Vous êtes sur la page 1sur 17

IC3 - Module 3 Questions

Multiple Choice
Identify the choice that best completes the statement or answers the question.
You will need your answers on Wednesday!!!!!!!!!!!
____

____

____

____

____

____

____

____

____

1. Which of the following is true about e-mail?


a. The cost depends on the size of the
c. It is private
message
b. Delivery is almost instantaneous
d. It cannot be sabotaged
2. In a client/server network, which of the following would be considered the client?
a. Microsoft Windows
c. Printer
b. Internet Explorer
d. Desktop computer
3. Handbooks, employee manuals, and employment forms would most likely be found on ____.
a. an intranet
c. the Internet
b. an extranet
d. a hub
4. Which of the following uses coaxial cable to send and receive data?
a. Modem
c. Digital subscriber line (DSL)
b. Cable modem
d. T-1 line
5. Sniffer software is used to ____.
a. prevent hackers from accessing your computer
b. locate wireless hot spots
c. transmit voice data over telephone lines
d. set up and manage a peer-to-peer network
6. Antivirus software should ____.
a. be run when you suspect a problem
c. be run monthly
b. be run weekly
d. always be running
7. A cache is a(n) ____.
a. place to store something temporarily
c. external wireless adapter
b. special type of password
d. dedicated connection to the Internet
8. Companies handling sensitive information should back up data regularly and store it ____.
a. on the same computer
c. on CDs
b. on the network server
d. off site
9. Biometric security measures examine any of the following, except ____.
a. fingerprints
c. voice pattern
b. blood type
d. retina of the eye
FIGURE 24-2

____ 10. Figure 24-2 above shows a computer with a ____ attached.
a. dial-up modem
c. hub
b. wireless router
d. T-1 line
Case 24-1
Javier has decided to upgrade his communication hardware and get a faster Internet connection. After
considering all the options, he has decided to use a wireless Internet service provider.
____ 11. To connect his laptop wirelessly to the Internet, Javier will need a(n) ____.
a. hub
c. T-1 line
b. router
d. adapter
Case 24-2
Bryah owns a small business and travels frequently. She is concerned about the security of the data on her
laptop, which includes valuable information and trade secrets.
____ 12. When Bryah creates a password to restrict access to her computer, she should ____.
a. change it frequently
c. write it down
b. use all lowercase letters
d. use the same one as her Internet account
____ 13. Which service uses a cell phone or other mobile device to send and receive written messages?
a. E-mail
c. VoIP
b. Instant messaging
d. Text messaging
____ 14. ARPANET was established ____.
a. to provide rules governing the transfer of data
b. to regulate the use of domain names
c. as a testing ground for new networking technologies
d. as a way to build online communities of people who share common interests
____ 15. Which of the following is not part of an e-mail address?
a. User name
c. @ symbol
b. # symbol
d. Domain name
____ 16. Which part of an e-mail message should fully but briefly describe the purpose of the message?
a. Address
c. Body
b. Subject line
d. Attachment
____ 17. Which option would you use to respond to a message if you are sending it to people other than those who sent
the original message?

