Module 6 Multiple Choice Question

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Qudratullah
Q
Qudratullah
Community Contributor
Quizzes Created: 1 | Total Attempts: 115
Questions: 32 | Attempts: 115

SettingsSettingsSettings
Module 6 Multiple Choice Question - Quiz


There are 32 question each the question has one correct answer
Prepared: Shabir Ahmad Parsa
To Start Test Click on Start Button


Questions and Answers
  • 1. 

    In the address [email protected] what does the anesbit part represent?

    • A.

      Username

    • B.

      Host name

    • C.

      Location

    • D.

      Domain name

    Correct Answer
    A. Username
    Explanation
    The anesbit part in the email address [email protected] represents the username. The username is the unique identifier of an individual or entity within a system or network. In this case, anesbit is the specific username for the email address.

    Rate this question:

  • 2. 

    Which on these is NOT a true statement about e-mail?

    • A.

      A. Email may introduce viruses into your computer.

    • B.

      B. The same message can be sent to many people at the same time

    • C.

      C. Email messages can get lost before reaching their destination

    • D.

      D. Messages can only be sent to people using the same host

    Correct Answer
    D. D. Messages can only be sent to people using the same host
    Explanation
    The statement "Messages can only be sent to people using the same host" is not a true statement about email. Email allows messages to be sent to recipients using different hosts or email providers.

    Rate this question:

  • 3. 

    Internet sites store data on your local computer. These are called…..?

    • A.

      A. Channels

    • B.

      B. Bookmarks

    • C.

      C. Cookies

    • D.

      D. URLs

    Correct Answer
    C. C. Cookies
    Explanation
    Internet sites store data on your local computer in the form of cookies. Cookies are small files that contain information about your browsing activity and preferences. They are stored on your computer by websites you visit and are used to personalize your browsing experience, remember login credentials, and track your online behavior.

    Rate this question:

  • 4. 

    Web pages can be bookmarked. Why might you want to do this?

    • A.

      A. To ensure the information on the page does not change

    • B.

      B. To store the page on your local computer

    • C.

      C. To make it easier to access the pages at a later date

    • D.

      D. To ensure the page is still available at a later date

    Correct Answer
    C. C. To make it easier to access the pages at a later date
    Explanation
    Bookmarking web pages allows users to easily access those pages at a later date. By bookmarking a page, users can quickly navigate back to it without having to remember or search for the URL. This is especially useful for frequently visited or important pages that users want to have quick and convenient access to.

    Rate this question:

  • 5. 

    Which is the best way of finding information on the World Wide Web about specific subjects?

    • A.

      A. Follow links on your home page

    • B.

      B. Follow links on your home page

    • C.

      C. Start at a news page and follow links

    • D.

      D. Type keywords into a search engine

    Correct Answer
    D. D. Type keywords into a search engine
    Explanation
    The best way of finding information on the World Wide Web about specific subjects is to type keywords into a search engine. This is because search engines are designed to crawl and index web pages, making it easier to find relevant information based on the keywords entered. By typing in specific keywords related to the subject you are interested in, the search engine will provide a list of websites and resources that are most likely to contain the information you are looking for.

    Rate this question:

  • 6. 

    The software used to access information on the World Wide Web is…..?

    • A.

      A. A browser

    • B.

      B. An office application

    • C.

      C. A GUI

    • D.

      D. An operating system

    Correct Answer
    A. A. A browser
    Explanation
    A browser is the software used to access information on the World Wide Web. It allows users to view web pages, navigate through websites, and interact with online content. Browsers such as Google Chrome, Mozilla Firefox, and Safari are commonly used to access the internet and browse websites. They provide a graphical user interface (GUI) that allows users to easily navigate and interact with web-based content. Unlike an office application or an operating system, a browser specifically focuses on accessing and displaying web-based information.

    Rate this question:

  • 7. 

    The Internet is…..?

    • A.

      A. The World Wide Web

    • B.

      B. A global network of interconnected computers

    • C.

      C. A global protocol

    • D.

      D. A global operating system

    Correct Answer
    B. B. A global network of interconnected computers
    Explanation
    The correct answer is B. A global network of interconnected computers. The Internet is a vast network that connects millions of computers and devices worldwide, allowing them to communicate and share information. It is not limited to just the World Wide Web or a specific protocol or operating system, but rather encompasses all of these elements and more.

