Module 7 Assessment Test

By Michelle Xuereb
Michelle Xuereb, Computer science
As a computing teacher in Malta, Michelle strives to inspire students with a passion for technology and provide them with essential digital skills for a brighter future.
Quizzes Created: 3 | Total Attempts: 1,703
, Computer science
Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
Questions: 18 | Attempts: 426

SettingsSettingsSettings
Module Quizzes & Trivia

Questions and Answers
  • 1. 

    How do you change your Web browser's home page?

    • A.

      Request the change from your ISP

    • B.

      Save the Web page as a bookmark

    • C.

      Search the Web for the home page

    • D.

      Use menu options to set the current page as the home page

    Correct Answer
    D. Use menu options to set the current page as the home page
    Explanation
    To change your Web browser's home page, you can use menu options to set the current page as the home page. This means accessing the browser's settings or preferences menu and finding the option that allows you to designate the current page as the one that should load whenever you open the browser. By selecting this option, you can easily change your browser's home page to the page you are currently on.

    Rate this question:

  • 2. 

    1.   What is a digital certificate?

    • A.

      A verification that a web site is free from viruses

    • B.

      A verification of the date and time you viewed a web page

    • C.

      A verification that authenticates a web site

    • D.

      A version number indicating when the web page was published

    Correct Answer
    C. A verification that authenticates a web site
    Explanation
    A digital certificate is a verification that authenticates a web site. It is a cryptographic credential that is issued by a trusted third party, known as a Certificate Authority (CA). The certificate contains information about the identity of the website owner, such as their domain name and public key. It is used to establish a secure connection between the user's browser and the website, ensuring that the website is legitimate and that any data exchanged between the user and the website is encrypted and secure.

    Rate this question:

  • 3. 

    1.   Which one of the following is the process of encoding data to prevent unauthorised access, especially during transmission? 

    • A.

      Browsing

    • B.

      Blogging

    • C.

      Encryption

    • D.

      Phishing

    Correct Answer
    C. Encryption
    Explanation
    Encryption is the process of encoding data to prevent unauthorized access, especially during transmission. It involves converting plain text into cipher text using an encryption algorithm and a key. This ensures that even if the data is intercepted, it cannot be read or understood without the correct decryption key. Encryption is commonly used to secure sensitive information such as passwords, credit card numbers, and personal data when transmitting over networks or storing in databases. It helps protect the confidentiality and integrity of data, ensuring that only authorized individuals can access and understand it.

    Rate this question:

  • 4. 

    1.   A _____________ is a connection between a part of a Web page and a different  part of the same Web page or another Web Page.  The connection is activated by  a mouse click.  Which one of the following completes the sentence?

    • A.

      Server

    • B.

      Protocol

    • C.

      Browser

    • D.

      Hyperlink

    Correct Answer
    D. Hyperlink
    Explanation
    A hyperlink is a connection between a part of a Web page and a different part of the same Web page or another Web Page. The connection is activated by a mouse click.

    Rate this question:

  • 5. 

    1.   Malicious programs which attach themselves or inserts inside legitimate files are called 

    • A.

      Home Pages

    • B.

      Viruses

    • C.

      Hyperlinks

    • D.

      Cookies

    Correct Answer
    B. Viruses
    Explanation
    Malicious programs that attach themselves or insert inside legitimate files are known as viruses. Viruses are designed to replicate and spread, often causing damage to computer systems and files. They can be transmitted through various means such as email attachments, infected websites, or shared files. Once a virus infects a system, it can perform harmful actions such as deleting or corrupting files, stealing personal information, or slowing down the computer's performance. Therefore, viruses pose a significant threat to the security and functionality of computer systems.

    Rate this question:

  • 6. 

    1.   _________ is an address for a resource on the World Wide Web 

    • A.

      ) URL or Universal/Uniform Resource Locator

    • B.

      Cookie

    • C.

      Firewall

    • D.