____ 18.

____ 19.

____ 20.

____ 21.

____ 22.

____ 23.

____ 24.

____ 25.

____ 26.

____ 27.

____ 28.

____ 29.

a. Reply to Sender
c. Forward
b. Reply All
d. Copy
Googles Gmail, Hotmail, and Ymail are examples of ____.
a. Web-based e-mail services
c. social networking sites
b. message boards
d. text messaging services
Which Outlook feature is used to set up appointments and meetings?
a. Contacts
c. Tasks
b. Calendar
d. Mail
A closed envelope icon next to a message in the Inbox indicates that it ____.
a. is displayed in the Navigation pane
c. has not been read yet
b. has been permanently deleted
d. is ready to send
The Outlook ____ stores names, e-mail addresses, phone numbers, and other contact information.
a. Address Book
c. Mailing List
b. Distribution List
d. Navigation pane
If the primary addressee does not see that others are copied on the message, it is a ____ copy.
a. hidden
c. screened
b. private
d. blind
The title of the message window contains ____.
a. the senders e-mail address
c. the subject line
b. the recipients e-mail address
d. all of the above
When you type a Web site address in an Outlook e-mail message, it is ____.
a. bolded
c. underlined
b. italicized
d. none of the above
You can save an e-mail message as a(n)____.
a. text file
c. template
b. HTML document
d. any of the above
Which of the following indicates that it is a reply message?
a. The word Reply in the title
c. The letter R on the envelope icon
b. The letters Re preceding text in the subject d. A different color in the title
line
An exclamation point on a message icon means that ____.
a. it has not been read
c. it contains a virus
b. it is considered high-priority
d. it has an attached file
If you are sending or copying an e-mail to more than one person, each e-mail address should be separated by
a(n) ____.
a. colon
c. comma
b. semicolon
d. plus sign
The Forwarding command in Outlook automatically redirects your mail to ____.
a. another e-mail address
c. the folder you designate
b. your mobile phone
d. the Deleted Items folder
FIGURE 25-1

____ 30. To open the dialog box shown in Figure 25-1 above, click ____ on the menu bar, point to New, and then click
Folder.
a. Create
c. Open
b. File
d. Personal
FIGURE 25-2

____ 31. In the e-mail address shown in Figure 25-2 above, which is the domain code?
a. dolores014
c. verizon
b. @
d. .net
Case 25-1
Both at work and in her personal life, April uses many different forms of electronic communication. Every
day she uses the Internet to transmit and receive information in a variety of ways.
____ 32. In the morning, April spends a few minutes posting personal journal entries to her ____.
a. VoIP
c. chat room
b. blog
d. message board
____ 33. Sometimes April uses a(n) ____ service to make phone calls with an Internet connection instead of a regular
telephone line.
a. VoIP
c. text messaging

b. IM

d. newsgroup

Case 25-2
Hunter uses Microsoft Office Outlook at work to manage his e-mail. He gets a lot of messages, so he needs to
spend time each day organizing them.
____ 34. In the Outlook window, Hunter uses the ____ to create mail folders for various topics, special projects, and
individuals.
a. Navigation pne
c. Inbox
b. Reading pane
d. Outbox
____ 35. To search for a message, Hunter would click ____ on the menu bar, point to Instant Search and then select
Search All Mail Items.
a. File
c. Tools
b. Preferences
d. View
____ 36. Which of the following was originally developed to facilitate the syndication of news articles?
a. Phishing
c. RDF Summary
b. Teleconferencing
d. Google Docs
____ 37. Which type of correspondence is possible with electronic communication?
a. One to one
c. Many to many
b. One to many
d. Any of the above
____ 38. ____ is the process of selecting paths in a network along which to send network traffic.
a. Forwarding
c. Tagging
b. Routing
d. Phishing
____ 39. Which of the following allows people to use voice, full-motion video, and interactive desktop sharing?
a. Community building
c. History tracking
b. Collaborative communication
d. Tagging
____ 40. Google Docs is an example of what type of program?
a. Anti-virus
c. Online document sharing
b. History tracking
d. Collaborative communication
____ 41. Which of the following is not a sort option for displaying the History list in Internet Explorer?
a. By Total Time
c. By Site
b. By Date
d. By Most Visited
____ 42. If you are having trouble configuring your e-mail account with Windows Mail, you might consider using
____.
a. the Network Repair Tool
c. rich text format (RTF)
b. Windows Live Mail
d. HTML formatting
____ 43. A bounced e-mail refers to a message that ____.
a. has an attachment
c. gets returned because of delivery failure
b. has a virus
d. is sent in rich text format and gets garbled
____ 44. Mistyping an e-mail address can cause the message to ____.
a. fail to be delivered
c. get caught in the spam filter
b. spread a virus
d. get sorted into the Junk folder
____ 45. What is a paper trail?
a. A written record created in the course of activities
b. A message that gets garbled during transmission
c. An attachment that gets blocked by your e-mail program
d. Notification that an e-mail message was not delivered properly
____ 46. If the reply message is not applicable to other recipients, which is the best response option?