    Rate this question:

  • 8. 

    How is multimedia information stored on the Internet displayed on your computer?

    • A.

      A. Via the World Wide Web

    • B.

      B. By an office application

    • C.

      C. Using a cache application

    • D.

      D. From the operating system

    Correct Answer
    A. A. Via the World Wide Web
    Explanation
    Multimedia information stored on the Internet is displayed on your computer via the World Wide Web. The World Wide Web is a system of interconnected documents and other resources, linked by hyperlinks and URLs. When you access a website or webpage that contains multimedia content, such as images, videos, or audio files, the web browser retrieves and displays this content from the Internet. The World Wide Web acts as the medium through which multimedia information is accessed and displayed on your computer.

    Rate this question:

  • 9. 

    The software used to access information on the Internet is …?

    • A.

      A. A browser

    • B.

      B. An office application

    • C.

      C. A GUI

    • D.

      D. An operating system

    Correct Answer
    A. A. A browser
    Explanation
    A browser is the software used to access information on the Internet. It allows users to view web pages, download files, and interact with online content. Browsers such as Google Chrome, Mozilla Firefox, and Safari provide a graphical user interface (GUI) that enables users to navigate the Internet and access various websites. While an office application is used for tasks such as creating documents and spreadsheets, and an operating system manages computer hardware and software, neither of these options specifically relate to accessing information on the Internet. Therefore, the correct answer is A. A browser.

    Rate this question:

  • 10. 

    Where is information that you view on the Internet stored on your computer?

    • A.

      A. In the History

    • B.

      B. In a bookmark

    • C.

      C. In the cache

    • D.

      D. In text files

    Correct Answer
    A. A. In the History
    Explanation
    When you view information on the Internet, it is stored in your computer's browser history. The browser history keeps a record of all the websites you have visited, including the web pages, images, and other content that you have accessed. This allows you to easily revisit previously viewed websites by accessing your browsing history.

    Rate this question:

  • 11. 

    In the address [email protected] what does the de part represent?

    • A.

      A. Username

    • B.

      B. Host name

    • C.

      C. Location

    • D.

      D. Domain name

    Correct Answer
    D. D. Domain name
    Explanation
    The "de" part in the email address [email protected] represents the domain name. The domain name is the part of the email address that follows the "@" symbol and indicates the organization or entity that the email address belongs to. In this case, "co.de" is the domain name, indicating that the email address belongs to the organization or entity with the domain "co.de".

    Rate this question:

  • 12. 

    Which of these is NOT a true statement about e-mail?

    • A.

      A. Viruses can be distributed as email attachments.

    • B.

      B. You can send an email message to anyone in the world

    • C.

      C. Email can be used to send a message to groups of people

    • D.

      D. You can attach an electronic signature to your messages.

    Correct Answer
    D. D. You can attach an electronic signature to your messages.
    Explanation
    Email is a widely used communication method that allows users to send messages to anyone in the world and can be used to send messages to groups of people. Additionally, viruses can be distributed as email attachments. However, the statement that is not true about email is that you can attach an electronic signature to your messages.

    Rate this question:

  • 13. 

    Which one of the following is a program used to view HTML documents on the World Wide Web?

    • A.

      A. A hyperlink

    • B.

      B. A bookmark

    • C.

      C. A browser

    • D.

      D. A cookie

    Correct Answer
    C. C. A browser
    Explanation
    A browser is a program used to view HTML documents on the World Wide Web. It allows users to navigate through different web pages, access various websites, and display the content of these pages in a readable format. Browsers interpret the HTML code and render it as a visual webpage, including text, images, links, and other elements. They also provide additional features such as bookmarking, tabbed browsing, and security settings to enhance the user's browsing experience.

    Rate this question:

  • 14. 

    Which one of the following is a digital certificate?

    • A.

      A. A program that allows the regular update of the antivirus program on a computer.

    • B.

      B. A program that searches for an Internet connection.

    • C.

      C. A program that refreshes web pages.

    • D.

      D. A program that provides an assurance that software downloaded from the Internet comes from a trustworthy source.

    Correct Answer
    D. D. A program that provides an assurance that software downloaded from the Internet comes from a trustworthy source.
    Explanation
    A digital certificate is a program that provides assurance that software downloaded from the Internet comes from a trustworthy source. This means that the certificate verifies the authenticity and integrity of the software, ensuring that it has not been tampered with or modified by unauthorized parties. This is important for security purposes, as it helps users to trust and safely use the downloaded software without the risk of malware or other malicious activities.