      Certificate

    Correct Answer
    A. ) URL or Universal/Uniform Resource Locator
    Explanation
    A URL, also known as a Universal/Uniform Resource Locator, is an address that is used to locate and access a resource on the World Wide Web. It specifies the protocol to be used, such as HTTP or HTTPS, followed by the domain name or IP address of the server hosting the resource, and optionally the path to the specific resource. This allows users to easily navigate and access websites and web pages by simply entering the URL into a web browser.

    Rate this question:

  • 7. 

    Which one of the following is the best method to ensure access to an network  is secure?

    • A.

      The network requires a user name and password

    • B.

      The network only requires a user name for access

    • C.

      The network provides anti-virus protection

    • D.

      The network requires the user to pay a fee to gain access

    Correct Answer
    A. The network requires a user name and password
    Explanation
    The best method to ensure access to a network is secure is by requiring a user name and password. This is because using a combination of both user name and password adds an extra layer of security to the network. It ensures that only authorized individuals with the correct credentials can access the network, reducing the risk of unauthorized access and potential security breaches.

    Rate this question:

  • 8. 

     Which one of the following actions could lead to a computer being infected with a virus?

    • A.

      Deleting an unopened email message

    • B.

      Sing an e-mail filter to save incoming mail to specified folders

    • C.

      Applying all service packs and security updates to your email software

    • D.

      Opening an executable file that is attached to an email message

    Correct Answer
    D. Opening an executable file that is attached to an email message
    Explanation
    Opening an executable file that is attached to an email message could lead to a computer being infected with a virus. Executable files have the ability to run code on a computer, and if the file is infected with a virus, it can execute malicious code that can harm the computer and infect it with the virus. Therefore, opening such a file can potentially infect the computer.

    Rate this question:

  • 9. 

    1.   Which three-letter suffix in an email address identifies an organization as non-commercial? 

    • A.

      Edu

    • B.

      Org

    • C.

      Mil

    • D.

      Com

    Correct Answer
    A. Edu
    Explanation
    The three-letter suffix "edu" in an email address identifies an organization as non-commercial. This suffix is commonly used by educational institutions such as universities and colleges.

    Rate this question:

  • 10. 

     Which one of the following best describes the difference between the Cc and Bcc fields? 

    • A.

      There is no difference between the Cc and Bcc fields.

    • B.

      The Bcc recipient’s name in a mail message is NOT visible to other recipients of the message.

    • C.

      The Bcc recipient’s name in a mail message is visible to other recipients of the message.

    • D.

      The Cc recipient’s name in a mail message is NOT visible to other recipients of the message.

    Correct Answer
    B. The Bcc recipient’s name in a mail message is NOT visible to other recipients of the message.
    Explanation
    The Bcc field allows the sender to add recipients to the email without their names being visible to other recipients. This means that when the email is sent, the Bcc recipients will receive the email, but their names will not be visible to anyone else who receives the email. This is different from the Cc field, where the names of the recipients are visible to everyone who receives the email.

    Rate this question:

  • 11. 

    Which one of the following is an example of an online (virtual) community?

    • A.

      Home Page

    • B.

      Chat Room

    • C.

      Cache

    • D.

      News feed

    Correct Answer
    B. Chat Room
    Explanation
    A chat room is an example of an online (virtual) community because it is a platform where individuals can connect and interact with each other through real-time messaging. It allows people with similar interests or goals to come together, share information, engage in discussions, and build relationships. Chat rooms often have specific topics or themes, creating a sense of community and fostering a sense of belonging among its members.

    Rate this question:

  • 12. 

    Which one of the following gives you the ability to know if a desired contact  is online? 

    • A.

      Really Simple Syndication (RSS).

    • B.

      Short message service (SMS).

    • C.

      Instant messaging (IM).

    • D.

      Uniform Resource Locator (URL).

    Correct Answer
    C. Instant messaging (IM).
    Explanation
    Instant messaging (IM) is the correct answer because it allows users to see if a desired contact is online. IM platforms typically display the online status of users, indicating whether they are currently active and available for communication. This feature enables users to know if their desired contact is available for a conversation in real-time. RSS, SMS, and URL do not provide this specific ability to determine the online status of a contact.