____ 47.

____ 48.

____ 49.

____ 50.

____ 51.

____ 52.

____ 53.

a. Reply
c. Cc
b. Reply All
d. Bcc
Radio listeners believing that invaders from Mars were attacking the world is an example of a(n) ____.
a. hoax
c. urban legend
b. virus
d. pyramid scheme
Which is an integrated security system that prevents unauthorized electronic access to a network computer
system while permitting outward communication?
a. Firewall
c. Antivirus software
b. Electronic identification cards
d. Biometric security measures
Encryption technologies can help keep ____ information secure.
a. anti-virus
c. teleconferencing
b. instant messaging
d. credit card
If a customer needs immediate assistance or has a complaint, then the reply should be within ____.
a. 5 minutes
c. 5 to 10 hours
b. 30 minutes to 3 hours
d. 24 hours
What is the estimated yearly cost of spam for U.S. businesses?
a. $20 thousand
c. $20 billion
b. $20 million
d. $20 trillion
GlobalSign and VeriSign are commercial digital ID groups that can help you ____.
a. encrypt an e-mail message
c. prevent viruses
b. control unsolicited e-mail
d. add hyperlinks to an e-mail message
The Vmyths or Snopes Web site can help people identify ____.
a. pyramid schemes
c. Trojan horses
b. hoaxes
d. worms
FIGURE 26-1

____ 54. Figure 26-1 above shows an example of ____.


a. encryption technology
c. biometric security measures
b. a firewall
d. virus protection

FIGURE 26-2

____ 55. The interface shown in Figure 26-2 above would be used for ____.
a. teleconferencing
c. sharing the content of blogs
b. instant messaging
d. tagging
Case 26-1
Gilbert uses Windows Mail as his e-mail program. He has been getting a lot of junk e-mail in his inbox and
wants to take steps to help prevent the number of unsolicited messages that he receives.
____ 56. The type of junk e-mail that Gilbert is receiving is called ____.
a. fraud
c. worm
b. hoax
d. spam
____ 57. To display the Junk E-mail Options dialog box, Gilbert would click ____ on the menu bar and then click Junk
E-mail Options.
a. File
c. Internet
b. Tools
d. Filter
Case 26-2
Wanda has just been hired to work for a Web design company. As part of her new employee training, her
supervisor reviews the companys list of guidelines for the use of electronic communications.
____ 58. Wandas supervisor explains that she is expected to follow the rules of ____ when communicating through
electronic media.
a. netiquette
c. tagging

____ 59.

____ 60.

____ 61.

____ 62.

____ 63.

____ 64.

____ 65.

____ 66.

____ 67.

____ 68.

____ 69.

____ 70.

____ 71.

____ 72.

____ 73.

b. phishing
d. filtering
Wanda learns that when the correspondence requires a paper trail, the best communication method is ____.
a. instant messaging
c. cell phone
b. teleconferencing
d. e-mail
Which type of online content is usually displayed in reverse-chronological order?
a. Web page
c. Blog
b. Wiki
d. Peer-to-peer media sharing site
Wiki means ____ in Hawaiian.
a. valuable
c. quick
b. information
d. search
Facebook, Twitter, and LinkedIn are examples of ____.
a. blogs
c. social networking sites
b. wikis
d. social bookmarking sites
A news feed is similar to a(n) ____.
a. blog
c. wiki
b. podcast
d. peer-to-peer media sharing site
When searching online, one of the primary tools you can use to find information is a(n) ____.
a. gadget
c. news feed
b. bookmark
d. search engine
Delicious.com was a pioneer Web site for what type of technology?
a. Blog
c. Link list
b. Shared bookmark
d. Index
If you want to search for words that appear next to each other, which is your best choice?
a. Phrase searching
c. Wildcard searching
b. Boolean searching
d. Title searching
When searching for more than one phrase, you can separate phrases or proper names with a ____.
a. comma
c. plus sign
b. dash
d. space
Which of the following is called an exclusion operator?
a. A plus sign (+)
c. OR
b. A minus sign (-)
d. AND
AND, NOT, and OR are used in ____ searching.
a. Boolean
c. wildcard
b. phrase
d. title
Which symbol is considered a wildcard character?
a. #
c. *
b. &
d. @
The phrase Similar pages in Google indicates what type of search?
a. Phrase
c. Boolean
b. Wildcard
d. Related
Which question would you ask if you were evaluating the validity and bias of a Web site?
a. Is the information current?
b. Is the site organized and well designed?
c. Is the information sufficient for your particular purpose?
d. Is it trying to influence public opinion?
If you are asking whether the purpose of the Web site is stated and if the information is accurate, which
criteria are you evaluating?
a. Relevance and reliability
c. Writing style

