Introduction To Computers Exam 2a

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Hsahnoun
H
Hsahnoun
Community Contributor
Quizzes Created: 1 | Total Attempts: 733
| Attempts: 733 | Questions: 25
Please wait...
Question 1 / 25
0 %
0/100
Score 0/100
1. An Internet search tool such as Google, Bing or Yahoo! is referred to as ________

Explanation

An Internet search tool such as Google, Bing or Yahoo! is commonly referred to as a search engine. It is designed to help users find specific information on the internet by searching through a vast database of web pages and returning relevant results based on the user's query.

Submit
Please wait...
About This Quiz
Introduction To Computers Exam 2a - Quiz

This exam evaluates knowledge on computer networking, including network types, internet protocols, modem technologies, and primary internet services.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. What type of network is formed when computers are connected with one server computer sharing its resources with multiple computers?

Explanation

When computers are connected with one server computer sharing its resources with multiple computers, a client/server network is formed. In this type of network, the server computer provides services and resources to the client computers. The clients request and access these resources from the server. This type of network allows for centralized control and management of resources, making it efficient and scalable for organizations.

Submit
3. A network can be very small, but it must consist of at least ______

Explanation

A network can be very small, but it must consist of at least two computers. This is because a network is a collection of interconnected devices that can communicate with each other and share resources. In order for communication and resource sharing to occur, there must be at least two devices present. Therefore, having only one computer would not meet the minimum requirement for a network.

Submit
4. What does saving a draft do?

Explanation

Saving a draft allows the user to save an outgoing email message without sending it immediately. This feature is useful when the user wants to revisit and make revisions to the email before sending it. By saving the draft, the user can ensure that the email is not accidentally sent in an incomplete or incorrect state.

Submit
5. Which statement is true about the Internet?

Explanation

The statement that is true about the Internet is that it uses the TCP/IP protocol. TCP/IP (Transmission Control Protocol/Internet Protocol) is the set of protocols that enables communication between devices on the Internet. It provides a reliable and standardized method for data transmission and ensures that data packets are correctly delivered from the source to the destination. TCP/IP is the foundation of the Internet and is used for various applications such as email, web browsing, file transfer, and more.

Submit
6. Every valid e-mail address must contain _______ .

Explanation

Every valid e-mail address must contain the @ symbol. The @ symbol is a crucial component of an e-mail address as it separates the local part (before the @ symbol) from the domain part (after the @ symbol). Without the @ symbol, the e-mail address would not be recognized as valid.

Submit
7. A Web page address is generally referred to as a _________

Explanation

A Web page address is generally referred to as a Uniform Resource Locator (URL). A URL is a specific character string that provides the location of a resource on the internet. It includes the protocol used to access the resource (such as HTTP or HTTPS), the domain name or IP address of the server hosting the resource, and the specific path or location of the resource on the server. URLs are used to navigate and access web pages, files, images, videos, and other resources on the internet.

Submit
8. What are the two most used services on the Internet?

Explanation

The Web and E-mail are the two most used services on the Internet because they are widely accessible and commonly used by individuals and businesses. The Web allows users to access and share information through websites, while E-mail allows for communication and exchange of messages electronically. These services are integral to the functioning of the Internet and are utilized by a large number of people on a daily basis.

Submit
9. Which statement about e-mail is true?

Explanation

One of the true statements about email is that it allows the sender to send a message to multiple users simultaneously. This is one of the key advantages of email as it allows for efficient communication with multiple recipients without the need for individual messages.

Submit
10. Who were the main users of the first edition of the Internet?

Explanation

During its early stages, the first edition of the Internet was primarily used by the military and defense contractors. It was initially developed as a means of communication and data sharing among military organizations and research institutions. The Internet's infrastructure and technology were mainly funded and utilized by these entities for strategic and security purposes. It wasn't until later that the Internet expanded its user base to include the general public, major banks, retailers, and programmers at companies like Microsoft.

Submit
11. How can you search the Web for an exact phrase in Google or Yahoo!?

Explanation

To search for an exact phrase in Google or Yahoo!, you need to place the phrase in quotation marks. This ensures that the search engine looks for the exact phrase rather than individual words. By using quotation marks, the search results will only display pages that contain the exact phrase as it is typed, providing more accurate and relevant results.

Submit
12. What are the three types of links you can find on Web pages?

Explanation

The correct answer is text links, image links, and image map links. These are the three types of links commonly found on web pages. Text links are hyperlinks that are embedded within text, allowing users to click on specific words or phrases to navigate to another page. Image links are clickable images that redirect users to another page when clicked. Image map links are specific areas within an image that act as clickable links, allowing users to navigate to different destinations based on where they click on the image.

Submit
13. What should you do if you receive an e-mail message with an unsolicited file attached to it from somebody you don't know?

Explanation

If you receive an e-mail message with an unsolicited file attached to it from somebody you don't know, it is best to delete the e-mail without opening it. Opening or downloading files from unknown sources can potentially expose your computer to viruses, malware, or other security threats. It is important to exercise caution and prioritize your online safety by avoiding interactions with suspicious or untrusted emails.

Submit
14. How do you use a URL to browse the Web?

Explanation

To browse the web using a URL, you need to enter the URL in the address box of the web browser. The address box is where you type the website address or URL you want to visit. Once you enter the URL, the web browser will connect to the server hosting the website and display the requested webpage. This is the standard and most common method of accessing websites on the internet.