    Rate this question:

  • 15. 

    Which one of the following is an advantage of e-mail?

    • A.

      A. E-mail messages are always easy to locate.

    • B.

      B. E-mail is a low cost way to send messages worldwide.

    • C.

      C. E-mail is always a secure means of sending messages.

    • D.

      D. E-mail eliminates the need for conventional surface mail.

    Correct Answer
    B. B. E-mail is a low cost way to send messages worldwide.
    Explanation
    E-mail is a low cost way to send messages worldwide because it does not require physical postage or delivery fees. Additionally, e-mail allows for instant communication, eliminating the need for waiting for traditional mail to be delivered. This makes it a convenient and cost-effective option for sending messages to recipients around the world.

    Rate this question:

  • 16. 

    A Chat Room is an example of which one of the following?

    • A.

      A. A Voice over Internet Protocol.

    • B.

      B. A podcast.

    • C.

      C. Phishing.

    • D.

      D. An online virtual community.

    Correct Answer
    D. D. An online virtual community.
    Explanation
    A chat room is an example of an online virtual community because it is a platform where people can connect and communicate with each other in real-time. It allows individuals to join specific chat rooms based on their interests or topics of discussion, creating a sense of community among participants. Unlike a voice over internet protocol (VoIP), which is a technology used for making voice calls over the internet, a podcast, which is a digital audio or video file that can be downloaded and listened to offline, or phishing, which is a fraudulent attempt to obtain sensitive information, a chat room primarily focuses on facilitating online interactions and fostering a sense of community among its users.

    Rate this question:

  • 17. 

    Which one of the following describes Malware?

    • A.

      A. Software that is used to backup data to an external storage device

    • B.

      B. Software that is created and distributed for harmful purposes

    • C.

      C. Software that is used to detect problems in the operating system

    • D.

      D. Software that is used to create web pages

    Correct Answer
    B. B. Software that is created and distributed for harmful purposes
    Explanation
    Malware refers to software that is created and distributed for harmful purposes. It is designed to disrupt, damage, or gain unauthorized access to computer systems or networks. Malware includes various types such as viruses, worms, Trojans, ransomware, spyware, and adware. Its primary objective is to exploit vulnerabilities in a system and compromise its security, often resulting in data theft, financial loss, or system malfunction. Therefore, option B accurately describes the nature of malware.

    Rate this question:

  • 18. 

    What is encryption and why is it used?

    • A.

      A. Encoding of data to prevent infection by computer viruses

    • B.

      B. Encoding of data to prevent loss of data

    • C.

      C. Encoding of data to prevent accidental deletion

    • D.

      D. Encoding of data to prevent unauthorized access to data

    Correct Answer
    D. D. Encoding of data to prevent unauthorized access to data
    Explanation
    Encryption is the process of encoding data in such a way that only authorized parties can access and understand it. It is used to prevent unauthorized access to sensitive information, such as personal data, financial records, or classified documents. By encrypting data, it becomes unreadable to anyone who does not possess the appropriate decryption key, making it significantly more difficult for hackers or unauthorized individuals to gain access to the data. Encryption is an essential security measure in today's digital age, helping to protect sensitive information and maintain privacy.

    Rate this question:

  • 19. 

    How do you change your Web browser's home page?

    • A.

      A. Request the change from your ISP

    • B.

      B. Save the Web page as a bookmark

    • C.

      C. Search the Web for the home page

    • D.

      D. Use menu options to set the current page as the home page

    Correct Answer
    D. D. Use menu options to set the current page as the home page
    Explanation
    To change your Web browser's home page, you can use menu options to set the current page as the home page. This means that within the browser's settings or preferences, there is an option to select the current page you are on and set it as the default home page. This allows you to quickly access your desired page whenever you open your browser.

    Rate this question:

  • 20. 

    Which one of the following is the process of encoding data to prevent unauthorised access, especially during transmission? 

    • A.

      A. Browsing

    • B.

      B. Blogging

    • C.

      C. Encryption

    • D.

