific network configurations.

Submit
25. Which of the following Top Level Domain is considered the MOST credible?

Explanation

The .edu top-level domain is considered the most credible because it is exclusively used by educational institutions such as universities and colleges. This domain extension is regulated by the United States Department of Commerce and is only granted to institutions that meet specific criteria, ensuring that the websites under .edu are trustworthy and reliable sources of educational information.

Submit
26. All of the following are BOOLEAN operators used in Google EXCEPT

Explanation

The given correct answer is "But". In the context of Google, "But" is not a BOOLEAN operator. The other options listed (And, Or, and And Not) are all valid BOOLEAN operators used in Google. These operators are used to refine search queries and retrieve more accurate and relevant search results.

Submit
27. Which of the following are considered a meta search engine?

Explanation

Dogpile is considered a meta search engine because it gathers results from multiple search engines and displays them in one consolidated list. It does not have its own database of indexed web pages, but instead retrieves results from other search engines like Google, Yahoo, and Bing. This allows users to compare and analyze results from different search engines in one place, making it a meta search engine. Yahoo and Google, on the other hand, are not meta search engines as they have their own search algorithms and databases.

Submit
28. Online fights using electronic messages with angry and vulgar language is called what?

Explanation

Flaming refers to the act of engaging in online fights using angry and vulgar language. It involves the use of aggressive and offensive comments to attack or insult others in a digital environment. This behavior is often seen in online forums, social media platforms, or chat rooms where individuals express their anger or frustration through inflammatory language. Cyberbullying, on the other hand, refers to the deliberate and repeated harassment or intimidation of others online, which can include flaming as one of its tactics. Impersonation, however, is unrelated to the given question and refers to pretending to be someone else online.

Submit
29. That part of the web that standard search engines don't access is referred to as

Explanation

The correct answer is "Invisible Web." The term "Invisible Web" refers to the part of the web that cannot be accessed by standard search engines. This includes content that is not indexed or linked to by other websites, such as dynamically generated pages, password-protected content, and unlinked databases. The Invisible Web is estimated to be much larger than the surface web that search engines can access, making it a significant component of the overall web.

Submit
30. Which of the following is considered a Directory/Index Internet search engine?

Explanation

Yahoo is considered a Directory/Index Internet search engine because it organizes websites into categories and subcategories, making it easier for users to navigate and find specific information. Unlike traditional search engines like Google, Yahoo relies on human editors to review and categorize websites, creating a curated directory of resources. This directory-based approach allows for a more structured and organized search experience, particularly for users looking for specific topics or industries.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 07, 2009
    Quiz Created by
    Dsaldivar
Cancel
  • All
    All (30)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The Internet is just made up of many other networks all interacting...
What does ISP stand for?
All of the following are forms of technology used to cyberbully...
If the web site has an author and looks professional
Which one should you never do in a cyberbullying situation?
Unsolicited emails are called  
All computers are identified with a 4 digit number separated by...
Which screenname is the most dangerous for a child to have?
Which of the following domains is LEAST reliable?
The .com domain web sites are
The purpose of a web browser is what?
To be safer, what should you do if you post pictures online?
Schools and businesses most often connect to the Internet through a...
Web entry station that offer quick and easy access to a variety of...
What is the use of information and ...
What is the safest things to do in public chatrooms?
A group of related web pages form
What technology do teens use the most for cyberbullying?
What is one of the problems that makes cyberbullying easy?
Doing a Search on the Internet using the Boolean Operator ...
What is the language used to build web pages?
The Internet and World Wide Web is really the same thing
The .org domains
The language of the Internet, allowing cross-network communication
Which of the ...
All of the following are BOOLEAN operators used in Google EXCEPT
Which of the following are considered a meta search engine?
Online fights using electronic messages with angry and vulgar language...
That part of the web that standard search engines don't access is...
Which of the ...
Alert!

Advertisement