Unit 3 Test On Internet Basics

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Selena Skipper
Selena Skipper, Business teacher
Selena, a dedicated Business Teacher with 26 years of experience, currently imparts knowledge at the Cullman Area Technology Academy. Her passion lies in guiding students to discover their career paths and achieve valuable certifications.
Quizzes Created: 12 | Total Attempts: 70,074
| Attempts: 3,897 | Questions: 30
Please wait...
Question 1 / 29
0 %
0/100
Score 0/100
1. Computer worms typically travel through computer network systems.

Explanation

Computer worms are a type of malware that are designed to spread through computer networks. Unlike viruses, which require a host file to attach themselves to, worms are self-contained programs that can replicate and spread independently. They exploit vulnerabilities in network protocols and security systems to move from one computer to another, often causing widespread damage and disruption. Therefore, it is true that computer worms typically travel through computer network systems.

Submit
Please wait...
About This Quiz
Unit 3 Test On Internet Basics - Quiz

Test on Internet Basics that include understanding networks, viruses, worms, URL's, evaluating websites and MLA formatting.

2. Computer networks allow two-way transmission, which means information can flow back and forth.

Explanation

Computer networks allow for two-way transmission, meaning that information can be sent and received between connected devices. This allows for efficient communication and sharing of data between multiple devices on the network. With two-way transmission, users can both send and receive information, enabling interactive and collaborative processes.

Submit
3. It is important to check the date the webpage was last updated because information can quickly become obsolete.

Explanation

Checking the date the webpage was last updated is important because information on the internet can become outdated quickly. Websites may contain information that is no longer accurate or relevant, especially in rapidly changing fields such as technology, news, or scientific research. By checking the date of the last update, users can ensure that they are accessing the most current and reliable information available.

Submit
4. Anyone can put up a website on the Internet, so check your source of information.

Explanation

This statement is true because anyone can indeed put up a website on the Internet. The Internet provides a platform for individuals and organizations to create and publish websites, allowing them to share information and content with a global audience. However, it is important to check the source of information found on websites, as not all sources may be reliable or accurate.

Submit
5. Computer malicious code, or malware, includes but is not limited to the following:  adware, computer viruses, spyware, Trojan horses, and worms.

Explanation

The statement is true because computer malicious code, also known as malware, encompasses various types of harmful software such as adware, computer viruses, spyware, Trojan horses, and worms. These malicious programs are designed to disrupt computer systems, steal sensitive information, or gain unauthorized access to networks. Therefore, the given answer is correct.

Submit
6. A computer server's domain name is a name that represent's its IP number.

Explanation

A computer server's domain name is a unique name that is used to represent its IP number. The domain name system (DNS) translates domain names into IP addresses, allowing users to access websites and services using memorable names instead of numeric IP addresses. This system helps to simplify the process of connecting to servers on the internet. Therefore, the statement "A computer server's domain name is a name that represents its IP number" is true.

Submit
7. Electronic destruction of information and property is often more expensive than physical destruction of information and property.

Explanation

Electronic destruction of information and property is often more expensive than physical destruction due to various factors. Firstly, electronic devices and systems are generally more complex and require specialized expertise to properly destroy and dispose of. This can involve hiring professionals or purchasing specialized equipment, which adds to the cost. Additionally, electronic destruction often requires additional measures to ensure data security, such as data wiping or encryption, which can further increase the expenses. On the other hand, physical destruction methods like shredding or incineration may be relatively simpler and more cost-effective.

Submit
8. When using MLA formatting, if you use an online source, then you should always include the date tat you accessed the website.

Explanation

In MLA formatting, it is important to include the date that you accessed an online source because online content can change or be updated over time. Including the date allows readers to understand the context in which you accessed the information and ensures that they can locate the same version of the source if needed. This helps to maintain the accuracy and credibility of your research. Therefore, the statement "When using MLA formatting, if you use an online source, then you should always include the date that you accessed the website" is true.

Submit
9. A firewall could be considered a form of censorhip.

Explanation

A firewall can be considered a form of censorship because it acts as a barrier between a private network and the internet, controlling the flow of information. It can block certain websites or restrict access to specific content, effectively limiting what users can see or do online. This control over information can be seen as a form of censorship, as it restricts the free flow of information and limits users' access to certain resources.

Submit
10. One of the advantages of networking a computer lab or a workplace environment is that it reduces the amount of software that is installed.