      D. Phishing

    Correct Answer
    C. C. Encryption
    Explanation
    Encryption is the process of encoding data to prevent unauthorized access, especially during transmission. It involves converting plaintext into ciphertext using an encryption algorithm and a key. This ensures that even if the data is intercepted, it cannot be understood without the proper decryption key. Encryption is commonly used to secure sensitive information such as personal data, financial transactions, and confidential communications.

    Rate this question:

  • 21. 

    Which one of the following is the best method to ensure access to an network is secure?

    • A.

      A. The network requires a user name and password

    • B.

      The network only requires a user name for access

    • C.

      C. The network provides anti-virus protection

    • D.

      D. The network requires the user to pay a fee to gain access

    Correct Answer
    A. A. The network requires a user name and password
    Explanation
    The best method to ensure access to a network is secure is by requiring a user name and password. This method adds an extra layer of security by verifying the identity of the user before granting access to the network. It helps prevent unauthorized access and protects sensitive information from being accessed by unauthorized individuals.

    Rate this question:

  • 22. 

    Which one of the following actions could lead to a computer being infected with a virus?

    • A.

      A. Deleting an unopened email message

    • B.

      B. Sing an e-mail filter to save incoming mail to specified folders

    • C.

      C. Applying all service packs and security updates to your email software

    • D.

      D. Opening an executable file that is attached to an email message

    Correct Answer
    D. D. Opening an executable file that is attached to an email message
    Explanation
    Opening an executable file that is attached to an email message can lead to a computer being infected with a virus. Executable files can contain malicious code that can harm the computer system when executed. It is important to exercise caution when opening attachments from unknown or suspicious sources to avoid the risk of virus infection.

    Rate this question:

  • 23. 

    Which three-letter suffix in an email address identifies an organization as non-commercial? 

    • A.

      A. Edu

    • B.

      B. Org

    • C.

      C. Mil

    • D.

      D. Com

    Correct Answer
    B. B. Org
    Explanation
    The three-letter suffix "org" in an email address identifies an organization as non-commercial. This suffix is commonly used by non-profit organizations, charities, and other non-commercial entities to differentiate themselves from commercial businesses. It is short for "organization" and signifies that the entity is not primarily engaged in commercial activities or profit-making ventures.

    Rate this question:

  • 24. 

    Which one of the following best describes the difference between the Cc and Bcc fields? 

    • A.

      A. There is no difference between the Cc and Bcc fields.

    • B.

      B. the Bcc recipient’s name in a mail message is NOT visible to other recipients of the message.

    • C.

      C. the Bcc recipient’s name in a mail message is visible to other recipients of the message.

    • D.

      D. the Cc recipient’s name in a mail message is NOT visible to other recipients of the message.

    Correct Answer
    B. B. the Bcc recipient’s name in a mail message is NOT visible to other recipients of the message.
    Explanation
    The correct answer is B. the Bcc recipient's name in a mail message is NOT visible to other recipients of the message. In email communication, the Cc (Carbon Copy) field is used to include additional recipients who are not the primary recipients of the message. The names of the Cc recipients are visible to all other recipients of the message. On the other hand, the Bcc (Blind Carbon Copy) field is used to add recipients without their names being visible to other recipients. This allows for a more discreet and private communication.

    Rate this question:

  • 25. 

    Which one of the following is an example of an online (virtual) community?

    • A.

      A. Home Page

    • B.

      B. Chat Room

    • C.

      C. Cache

    • D.

      D. News feed

    Correct Answer
    B. B. Chat Room
    Explanation
    A chat room is an example of an online (virtual) community because it is a platform where individuals can interact and communicate with each other in real-time. In a chat room, people can join discussions, share information, and form connections with others who have similar interests or goals. It provides a space for community building and fostering relationships, making it a prime example of an online community.

    Rate this question:

  • 26. 

    Which one of the following gives you the ability to know if a desired contact is online?

    • A.

      A. Really Simple Syndication (RSS).

    • B.

      B. Short message service (SMS).

    • C.

      C. Instant messaging (IM).

    • D.

      D. Uniform Resource Locator (URL).

    Correct Answer
    C. C. Instant messaging (IM).
    Explanation
    Instant messaging (IM) is a communication tool that allows users to send and receive messages in real-time. One of the features of instant messaging is the ability to see if a desired contact is online. This is typically indicated by a status icon or indicator next to the contact's name, which shows whether they are currently active and available for communication. Therefore, choosing instant messaging as the correct answer makes sense as it directly addresses the ability to know if a desired contact is online.