b. Page layout
d. Coverage
____ 74. You should be able to verify that a Web site represents an organization by ____.
a. looking at the title bar
b. checking for misspelled words and incorrect grammar
c. contacting a site representative
d. whether the ideas and opinions are supported
____ 75. Certain material is considered to be in the public domain when ____.
a. it is protected as a trademark
b. the copyright or patent protection has lapsed
c. the copyright notice isnt prominently displayed on the Web site
d. the inventor has exclusive rights to the process or method
____ 76. If you publish your opinion on a Web site, you should ____.
a. update it frequently
b. cite the source using The Chicago Manual of Style
c. ensure that the information is true
d. provide backup information or links to supportive documents
FIGURE 28-1

____ 77. Figure 28-1 above shows an example of a ____.


a. social networking site
c. blog
b. wiki
d. podcast

FIGURE 28-2

____ 78. The site shown in Figure 28-2 above would be used to ____.
a. store, organize, search, and manage a collection of links to Web pages
b. provide users with frequently updated content
c. share photos, music, or video with other users
d. download multimedia files automatically through a subscription
Case 28-1
Melody needs to do some research for a paper that is due in her continuing education class next week. She is
searching on the Web for the information that she needs.
____ 79. Which online tool is Melody likely using if it contains a listing of over 35,000 free books on the Web?
a. A links list
c. An index
b. A shared bookmark
d. A podcast
____ 80. If Melody does not know how to spell a word that she is searching for, she could use a ____ search.
a. title
c. phrase
b. Boolean
d. wildcard
Case 28-2
Chandler is writing a paper for an upcoming academic conference where he will present it. At the end of his
paper, he cites the Internet resources that he used.
____ 81. If Chandler did not give proper credit for the information included in his paper, it could be considered ____.
a. plagiarism
c. libel

