This exam evaluates knowledge on computer networking, including network types, internet protocols, modem technologies, and primary internet services.
Client/server
Compatible/portable
Internet/e-mail
Server/Internet
Rate this question:
One computer
Two computers
Three computers
Three computers
Rate this question:
It uses the TCP/IP protocol
If any part of it fails, the rest of it fails.
It is owned and governed by the Department of Defense
Its technical standards and quality of content are the responsibility of Microsoft Corporation.
Rate this question:
It saves an outgoing e-mail message without sending it so that you can get back to it later and revise it before sending it.
It saves a copy of an outgoing e-mail message you have just sent
It saves a copy of an incoming e-mail message you have received.
It saves your outgoing e-mail message without the attachments you made to it
Rate this question:
Your true first name and initial
Your real first and last name
The @ symbol
A domain name ending with .com
Rate this question:
Uniform Signal Locator
Uniform Address Locator
Uniform Domain Locator
Uniform Resource Locator
Rate this question:
The general public
The military and defence contractors
Major banks and retailers
Programmers at Microsoft
Rate this question:
FTP and the Web
E-mail and FTP
The Web and E-mail
Usenet and E-mail
Rate this question:
Type the phrase in all uppercase font
Type the phrase in bold text
Place the phrase in quotation marks
Place the phrase in parenthesis.
Rate this question:
An e-mail message can be sent to multiple users at the same time.
E-mail is faster than faxing, although more difficult.
E-mail can be exchanged with everyone in the world, including those who don’t have an e-mail address.
E-mail typically reaches the recipient within a few hours or a few days if the recipient is in another country.
Rate this question:
Text links, image links and image map links.
Static links, dynamic links and hyperlinks
Local links, remote links and overseas links
Audio links, video links and multimedia links.
Rate this question:
Delete the e-mail without opening it.
Open the e-mail and delete the attached file
Run a virus check before opening the e-mail
Open the e-mail, but don’t run the attached file, instead save it.
Rate this question:
Enter the URL in the Google or Yahoo search box.
Enter the URL in the address box of the Web browser.
Double-click a link on a Web page and confirm its URL by clicking OK
Right-click a link on a Web page and enter the URL in the short-cut menu.
Rate this question:
The results for your search is the same no matter which search engine you use (such as Google, Bing, or Yahoo)
When you type something in the search box, it actually searches a database and not the internet directly.
Search engine companies sometimes use web crawlers to gather information for their databases.
There are meta search engines that search using more than one search engine at a time.
Rate this question:
There is a standard set of folders under which no subfolders can be created
Additional folders can only be created at the same level as the default folders.
Managing Microsoft Outlook folders is similar to managing folders in File Explorer
Storage folder hold e-mail messages that are stored both on the e-mail server and the local computer.
You have to configure it as your preferred Web browser in Control Panel
You double-click its icon on the desktop or find it in the Start menu
You click the Internet icon on your desktop and select the particular Web browser from a drop-down menu that is displayed.
You have to first open Microsoft Edge, which is the default Windows 10 Web browser, and then search for the particular Web browser on the Internet
Rate this question:
The recipient of the bcc receives a completely empty message.
The recipient of the bcc does not receive any attachments included with the e-mail message which are delivered to the main recipient.
The recipient of the bcc receives a copy of the e-mail message without any other recipients knowing.
The recipient of the bcc receives a copy of the e-mail message but doesn’t see who any of the other recipients (main, cc or other bcc) are
Rate this question:
Simple common sense
The installation of anti-virus software
Refusing to install any software obtained from other people
There is no practical way to guarantee that your computer will never be infected unless you don’t use it at all.
Rate this question:
The setup program checks your chosen address automatically.
The setup program displays a list of all its existing e-mail addresses so you can choose one that will not be a duplicate.
You have to contact Google by phone to check availability.
You find out after the e-mail program is installed. If your chosen address is a duplicate, your e-mail won’t work.
Rate this question:
Run a cleanup program to remove the unwanted software
Run an uninstaller program
Run a specialize malware software to find and quarantine the files
Run your antivirus program to isolate the problem program
Rate this question:
By placing them in folders
By combining them into a single file
By sorting them by date and time
By having them all deleted when exiting a browsing session
Rate this question:
Deleted
Hidden
Populated with additional labels under them
Renamed
Rate this question:
Worm
Virus
Spyware
Trojan Horse
Rate this question:
Dial-up modem
Cable modem
DSL modem
Satellite modem
Rate this question:
Quiz Review Timeline (Updated): Mar 23, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.