Explanation

Networking a computer lab or workplace environment allows for centralized management and control of software installations. Instead of installing software on each individual computer, it can be installed on a central server and accessed by all connected computers. This reduces the time and effort required for software installation and updates, as well as ensuring consistency across all devices. Additionally, it allows for easier license management and reduces the risk of unauthorized software installations. Therefore, the statement is true.

Submit
11. How can you determine if a web page is outdated?

Explanation

To determine if a web page is outdated, one can check the date posted and/or last updated. This information provides a clear indication of when the content was last modified, allowing users to assess the relevance and accuracy of the information provided. By checking the date, users can make informed decisions about whether to trust the content or seek more up-to-date sources.

Submit
12. Who invented hyperlinking, HTML code and came up with the WWW?

Explanation

Tim Berners-Lee is the correct answer. He is credited with inventing hyperlinking, HTML code, and coming up with the World Wide Web (WWW). His contributions revolutionized the way information is shared and accessed on the internet.

Submit
13. The URL is a

Explanation

A web address, also known as a URL (Uniform Resource Locator), is a unique identifier that specifies the location of a resource on the internet. It is used by web browsers to locate and access websites or specific web pages. A web address consists of various components, including the protocol (such as HTTP or HTTPS), the domain name, and the path to the specific resource. It is different from a web browser, which is a software application used to access and view websites, or a web engine, which is the core software component that processes and displays web content.

Submit
14. To block communication to and from sources you do not permit, you could use:

Explanation

A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between trusted internal networks and untrusted external networks, allowing only authorized communication and blocking any unauthorized access or malicious activities. By configuring the firewall rules, you can restrict communication to and from specific sources that you do not permit, enhancing the overall network security. Therefore, a firewall is the most suitable option among the given choices to block communication with unauthorized sources.

Submit
15. Computer worms can:

Explanation

Computer worms are a type of malicious software that can spread across computer networks, infecting multiple systems. They have the ability to replicate themselves and spread to other computers without any user intervention. Additionally, worms are designed to search for uninfected workstations to occupy, further propagating their presence. Therefore, the correct answer is "all of the above" as computer worms can travel over networks, reproduce, and search for uninfected workstations.

Submit
16. Which of the following definitions best describes an IP address?

Explanation

An IP address is a 32-bit numerical label assigned to devices connected to a computer network. It serves as an identifier for the host or server within the network, allowing for communication and data transfer between devices. The IP address is essential for routing data packets across the internet and ensures that they reach the correct destination.

Submit
17. Three different network topologies.

Explanation

The given answer lists four different network topologies: Star, Bus, Ring, and Circle. These are all valid examples of network topologies. A star topology consists of a central node connected to multiple peripheral nodes, resembling a star shape. A bus topology uses a single cable to connect all devices in a linear manner. A ring topology connects devices in a circular loop, where each device is connected to two neighboring devices. A circle topology is similar to a ring topology but allows for bidirectional communication between devices.

Submit
18. Software viruses can invade your computer but cannot spread to other programs or disks.

Explanation

Software viruses have the ability to invade a computer and spread to other programs or disks, making copies of themselves and infecting other files or systems. This is one of the main characteristics of a virus, as it aims to replicate and spread its malicious code. Therefore, the statement that software viruses cannot spread to other programs or disks is false.

Submit
19. Web pages are created by authors using a language called:

Explanation

Web pages are created by authors using a language called HTML. HTML stands for HyperText Markup Language and is the standard markup language for creating web pages. It is used to structure the content of a web page by using tags to define elements such as headings, paragraphs, images, links, and more. HTML is the foundation of the World Wide Web and is essential for creating and displaying web pages in browsers.

Submit
20. The internet and the WWW are one and the same.

Explanation

The internet and the World Wide Web (WWW) are not the same thing. The internet is a global network of interconnected computers that allows communication and data transfer between them. On the other hand, the WWW is a system of interconnected documents and other resources, linked by hyperlinks and URLs, that can be accessed via the internet. While the internet is the infrastructure that enables the WWW to exist, they are distinct entities with different purposes and functionalities.

Submit
21. When gathering research resources on the Internet, the domain name suffix .edu would be less reliable than the domain name suffix .com

Explanation

The explanation for the given correct answer is that the domain name suffix .edu is actually more reliable than the domain name suffix .com when gathering research resources on the Internet. The .edu domain is reserved for educational institutions, such as universities and colleges, which often provide more credible and reliable information compared to commercial websites with the .com domain. Therefore, the statement that .edu would be less reliable is incorrect.