____ 82.

____ 83.

____ 84.

____ 85.

____ 86.

____ 87.

____ 88.

____ 89.

____ 90.

____ 91.

____ 92.

____ 93.

____ 94.

____ 95.

____ 96.

b. a copyright violation
d. public domain
If Chandler included the complete URL and date of access, he would likely be citing which Internet resource?
a. Online journal article
c. Web site
b. Online magazine article
d. Any of the above
How long ago were Google and PayPal founded?
a. 3 years
c. 10 years
b. 5 years
d. 20 years
Technology provides ____ options such as e-mail, instant messaging, blogs, and social Web sites such as
MySpace and Twitter.
a. organization
c. productivity
b. communication
d. evaluation
Using ____, you can collaborate with other people all over the world who might otherwise never meet or
know of each other.
a. online communities
c. ATMs
b. e-commerce sites
d. embedded computers
____ let you access electronic catalogs, select goods, store them in a digital cart or bag, and then check out by
paying with a credit card or online account.
a. Online learning sites
c. Commercial Web sites
b. Social Networking sites
d. Government Web sites
PIN stands for ____.
a. pretty important number
c. private information now
b. personal identity name
d. personal identification number
____ information is a security concern on the Internet.
a. RFID card
c. Credit card
b. Frequent buyer card
d. Library card
A terminal used for electronic processing of payment transactions in a retail outlet is called a(n) ____.
a. embedded computer
c. global positioning system (GPS)
b. Automated Teller Machine (ATM)
d. point-of-sale (POS) system
A(n) ____ device can match patterns stored in a database with a persons iris, retina, voice, fingerprint, or
handprint to confirm or deny someones identity.
a. embedded
c. GPS
b. biometric
d. robotic
Junk mail sent to your e-mail address is called ____.
a. spam
c. digital cash
b. ham
d. encryption
____ describes transactions between businesses and consumers.
a. Business-to-government (B2G)
c. Business-to-business (B2B)
b. Radio-frequency identification (RFID)
d. Business-to-consumer (B2C)
____ tags are used in electronic toll collection and in mass transit passes.
a. Point-of-sale (POS)
c. Biometric
b. Radio-frequency identification (RFID)
d. Business-to-government (B2G)
Blackboard, Moodle, and Angel are examples of ____.
a. virtual high schools
c. learning management systems
b. social networking sites
d. e-commerce sites
____ enable groups of people to interact online through a communication media rather than face-to-face.
a. E-commerce sites
c. Biometrics
b. Robots
d. Online communities
Hurricanes, tornadoes, and other recent disasters have increased awareness of the need for ____.

____ 97.

____ 98.

____ 99.

____ 100.

a. disaster recovery plans


c. biometrics
b. assistive technologies
d. embedded computers
Simulation analysts need which of the following skills?
a. Logical thinker
c. Good memory
b. Good technical writer
d. All of the above
NASAs Mars Rover Spirit is a(n) ____ device.
a. biometric
c. global positioning system (GPS)
b. robot
d. online learning
____ are integrated into virtually all medical equipment.
a. E-commerce systems
c. Personal computers
b. Keyless entry systems
d. Embedded computers
When you use ____, no one can obtain information about you.
a. credit cards
c. ATM cards
b. digital cash
d. debit cards
FIGURE 29-1

____ 101. Figure 29-1 above displays what kind of Web site?
a. Commercial
c. Social networking
b. Governmental
d. Online learning

FIGURE 29-2

____ 102. What kind of computer would be in an appliance like the one shown in Figure 29-2 above?
a. Robot
c. Embedded computer
b. Point-of-sale system
d. Global positioning system
Case 29-1
MacKenzie is excited about buying a new car. She is researching and comparing options and features of new
cars using the Internet but she is not familiar with a lot of the new technologies and terminology.
____ 103. MacKenzie wants to be able to start her car with the press of a button. What kind of system can accomplish
this?
a. Global positioning system (GPS)
c. Biometric device
b. Keyless entry system
d. Point-of-sale system
____ 104. MacKenzie wants a feature that can help her if she is in an accident. Which technology should she be looking
for?
a. Global positioning system (GPS)
c. Biometrics
b. Keyless entry system
d. Robotics
Case 29-2
Zach is relocating to another state for college. He knows he will miss his family and friends, but hes hoping
he will be able to stay in touch through the Internet.
____ 105. Zachs new roommate told him about Facebook. What kind of site is it?
a. Social networking
c. E-commerce
b. Online learning
d. Electronic government
____ 106. Zachs boss has agreed to let him continue working part-time as a webmaster even though he will be out of
the state, using e-mail and the Internet to transfer files. What is this arrangement called?