Submit
15. Which information is not true about search engines?

Explanation

This statement is not true because different search engines use different algorithms and have different databases, which can lead to variations in search results.

Submit
16. How do folders work in Microsoft Outlook?

Explanation

not-available-via-ai

Submit
17. How do you start a particular Web browser in Windows 10?

Explanation

To start a particular web browser in Windows 10, you can either double-click its icon on the desktop or find it in the Start menu. This action will open the web browser and allow you to begin browsing the internet.

Submit
18. What happens when you send a blind carbon copy (bcc) of an e-mail message?

Explanation

When you send a blind carbon copy (bcc) of an email message, the recipient of the bcc receives a copy of the email without any other recipients knowing. This means that the main recipient, as well as any other recipients in the cc or bcc fields, are unaware that the email has been sent to the bcc recipient. It allows for discreet communication or sending the same message to multiple recipients without revealing their identities to each other.

Submit
19. What action on your part will guarantee that your computer will never be infected with any malware?

Explanation

The correct answer states that there is no practical way to guarantee that your computer will never be infected unless you don't use it at all. This means that no matter what actions you take, there is always a possibility of your computer getting infected with malware. While simple common sense, the installation of anti-virus software, and refusing to install software obtained from other people can reduce the risk of infection, they cannot completely eliminate it. Therefore, the only way to guarantee no infection is to not use the computer at all.

Submit
20. When setting up an e-mail account in Gmail, how can you tell if the e-mail address you chose is available?

Explanation

The correct answer is that the setup program displays a list of all existing email addresses in Gmail, allowing the user to choose an address that is not already taken. This feature helps to ensure that the chosen email address is unique and available for use.

Submit
21. Which method would be the most useful if you end up with unwanted or unknown software on your computer through downloading and installing programs?

Explanation

Running an uninstaller program would be the most useful method if you end up with unwanted or unknown software on your computer through downloading and installing programs. Uninstaller programs are specifically designed to remove software from a computer system completely. By running an uninstaller program, you can effectively remove the unwanted or unknown software, ensuring that all associated files, folders, and registry entries are deleted from your computer. This helps to free up disk space and eliminate any potential issues or conflicts caused by the unwanted software.

Submit
22. Which type of malicious software does not attach itself to files, but runs in active memory and does not require human action to cause harm or replicate itself

Explanation

A Trojan Horse is a type of malicious software that does not attach itself to files, but instead runs in active memory. It does not require human action to cause harm or replicate itself. Unlike viruses, which attach themselves to files and require human action to spread, Trojan Horses can enter a system undetected and perform malicious actions without the user's knowledge. They often disguise themselves as legitimate programs or files, tricking users into downloading or installing them. Once inside a system, Trojan Horses can steal sensitive information, modify or delete files, or even give remote control of the infected system to the attacker.

Submit
23. How are website shortcuts organized in a Web browser?

Explanation

Website shortcuts in a web browser are organized by sorting them by date and time. This means that the browser arranges the shortcuts based on when they were added or accessed, with the most recent ones appearing at the top. This helps users easily find and access their frequently visited websites, as the shortcuts are presented in a chronological order.

Submit
24. Gmail system labels cannot be ________ .

Explanation

Gmail system labels cannot be hidden. This means that users are unable to hide or remove system labels such as "Inbox," "Sent," or "Trash" from their Gmail interface. While users can customize their labels by renaming, deleting, or adding additional labels under them, hiding system labels is not an option.

Submit
25. Which type of modem provides an Internet connection through the telephone network without interrupting telephone connectivity?

Explanation

A cable modem provides an Internet connection through the television cable network, allowing users to access the Internet without interrupting their telephone connectivity. This type of modem uses the existing cable infrastructure to transmit data, providing high-speed Internet access. Unlike dial-up modems, which require a telephone line and can interrupt telephone service, cable modems operate independently, allowing users to use both the Internet and telephone simultaneously. DSL modems also provide Internet connectivity through the telephone network, but they can interrupt telephone service. Satellite modems, on the other hand, use satellite signals for Internet access and do not rely on the telephone network.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 23, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 23, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 20, 2020
    Quiz Created by
    Hsahnoun
Cancel
  • All
    All (25)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
An Internet search tool such as Google, Bing or Yahoo! is referred to...
What type of network is formed when computers are connected with one...
A network can be very small, but it must consist of at least ______
What does saving a draft do?
Which statement is true about the Internet?
Every valid e-mail address must contain _______ .
A Web page address is generally referred to as a _________
What are the two most used services on the Internet?
Which statement about e-mail is true?
Who were the main users of the first edition of the Internet?
How can you search the Web for an exact phrase in Google or Yahoo!?
What are the three types of links you can find on Web pages?
What should you do if you receive an e-mail message with an...
How do you use a URL to browse the Web?
Which information is not true about search engines?
How do folders work in Microsoft Outlook?
How do you start a particular Web browser in Windows 10?
What happens when you send a blind carbon copy (bcc) of an e-mail...
What action on your part will guarantee that your computer will never...
When setting up an e-mail account in Gmail, how can you tell if the...
Which method would be the most useful if you end up with unwanted or...
Which type of malicious software does not attach itself to files, but...
How are website shortcuts organized in a Web browser?
Gmail system labels cannot be ________ .
Which type of modem provides an Internet connection through the...
Alert!

Advertisement