1.
Who would you contact to provide an Internet connection?
Correct Answer
C. Internet Service Provider
Explanation
An Internet Service Provider (ISP) is the correct contact to provide an Internet connection. ISPs are companies that provide individuals and organizations with access to the Internet. They offer various types of Internet connections, such as broadband, DSL, or fiber optic. ISPs typically offer a range of plans and packages to suit different needs and budgets. By contacting an ISP, you can sign up for their services and get connected to the Internet.
2.
What physical link is required to send data across the Internet?
Correct Answer
A. Telephone Line
Explanation
A telephone line is required to send data across the Internet. This is because telephone lines are commonly used to establish a connection between a user's device and their Internet Service Provider (ISP), which then allows data to be transmitted over the Internet. Telephone lines provide the necessary physical connection for data to be sent and received, making them an essential component for accessing the Internet.
3.
Which of the following allows playback of audio from the Internet?
Correct Answer
C. Speakers
Explanation
Speakers allow playback of audio from the internet. Speakers are output devices that convert electrical signals into sound waves, allowing us to hear audio. When audio is streamed or downloaded from the internet, it is sent to the speakers to produce sound. Modem is responsible for connecting to the internet, browser is used to access websites and browse the internet, and microphone is an input device used to record audio, but none of these directly enable playback of audio from the internet.
4.
In order to print a web Page from the Internet which button/icon would you select?
Correct Answer
C. Print
Explanation
To print a web page from the internet, you would select the "Print" button/icon. This option allows you to send the content of the web page to a printer connected to your device, enabling you to have a physical copy of the page. The "Preview" option typically allows you to see how the page will look when printed, while "Save as" allows you to save the web page as a file on your device. "The Internet Button" is not a valid option for printing a web page.
5.
When you visit a web page where is the URL of the page stored?
Correct Answer
D. History
Explanation
The URL of a web page is stored in the browser's history. The history feature keeps track of the websites that the user has visited, allowing them to easily access and revisit previously viewed pages. This enables users to quickly find and navigate back to a specific web page without having to remember or search for the URL again.
6.
What is an email address book used for?
Correct Answer
A. Details of contacts regularly emailed
Explanation
An email address book is used to store and organize the details of contacts that are frequently emailed. It allows users to easily access and manage their contacts' email addresses, names, and other relevant information. This helps in saving time and effort by providing a quick way to select recipients when composing emails.
7.
Searching the Internet on a given topic requires you to use which of the following?
Correct Answer
C. Search Engine
Explanation
When searching the Internet on a given topic, you need to use a search engine. A search engine is a software program that allows users to search for information on the World Wide Web by entering keywords or phrases. It then retrieves a list of relevant websites, documents, or other resources that match the search criteria. Examples of popular search engines include Google, Bing, and Yahoo.
8.
All web page addresses are commonly known as a?
Correct Answer
B. URL
Explanation
Web page addresses are commonly known as URLs, which stands for Uniform Resource Locators. URLs are used to locate and access specific web pages on the internet. They consist of a protocol (such as HTTP or HTTPS), followed by the domain name or IP address of the website, and optionally a path to a specific page or resource on that website. Therefore, the correct answer is URL.
9.
What is a computer virus?
Correct Answer
C. A program created to cause harm to another computer.
Explanation
A computer virus is a program created with malicious intent to cause harm to another computer. It is designed to infect and replicate itself within a computer system, often causing damage to files, stealing sensitive information, or disrupting the normal functioning of the computer. Computer viruses can be spread through various means such as email attachments, infected websites, or file sharing networks. Once a computer is infected, the virus can spread to other computers and networks, causing widespread damage and compromising security.
10.
A type of malicious software, which is designed to collect user
details, spread through the internet is called:
Correct Answer
A. Spyware
Explanation
Spyware is a type of malicious software that is specifically designed to collect user details and spread through the internet. Unlike other options like Ad Aware, Worm, and Trojan, which may have different functions, spyware specifically focuses on gathering personal information without the user's knowledge or consent. It can track browsing habits, steal login credentials, and monitor online activities, posing a significant threat to privacy and security.
11.
To filter out junk email which of the following would you need to install?
Correct Answer
D. Anti-spam software
Explanation
To filter out junk email, you would need to install anti-spam software. This software is specifically designed to identify and block unsolicited and unwanted emails, preventing them from reaching your inbox. Anti-spam software uses various techniques such as content filtering, blacklisting, whitelisting, and analyzing email headers to determine whether an email is spam or not. By installing anti-spam software, you can effectively reduce the amount of junk email you receive and improve the overall security and efficiency of your email system.
12.
A disadvantage of text messaging is that a limited number of characters can be sent in one message.
Correct Answer
A. True
Explanation
Text messaging has a disadvantage of limited characters in one message. This means that users have to condense their messages and may not be able to fully express themselves. They may have to send multiple messages to convey their complete thoughts, which can be time-consuming and inconvenient. Additionally, the limited character count can lead to misunderstandings or miscommunication if important information is omitted due to space constraints.
13.
What are online forms used for?
Correct Answer
C. Entering personal data on a web page
Explanation
Online forms are used for entering personal data on a web page. These forms allow individuals to input and submit their personal information, such as name, address, contact details, and other relevant data, directly on a website. This information can be used for various purposes, such as signing up for a service, making a purchase, filling out a survey, or applying for a job. By providing this explanation, it is clear that online forms are specifically designed for entering personal data on a web page.
14.
A virus can infect your computer by:
Correct Answer
C. Opening a file attachment sent with an e-mail
Explanation
Opening a file attachment sent with an email can infect your computer with a virus. This is because file attachments can contain malicious code or executable files that, when opened, can install the virus onto your computer. It is important to be cautious when opening file attachments, especially from unknown or suspicious sources, and to have antivirus software installed to detect and prevent any potential infections.
15.
The Computer Misuse Act is designed to:
Correct Answer
C. Make planting viruses and hacking illegal
Explanation
The Computer Misuse Act is designed to make planting viruses and hacking illegal. This legislation aims to protect computer systems and data by criminalizing unauthorized access, modification, and interference with computer systems. It specifically targets activities such as hacking, spreading malware, and planting viruses, which can cause significant harm to individuals, organizations, and society as a whole. By making these actions illegal, the act aims to deter and punish those who engage in cybercrimes, ensuring the security and integrity of computer systems and data.