Module 7 Assessment Test

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Michelle Xuereb
Michelle Xuereb, Computer science
As a computing teacher in Malta, Michelle strives to inspire students with a passion for technology and provide them with essential digital skills for a brighter future.
Quizzes Created: 3 | Total Attempts: 1,771
| Attempts: 428 | Questions: 18
Please wait...
Question 1 / 18
0 %
0/100
Score 0/100
1. 1.   _________ is an address for a resource on the World Wide Web 

Explanation

A URL, also known as a Universal/Uniform Resource Locator, is an address that is used to locate and access a resource on the World Wide Web. It specifies the protocol to be used, such as HTTP or HTTPS, followed by the domain name or IP address of the server hosting the resource, and optionally the path to the specific resource. This allows users to easily navigate and access websites and web pages by simply entering the URL into a web browser.

Submit
Please wait...
About This Quiz
Module 7 Assessment Test - Quiz

Module 7 Assessment test evaluates knowledge on web security, including setting browser home pages, understanding digital certificates, encryption, hyperlinks, viruses, and URLs. It enhances cybersecurity skills relevant for... see moresafe internet usage. see less

2. Which one of the following is an example of an online (virtual) community?

Explanation

A chat room is an example of an online (virtual) community because it is a platform where individuals can connect and interact with each other through real-time messaging. It allows people with similar interests or goals to come together, share information, engage in discussions, and build relationships. Chat rooms often have specific topics or themes, creating a sense of community and fostering a sense of belonging among its members.

Submit
3. How do you change your Web browser's home page?

Explanation

To change your Web browser's home page, you can use menu options to set the current page as the home page. This means accessing the browser's settings or preferences menu and finding the option that allows you to designate the current page as the one that should load whenever you open the browser. By selecting this option, you can easily change your browser's home page to the page you are currently on.

Submit
4.  Which one of the following is a scheme where criminals send unsolicited e-mails or pop-up messages to get personal and financial information from unsuspecting victims?

Explanation

Phishing is a scheme where criminals send unsolicited e-mails or pop-up messages to deceive and trick unsuspecting victims into revealing their personal and financial information. This information is then used for fraudulent purposes, such as identity theft or financial scams.

Submit
5.  Which one of the following actions could lead to a computer being infected with a virus?

Explanation

Opening an executable file that is attached to an email message could lead to a computer being infected with a virus. Executable files have the ability to run code on a computer, and if the file is infected with a virus, it can execute malicious code that can harm the computer and infect it with the virus. Therefore, opening such a file can potentially infect the computer.

Submit
6. 1.   A _____________ is a connection between a part of a Web page and a different  part of the same Web page or another Web Page.  The connection is activated by  a mouse click.  Which one of the following completes the sentence?

Explanation

A hyperlink is a connection between a part of a Web page and a different part of the same Web page or another Web Page. The connection is activated by a mouse click.

Submit
7. Which one of the following is the best method to ensure access to an network  is secure?

Explanation

The best method to ensure access to a network is secure is by requiring a user name and password. This is because using a combination of both user name and password adds an extra layer of security to the network. It ensures that only authorized individuals with the correct credentials can access the network, reducing the risk of unauthorized access and potential security breaches.

Submit
8. 1.   Which one of the following is the process of encoding data to prevent unauthorised access, especially during transmission? 

Explanation

Encryption is the process of encoding data to prevent unauthorized access, especially during transmission. It involves converting plain text into cipher text using an encryption algorithm and a key. This ensures that even if the data is intercepted, it cannot be read or understood without the correct decryption key. Encryption is commonly used to secure sensitive information such as passwords, credit card numbers, and personal data when transmitting over networks or storing in databases. It helps protect the confidentiality and integrity of data, ensuring that only authorized individuals can access and understand it.

Submit
9. Which of the following activities could be subject to fraud when purchasing goods over the internet?

Explanation

Entering your credit card details on an electronic form could be subject to fraud when purchasing goods over the internet. This is because cybercriminals can intercept the information during transmission or gain unauthorized access to the website's database where the information is stored. They can then use the credit card details for fraudulent activities such as making unauthorized purchases or identity theft. It is important to ensure that the website is secure and trustworthy before entering sensitive information like credit card details.

