Telecommunications Open Note Test

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By V_burford
V
V_burford
Community Contributor
Quizzes Created: 2 | Total Attempts: 1,026
Questions: 17 | Attempts: 103

SettingsSettingsSettings
Telecommunications Open Note Test - Quiz


You may use your Telecommunications Notes 1 and Telecommunications Notes 2 to answer the questions on this test.


Questions and Answers
  • 1. 

    What is a procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.

    • A.

      Firewalling

    • B.

      Hacking

    • C.

      Encryption

    • D.

      Spamming

    Correct Answer
    C. Encryption
    Explanation
    Encryption is the process of converting information or data into a code or cipher, making it unreadable to unauthorized individuals. It ensures that only authorized parties can access and understand the contents of a message or file, protecting it from being intercepted or understood by hackers or unauthorized users. Encryption is commonly used in various communication channels, such as email, messaging apps, and online transactions, to provide secure and private communication.

    Rate this question:

  • 2. 

    How many times do you have to click on a hyperlink to go to another page/place?

    • A.

      One

    • B.

      Two

    • C.

      Three

    • D.

      Four

    Correct Answer
    A. One
    Explanation
    You only have to click on a hyperlink once to go to another page/place. A hyperlink is designed to redirect you to a different location with just one click.

    Rate this question:

  • 3. 

    If you wanted to keep an online journal about a specific topic and you wanted a lot of people to see it at one time, you would make 

    • A.

      An e-mail message

    • B.

      A blog

    • C.

      A flame

    • D.

      A.pdf document

    Correct Answer
    B. A blog
    Explanation
    A blog would be the most suitable option for keeping an online journal about a specific topic and reaching a large audience. Unlike an email message, which is limited to the recipients you choose, a blog allows anyone with internet access to view and engage with your content. A flame refers to an aggressive and insulting online message, which is not relevant to the question. A.pdf document is a file format that is not specifically designed for sharing and interacting with a large number of people simultaneously.

    Rate this question:

  • 4. 

    Which of the following is a WAN?

    • A.

      A network inside a school building

    • B.

      A network used to link two computers in the same room so that they can share a printer

    • C.

      A LAN

    • D.

      The Internet

    Correct Answer
    D. The Internet
    Explanation
    The Internet is a WAN (Wide Area Network) because it connects computers and networks across vast geographical distances, often spanning countries or even continents. It is a global network that allows for communication and data transfer between devices worldwide. Unlike a LAN (Local Area Network) which is limited to a specific area like a school building or a room, the Internet is accessible to users everywhere and enables connectivity on a much larger scale.

    Rate this question:

  • 5. 

    If a school has 100 computers that are all networked, what is the smallest number of printers that the school needs?

    • A.

      1

    • B.

      10

    • C.

      25

    • D.

      50

    Correct Answer
    A. 1
    Explanation
    In order for all the computers in the school to be able to print, there needs to be at least one printer. Even though there are 100 computers, it is still possible for all of them to use just one printer. Therefore, the smallest number of printers that the school needs is 1.

    Rate this question:

  • 6. 

    What is the computer software that keeps people from being able to access private information on your computer?

    • A.

      A Browser

    • B.

      Filtering Software

    • C.

      Firewall Software

    • D.

      A Search engine

    Correct Answer
    C. Firewall Software
    Explanation
    Firewall software is designed to protect a computer or network from unauthorized access and threats from the internet. It acts as a barrier between the computer and the outside world, monitoring incoming and outgoing network traffic. It can block unauthorized access attempts and prevent hackers from accessing private information on the computer. Unlike a browser, which is a software application used to access and view websites, firewall software specifically focuses on security and preventing unauthorized access to private information. Filtering software is typically used to restrict or control access to certain websites or content, while a search engine is a tool used to search for information on the internet.

    Rate this question:

  • 7. 

    AUP stands for

    • A.

      Acceptable Use Protocols

    • B.

      Actual Use Policies

    • C.

      Nothing

    • D.

      Acceptable Use Policies

    Correct Answer
    D. Acceptable Use Policies
    Explanation
    The correct answer is "Acceptable Use Policies". AUP stands for Acceptable Use Policies, which are a set of rules and guidelines that define the acceptable and appropriate use of a system, network, or service. These policies are put in place to ensure that users understand their responsibilities and obligations when using a particular resource. AUPs typically outline what actions are considered acceptable and unacceptable, as well as the consequences for violating these policies.

    Rate this question:

  • 8. 

    What is the piece of HARDWARE that allows computers to connect to the Internet by using things like telephone lines?

    • A.

      A browser

    • B.

      A modem

    • C.

      A search engine

    • D.

      A printer

    Correct Answer
    B. A modem
    Explanation
    A modem is the correct answer because it is a piece of hardware that allows computers to connect to the internet using telephone lines. It converts digital signals from the computer into analog signals that can be transmitted over telephone lines, and vice versa, allowing for internet connectivity. A browser is a software application used to access and view websites, not a hardware component. A search engine is a website or software used to search for information on the internet. A printer is a device used to produce hard copies of digital documents and is not directly involved in connecting to the internet.

    Rate this question:

  • 9. 

    Mr. Castle decides who can access what software in WHMS's network because he is 

    • A.

      The network administrator

    • B.

      A spammer

    • C.

      A hacker

    • D.