____ 107.

____ 108.

____ 109.

____ 110.

____ 111.

____ 112.

____ 113.

____ 114.

____ 115.

____ 116.

____ 117.

____ 118.

____ 119.

a. Encryption
c. Online learning
b. E-commerce
d. Telecommuting
What action might obstruct the air vents in your notebook computer and cause it to overheat?
a. Leaving it in the same position on the desk for too long
b. Using a cooling pad
c. Setting it directly on your lap
d. Plugging it into a grounded outlet
What can result from making too many of the same motions over a long period of time?
a. Browser hijacking
c. Repetitive strain injury
b. Brute force attacks
d. Relaxed eye muscles
It is estimated that ____ causes millions of dollars of damage each year, along with the theft of important and
valuable data.
a. hacking
c. spying
b. encryption
d. eavesdropping
One easy way to avoid data loss is to ____.
a. plug the computer into a grounded outlet c. install a firewall
b. save frequently
d. turn on some form of encryption
Surge protectors help protect computers from ____.
a. hackers
c. power spikes
b. sniffers
d. hard disk crashes
External hard drives can be used to help ____.
a. prevent computer hacking
c. safeguard against software threats
b. avoid data loss
d. protect your system against spyware
Often, you can inadvertently run a virus program by ____.
a. installing a security update
c. opening an e-mail message or attachment
b. backing up data
d. using a surge protector
What is another term for brute force attacks?
a. Browser hijacking
c. Keylogger attacks
b. Spyware attacks
d. Dictionary attacks
The goal of ____ is to collect information about the user, the users browsing habits, and other personal
information.
a. a sniffer
c. a virus
b. worms
d. spyware
Any information stored on a computer in an educational facility is the property of the ____.
a. person using the computer
c. person who created the information
b. school
d. none of the above
TSL and SSL technology enables ____.
a. data to be backed up securely
b. companies to monitor unauthorized computer activity
c. system administrators to restrict access to files
d. sensitive information to be encrypted
To make sure your e-commerce transactions are secure and to protect your private information, you should
____.
a. use a secure browser
c. keep personal information private
b. check privacy policies
d. all of the above
When is it possible for the information that you submit on the Internet to be gathered by many persons and
used for various situations?
a. When you use a secure site
c. When the data is encrypted

____ 120.

____ 121.

____ 122.

____ 123.

____ 124.

b. Only if you dont have a firewall


d. Any time
Which of the following is not true about spyware?
a. It tracks your Web habits
b. It can take over control of your computer
c. It has redeeming qualities
d. It can direct you to Web sites you have not chosen to visit
When you use a computer in a public place, you should ____.
a. verify that you have logged off
c. use cookies to track your computer use
b. install antivirus software
d. use a code name
If non-copyrighted information is published on a Web site, ____.
a. it is true
c. it is false
b. it cannot be copied and used as your own d. the author is relieved of any responsibility
What should you do before donating a computer?
a. Remove the antivirus software
c. Delete data from the hard drive
b. Password-protect the operating system
d. Turn off any encryption technologies
Which of the following would be considered the strongest password?
a. JeR3My
c. SouTHWeST!
b. tHund3r$t0rM
d. #1fusion
FIGURE 30-1

____ 125. The message in Figure 30-1 above shows an example of ____.
a. hacking
c. sniffing
b. phishing
d. browser hijacking
FIGURE 30-2

____ 126. You could use the program shown in Figure 30-2 above to ____.
a. protect your system against spyware
c. configure a hardware firewall
b. back up files
d. password protect your wireless network
Case 30-1
Nelson is a graphic designer who works long hours on his computer. He tries to take precautions to avoid
chronic physical maladies such as eyestrain, back problems, and repetitive strain injuries.
____ 127. What kind of furniture should Nelson use to help adapt his equipment and his workplace to fit himself?
a. Expensive
c. Ergonomic
b. Light-weight
d. Soft
____ 128. What can Nelson do to help avoid or minimize eyestrain?
a. Use a low-resolution monitor to increase visibility
b. Stay in the same position so his eyes become more comfortable
c. Avoid using extra lighting so the monitor is more easily visible
d. Take regular breaks to allow the eye muscles to relax
Case 30-2
Molly has just purchased a router and is setting up a wireless network in her home office. She wants to secure
it properly.

____ 129. What is the first step Molly should take when setting up her wireless network?
a. Download eavesdropping software
c. Turn off the default encryption
b. Change the default password
d. Configure a hardware firewall
____ 130. If Molly does not properly secure her wireless network connection, what could happen if her neighbor uses
her broadband connection?
a. Her Internet access could be slower
b. She could be charged additional costs
c. She could be held responsible for any illegal activity
d. Any of the above

Vous aimerez peut-être aussi