Submit
22. Information on the internet is frequently monitored by the Internet police.

Explanation

The statement "Information on the internet is frequently monitored by the Internet police" is not true. While there may be some instances of monitoring by law enforcement agencies, it is not accurate to say that internet information is frequently monitored by the "Internet police" as a general rule. Monitoring internet activity on a large scale would be a massive undertaking and not practical for most law enforcement agencies. Additionally, there are privacy laws and protections in place that limit the extent to which internet information can be monitored without proper legal justification.

Submit
23. To set or create double spacing, you would:

Explanation

To set or create double spacing, you can either depress the Ctrl and 2 key simultaneously or go to Format Paragraph. Both options are correct and will achieve the desired result of double spacing.

Submit
24. When searching the WWW, using the  and boolean operator instead of the or will give you more results.

Explanation

Using the "and" boolean operator when searching the WWW will actually give you fewer results, not more. The "and" operator narrows down the search by requiring all the search terms to be present in the results. On the other hand, using the "or" operator broadens the search by allowing any of the search terms to be present in the results. Therefore, the correct answer is false.

Submit
25. In MLA formatting, parenthetical references should appear as:

Explanation

The correct answer is "(Skipper 17)". In MLA formatting, parenthetical references should include the author's last name and the page number of the source being cited. In this case, the author's last name is "Skipper" and the page number is "17".

Submit
26. When using MLA format, the pages that include all of the references that you used in your paper is called the Bibliography.

Explanation

In MLA format, the pages that include all of the references used in a paper are called the Works Cited page, not the Bibliography. The Works Cited page is a list of all the sources cited in the paper, while the Bibliography includes all the sources consulted, whether or not they were directly cited. Therefore, the correct answer is False.

Submit
27. Approximately when did the military come up with the idea of "The Internet"?

Explanation

In the late 1950s, the military came up with the idea of "The Internet". During this time, the Advanced Research Projects Agency (ARPA) in the United States initiated research on creating a network of computers that could communicate with each other. This eventually led to the development of ARPANET, the precursor to the modern internet.

Submit
28. The malicious activity that a computer virus or worm causes is called:

Explanation

The correct answer is "Payload". In the context of computer viruses or worms, the term "payload" refers to the malicious activity or code that is designed to cause harm to a system or network. It can include actions such as deleting files, stealing data, or spreading the virus to other computers. The payload is the primary objective of the virus or worm and is what distinguishes it from other types of malware.

Submit
29. The https://www part of a web address is known as the

Explanation

The http://www part of a web address is known as the protocol. The protocol is the set of rules that determines how data is transmitted over the internet. In this case, "http" stands for Hypertext Transfer Protocol, which is the protocol used for transmitting web pages and other resources on the World Wide Web. The "www" is a subdomain that is commonly used to indicate that the website is part of the World Wide Web. Therefore, the correct answer is protocol.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 15, 2010
    Quiz Created by
    Selena Skipper
Cancel
  • All
    All (29)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Computer worms typically travel through computer network systems.
Computer networks allow two-way transmission, which means information...
It is important to check the date the webpage was last updated because...
Anyone can put up a website on the Internet, so check your source of...
Computer malicious code, or malware, includes but is not limited to...
A computer server's domain name is a name that represent's its IP...
Electronic destruction of information and property is often more...
When using MLA formatting, if you use an online source, then you...
A firewall could be considered a form of censorhip.
One of the advantages of networking a computer lab or a workplace...
How can you determine if a web page is outdated?
Who invented hyperlinking, HTML code and came up with the WWW?
The URL is a
To block communication to and from sources you do not permit, you...
Computer worms can:
Which of the following definitions best describes an IP address?
Three different network topologies.
Software viruses can invade your computer but cannot spread to other...
Web pages are created by authors using a language called:
The internet and the WWW are one and the same.
When gathering research resources on the Internet, the domain name...
Information on the internet is frequently monitored by the Internet...
To set or create double spacing, you would:
When searching the WWW, using the  and boolean operator instead...
In MLA formatting, parenthetical references should appear as:
When using MLA format, the pages that include all of the references...
Approximately when did the military come up with the idea of "The...
The malicious activity that a computer virus or worm causes is called:
The https://www part of a web address is known as the
Alert!

Advertisement