      An e-mailer

    Correct Answer
    A. The network administrator
    Explanation
    Mr. Castle decides who can access what software in WHMS's network because he is the network administrator. As the network administrator, Mr. Castle is responsible for managing and maintaining the network infrastructure, including user access and permissions. He has the authority to determine which users have access to specific software and can control and monitor their activities within the network. This role requires technical expertise and knowledge of the network's security protocols, making Mr. Castle the appropriate person to make such decisions.

    Rate this question:

  • 10. 

    Ms. Burford is sending you a secret message. She is going to mix up the letters in the message and only you will have a "key" that unscrambles the words. This is an example of

    • A.

      Hacking

    • B.

      Encryption

    • C.

      Spamming

    • D.

      Locking

    Correct Answer
    B. Encryption
    Explanation
    This scenario describes the process of encryption, where Ms. Burford is scrambling the letters in the message to make it unreadable without a specific key to unscramble it. Encryption is a common technique used to protect sensitive information and ensure that only authorized individuals can access it.

    Rate this question:

  • 11. 

    Why are some words on the Internet blue and underlined?

    • A.

      These words are the most important words.

    • B.

      It makes the web pages more interesting to read.

    • C.

      The words cannot be copied.

    • D.

      The words represent hyperlinks.

    Correct Answer
    D. The words represent hyperlinks.
    Explanation
    The words on the Internet are blue and underlined because they represent hyperlinks. Hyperlinks are clickable elements that allow users to navigate to different web pages or resources. By making these words stand out with a different color and underlining them, it helps users identify which parts of the text are clickable and can take them to another page or website. This enhances the user experience and makes it easier for users to navigate and access relevant information.

    Rate this question:

  • 12. 

    A _________ is a software program used for viewing the Internet and/or the World Wide Web.

    • A.

      Bookmark

    • B.

      Intranet

    • C.

      Browser

    • D.

      Domain

    Correct Answer
    C. Browser
    Explanation
    A browser is a software program used for viewing the Internet and/or the World Wide Web. It allows users to access websites, search for information, and interact with web pages. Browsers interpret and display HTML files, allowing users to navigate through websites by clicking on links and buttons. They also support features like bookmarks, history, and extensions, enhancing the browsing experience. Overall, a browser is an essential tool for accessing and exploring the vast amount of information available on the internet.

    Rate this question:

  • 13. 

    A ________________ is a software program used by a search site to find web pages that match certain criteria.  

    • A.

      Search engine

    • B.

      Multimedia

    • C.

      Diesel engine

    • D.

      Virtual

    Correct Answer
    A. Search engine
    Explanation
    A search engine is a software program used by a search site to find web pages that match certain criteria. It scans the internet and indexes web pages based on keywords and other factors, allowing users to search for specific information. Search engines like Google, Bing, and Yahoo use complex algorithms to provide relevant search results to users based on their queries.

    Rate this question:

  • 14. 

    According to the state of North Carolina, what is most efficient way to send documents?

    • A.

      Fax the documents

    • B.

      E-mail the documents

    • C.

      Send the documents using the US Postal Service

    • D.

      Telephone the recipient, read the document to them and have them copy each word down.

    Correct Answer
    B. E-mail the documents
    Explanation
    E-mailing the documents is the most efficient way to send them according to the state of North Carolina. This method allows for quick and easy transmission of the documents, eliminating the need for physical delivery or manual transcription. It also ensures that the documents can be easily stored, accessed, and shared electronically, saving time and resources.

    Rate this question:

  • 15. 

    If you "flame" someone

    • A.

      You set up a firewall without their knowledge

    • B.

      You try to destroy something that they posted on the Internet

    • C.

      You send them an angry e-mail

    • D.

      You set fire to their CDs

    Correct Answer
    C. You send them an angry e-mail
    Explanation
    "Flaming" refers to the act of sending someone an angry or hostile email, typically in an online discussion or forum. This term originated from the idea of someone becoming so angry that their words could be seen as "flames" or insults. It does not involve setting up a firewall, destroying something posted online, or setting fire to CDs.

    Rate this question:

  • 16. 

    If you download something

    • A.

      You are receiving something from the Internet

    • B.

      You are sending something to the Internet

    • C.

      The computer cannot do anything else during the download

    • D.

      You are doing something illegal

    Correct Answer
    A. You are receiving something from the Internet
    Explanation
    The correct answer is "you are receiving something from the Internet." When you download something, it means that you are retrieving data or files from the Internet onto your computer or device. This could include downloading documents, music, videos, or software. It is a common and legal activity that allows users to access and save content from the Internet for personal use.

    Rate this question:

  • 17. 

    A website that wanted to sell you something would have _______________ in it's address

    • A.

      .org

    • B.

      .mil

    • C.

      .money

    • D.

      .com

    Correct Answer
    D. .com
    Explanation
    A website that wanted to sell you something would have ".com" in its address because ".com" is the most commonly used top-level domain (TLD) for commercial websites. It stands for "commercial" and is widely recognized as indicating a website that is primarily focused on selling products or services. Other TLDs such as ".org" (for non-profit organizations), ".mil" (for military), and ".money" (for financial services) are less likely to be used by websites that are specifically designed for selling purposes.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Dec 05, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 31, 2009
    Quiz Created by
    V_burford
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.