Submit
10. 1.   Malicious programs which attach themselves or inserts inside legitimate files are called 

Explanation

Malicious programs that attach themselves or insert inside legitimate files are known as viruses. Viruses are designed to replicate and spread, often causing damage to computer systems and files. They can be transmitted through various means such as email attachments, infected websites, or shared files. Once a virus infects a system, it can perform harmful actions such as deleting or corrupting files, stealing personal information, or slowing down the computer's performance. Therefore, viruses pose a significant threat to the security and functionality of computer systems.

Submit
11. What is a protected Web site?

Explanation

A protected website refers to a web page that requires a user to enter a username and password in order to gain access. This additional layer of security ensures that only authorized individuals can view the content or perform certain actions on the website.

Submit
12. Which one of the following gives you the ability to know if a desired contact  is online? 

Explanation

Instant messaging (IM) is the correct answer because it allows users to see if a desired contact is online. IM platforms typically display the online status of users, indicating whether they are currently active and available for communication. This feature enables users to know if their desired contact is available for a conversation in real-time. RSS, SMS, and URL do not provide this specific ability to determine the online status of a contact.

Submit
13.  Which one of the following best describes the difference between the Cc and Bcc fields? 

Explanation

The Bcc field allows the sender to add recipients to the email without their names being visible to other recipients. This means that when the email is sent, the Bcc recipients will receive the email, but their names will not be visible to anyone else who receives the email. This is different from the Cc field, where the names of the recipients are visible to everyone who receives the email.

Submit
14. Which one of the following actions would help to prevent children from accessing harmful content on the internet? 

Explanation

Supervising computer usage sessions would help prevent children from accessing harmful content on the internet because it allows parents or guardians to monitor and control what websites and online activities the children are engaging in. This way, they can ensure that the children are not exposed to inappropriate or harmful content.

Submit
15. 1.   What is a digital certificate?

Explanation

A digital certificate is a verification that authenticates a web site. It is a cryptographic credential that is issued by a trusted third party, known as a Certificate Authority (CA). The certificate contains information about the identity of the website owner, such as their domain name and public key. It is used to establish a secure connection between the user's browser and the website, ensuring that the website is legitimate and that any data exchanged between the user and the website is encrypted and secure.

Submit
16. In a web address identified by geographical area how many letters would a country code contain?

Explanation

A country code in a web address identified by geographical area typically contains two letters. Country codes are used to represent specific countries or territories in web addresses, such as .us for the United States or .uk for the United Kingdom.

Submit
17. 1.   Which three-letter suffix in an email address identifies an organization as non-commercial? 

Explanation

The three-letter suffix "edu" in an email address identifies an organization as non-commercial. This suffix is commonly used by educational institutions such as universities and colleges.

Submit
18.  Which one of the following statements about world wide web is true?

Explanation

The correct answer is "The world wide web includes the use of hypertext to connect related web documents." This statement is true because the world wide web, also known as the web, is a system of interconnected documents and resources that are accessed through the internet. Hypertext is the technology that allows users to navigate between these documents by clicking on links. Therefore, the web uses hypertext to connect related web documents and provide a seamless browsing experience.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 23, 2013
    Quiz Created by
    Michelle Xuereb
Cancel
  • All
    All (18)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
1.   _________ is an address for a resource on the World...
Which one of the following is an example of an online (virtual)...
How do you change your Web browser's home page?
 Which one of the following is a scheme where criminals send...
 Which one of the following actions could lead to a computer...
1.   A _____________ is a connection between a part of a Web...
Which one of the following is the best method to ensure access to an...
1.   Which one of the following is the process of encoding...
Which of the following activities could be subject to fraud when...
1.   Malicious programs which attach themselves or inserts...
What is a protected Web site?
Which one of the following gives you the ability to know if a desired...
 Which one of the following best describes the difference between...
Which one of the following actions would help to prevent children from...
1.   What is a digital certificate?
In a web address identified by geographical area how many letters...
1.   Which three-letter suffix in an email address...
 Which one of the following statements about world wide web is...
Alert!

Advertisement