    Rate this question:

  • 27. 

    In a web address identified by geographical area how many letters would a country code contain?

    • A.

      A. 1

    • B.

      B. 2

    • C.

      C. 3

    • D.

      D. 4

    Correct Answer
    B. B. 2
    Explanation
    A country code in a web address typically contains two letters. Country codes are used to identify the geographical area associated with a specific website. Examples of country codes include "us" for the United States, "uk" for the United Kingdom, and "ca" for Canada. These two-letter codes are based on the ISO 3166-1 alpha-2 standard, which assigns a unique code to each country or territory. Therefore, the correct answer is B. 2.

    Rate this question:

  • 28. 

    Which one of the following actions would help to prevent children from accessing harmful content on the internet? 

    • A.

      A. Make sure an up to date anti-virus programme is running

    • B.

      B. Supervise computer usage sessions

    • C.

      C. Allow children total freedom to send and receive emails

    • D.

      D. Allow children to freely visit chat rooms

    Correct Answer
    B. B. Supervise computer usage sessions
    Explanation
    Supervising computer usage sessions would help prevent children from accessing harmful content on the internet because it allows parents or guardians to monitor and control what the children are doing online. By supervising, they can ensure that the children are not accessing inappropriate websites or engaging in risky online behavior. It provides an opportunity for adults to guide and educate children about internet safety, helping to protect them from potential online dangers.

    Rate this question:

  • 29. 

    Which one of the following is a scheme where criminals send unsolicited e-mails or pop-up messages to get personal and financial information from unsuspecting victims?

    • A.

      A. Browsing

    • B.

      B. Searching

    • C.

      C. Phishing

    • D.

      D. Blogging

    Correct Answer
    C. C. Phishing
    Explanation
    Phishing is a scheme where criminals send unsolicited e-mails or pop-up messages to deceive unsuspecting victims into providing personal and financial information. This information is then used for fraudulent purposes, such as identity theft or financial scams. Phishing attacks typically mimic legitimate organizations or websites, tricking individuals into believing that they are providing their information to a trusted source. This can lead to significant financial loss and compromise of sensitive data.

    Rate this question:

  • 30. 

    Which of the following activities could be subject to fraud when purchasing goods over the internet?

    • A.

      A. Entering your credit card details on an electronic form

    • B.

      B. Entering your address on an electronic form

    • C.

      C. Using an electronic shopping cart to select goods online

    • D.

      D. Changing the quantity of goods on an electronic from

    Correct Answer
    A. A. Entering your credit card details on an electronic form
    Explanation
    Entering your credit card details on an electronic form could be subject to fraud when purchasing goods over the internet. This is because when you enter your credit card information on an electronic form, there is a risk that the information could be intercepted or stolen by hackers or fraudsters. They could then use your credit card details to make unauthorized purchases or engage in identity theft. It is important to be cautious and ensure that you are entering your credit card details on secure websites to minimize the risk of fraud.

    Rate this question:

  • 31. 

    Which one of the following statements about world wide web is true?

    • A.

      A. The world wide web is a type of e-mail

    • B.

      B. The internet is another name for world wide web

    • C.

      C. The world wide web includes the use of hypertext to connect related web documents

    • D.

      D. The world wide web is a global telecommunications system

    Correct Answer
    C. C. The world wide web includes the use of hypertext to connect related web documents
    Explanation
    The correct answer is C. The world wide web includes the use of hypertext to connect related web documents. This statement is true because the world wide web is a system of interconnected documents and other resources, linked by hyperlinks and URLs. Hypertext is the technology that allows these links to be created, allowing users to navigate between different web pages and access related information.

    Rate this question:

  • 32. 

    Malicious programs which attach themselves or inserts inside legitimate files are called?

    • A.

      A. Home Pages

    • B.

      B. Viruses

    • C.

      C. Hyperlinks

    • D.

      D. Cookies

    Correct Answer
    B. B. Viruses
    Explanation
    Malicious programs that attach themselves or insert inside legitimate files are commonly known as viruses. Viruses are designed to replicate and spread by infecting other files or programs. They can cause damage to computer systems, steal information, or disrupt normal operations. Home pages, hyperlinks, and cookies are not typically associated with malicious programs that attach themselves to legitimate files.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 15, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 22, 2018
    Quiz Created by
    Qudratullah
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.