    Rate this question:

  • 13. 

    What is a protected Web site?

    • A.

      A website that required a user name for access

    • B.

      A web site that requires a user name and password for access

    • C.

      A web site that requires the user to pay a fee for access

    • D.

      A web site that provides anti-virus protection

    Correct Answer
    B. A web site that requires a user name and password for access
    Explanation
    A protected website refers to a web page that requires a user to enter a username and password in order to gain access. This additional layer of security ensures that only authorized individuals can view the content or perform certain actions on the website.

    Rate this question:

  • 14. 

    In a web address identified by geographical area how many letters would a country code contain?

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      4

    Correct Answer
    B. 2
    Explanation
    A country code in a web address identified by geographical area typically contains two letters. Country codes are used to represent specific countries or territories in web addresses, such as .us for the United States or .uk for the United Kingdom.

    Rate this question:

  • 15. 

    Which one of the following actions would help to prevent children from accessing harmful content on the internet? 

    • A.

      Make sure an up to date anti-virus programme is running

    • B.

      Supervise computer usage sessions

    • C.

      Allow children total freedom to send and receive emails

    • D.

      Allow children to freely visit chat rooms

    Correct Answer
    B. Supervise computer usage sessions
    Explanation
    Supervising computer usage sessions would help prevent children from accessing harmful content on the internet because it allows parents or guardians to monitor and control what websites and online activities the children are engaging in. This way, they can ensure that the children are not exposed to inappropriate or harmful content.

    Rate this question:

  • 16. 

     Which one of the following is a scheme where criminals send unsolicited e-mails or pop-up messages to get personal and financial information from unsuspecting victims?

    • A.

      Browsing

    • B.

      Searching

    • C.

      Phishing

    • D.

      Blogging

    Correct Answer
    C. Phishing
    Explanation
    Phishing is a scheme where criminals send unsolicited e-mails or pop-up messages to deceive and trick unsuspecting victims into revealing their personal and financial information. This information is then used for fraudulent purposes, such as identity theft or financial scams.

    Rate this question:

  • 17. 

    Which of the following activities could be subject to fraud when purchasing goods over the internet?

    • A.

      Entering your credit card details on an electronic form

    • B.

      Entering your address on an electronic form

    • C.

      Using an electronic shopping cart to select goods online

    • D.

      Changing the quantity of goods on an electronic from

    Correct Answer
    A. Entering your credit card details on an electronic form
    Explanation
    Entering your credit card details on an electronic form could be subject to fraud when purchasing goods over the internet. This is because cybercriminals can intercept the information during transmission or gain unauthorized access to the website's database where the information is stored. They can then use the credit card details for fraudulent activities such as making unauthorized purchases or identity theft. It is important to ensure that the website is secure and trustworthy before entering sensitive information like credit card details.

    Rate this question:

  • 18. 

     Which one of the following statements about world wide web is true?

    • A.

      The world wide web is a type of e-mail

    • B.

      The internet is another name for world wide web

    • C.

      The world wide web includes the use of hypertext to connect related web documents

    • D.

      The world wide web is a global telecommunications system

    Correct Answer
    C. The world wide web includes the use of hypertext to connect related web documents
    Explanation
    The correct answer is "The world wide web includes the use of hypertext to connect related web documents." This statement is true because the world wide web, also known as the web, is a system of interconnected documents and resources that are accessed through the internet. Hypertext is the technology that allows users to navigate between these documents by clicking on links. Therefore, the web uses hypertext to connect related web documents and provide a seamless browsing experience.

    Rate this question:

Michelle Xuereb |Computer science
As a computing teacher in Malta, Michelle strives to inspire students with a passion for technology and provide them with essential digital skills for a brighter future.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 23, 2013
    Quiz Created by
    Michelle Xuereb
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.