Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Computer Literacy Module - 7

Jm Computer Literacy Assessment – Internet


Collected and composed by Ramamurthy S
Ram GHS Devalapura 94487 50594 srmysooru@gmail.com

Question 1 / 31

The Internet is just made up of many other networks all interacting


together.
A.True 
B.False
Question 2 / 31

The purpose of a web browser is what?


A.To do internet searches. 
B.Search for cob webs in your house
C.Is to display web page from websites

Question 3 / 31

What does ISP stand for?


A.Internet Service Provider 
B.Internet Service Protection
C.Internet Signal Piping

Question 4 / 31

A group of related web pages form


A.Www
B.Html
C.Website 
D.Home page
Question 5 / 31

The Internet and World Wide Web is really the same thing
A.True
B.False
Question 6 / 31

What is the language used to build web pages?


A.Http
SR Devalapura 9448750594 Page | 1
B.Www
C.Html 
D.Url
Question 7 / 31

Which of the following is considered a Directory/Index Internet


search engine?
A.Google
B.Yahoo 
C.Ask Jeeves
D.Dogpile
Question 8 / 31

Which of the following Top Level Domain is considered the MOST


credible?
A..org
B..biz
C..com
D..edu 
Question 9 / 31

A firewall is the name used for software that restricts the access to
certain Internet content.
A.True 
B.False
Question 10 / 31

Online fights using electronic messages with angry and vulgar


language is called what?
A.Impersonation
B.Cyberbullying
C.Flaming 
Question 11 / 31

Which one should you never do in a cyberbullying situation?


A.Tell a responsable adult
B.Block harmful messages
C.Respond to the messages in an angry way 
Question 12 / 31

Which screenname is the most dangerous for a child to have?


SR Devalapura 9448750594 Page | 2
A.Basketballstar19
B.Carlvr1232
C.Dave93_CA 
Question 13 / 31

What is the use of information and communication technologies to


support deliberate, repeated, and hostile behavior by an individual
or group, that is intended to harm others?
A.Hacking
B.Cyberbullying 
C.Predator
Question 14 / 31

All of the following are forms of technology used to


cyberbully except:
A.E-Mails
B.Instant Messaging
C.Web Pages
D.Television 
Question 15 / 31

What technology do teens use the most for cyberbullying?


A.Email
B.Cell Phones
C.Instant Messages 
D.Mail
Question 16 / 31

To be safer, what should you do if you post pictures online?


A.Have a picture of only yourself
B.Blur the pictures 
C.Have everyone in the picture tagged with their full name
Question 17 / 31

What is the safest things to do in public chatrooms?


A.Don't invite anyone to them
B.Make a screen name that has nothing to do with yourself
C.Block any unknown people that talk to you 
D.Don't say a word
Question 18 / 31

SR Devalapura 9448750594 Page | 3


What is one of the problems that makes cyberbullying easy?
A.Computers are in a teen's private room which keeps their parents from
seeing the problem 
B.The bully doesn't think that it makes more of an impact since it is over the
internet
C.The bully doesn't have to see the victim's reaction to being bullie
D.Online predators are very good at grooming them into talking to the
Question 19 / 31

Schools and businesses most often connect to the Internet through


a ___________.
A.Firewall
B.LAN (Local Area Network) 
C.Internet Service Provider
D.World Wide Web
Question 20 / 31

All computers are identified with a 4 digit number separated by


periods. This is called
A.Domain name
B.Host name
C.Ip address 
Question 21 / 31

Which of the following domains is LEAST reliable?


A..edu
B..net(Missed)
C..gov
Question 22 / 31

The .com domain web sites are


A.Government Institutions
B.Business or other mixed sites. 
C.Non-profit Institutions
D.Education Institutions

Question 23 / 31

The .org domains


A.Contain reputable non-profit organizations with reliable information always.
B.Are always non-profit organizations that are reputable.
C.Contain only advocacy group web sites with political agendas
SR Devalapura 9448750594 Page | 4
D.Must be evaluated well because this domain contains both very
reputable non-profit organization web sites and advocacy groups with
hidden agendas 
Question 24 / 31

If the web site has an author and looks professional


A.You should look at the domain
B.You should expect good research
C.You should research the author, look at the domain, check the links,
check for errors, look for bias, etc. 
Question 25 / 31

Which of the following are considered a meta search engine?


A.Dogpile 
B.Yahoo
C.Google
Question 26 / 31

All of the following are BOOLEAN operators used in Google


EXCEPT
A.But 
B.And
C.Or
D.And Not
Question 27 / 31

The language of the Internet, allowing cross-network


communication
A.TCP/IP 
B.Internetworking
C.ISP
D.Router
Question 28 / 31

Web entry station that offer quick and easy access to a variety of
general- interest links
A.Portals 
B.Consumer portals
C.Corporate portals
D.Vertical portals
Question 29 / 31

SR Devalapura 9448750594 Page | 5


That part of the web that standard search engines don't access is
referred to as
A.Blind Web
B.Lost Web
C.Invisible Web 
D.Non-access Web
Question 30 / 31

Unsolicited emails are called


A.Spams 
B.Viruses
C.Trojans
D.Spyware
Question 31 / 31

Doing a Search on the Internet using the Boolean Operator of


"OR" will find all websites that
A.Contain all keywords used
B.Contain one or the other keywords 
C.Contain all BUT the keywords
Your Certificate

SR Devalapura 9448750594 Page | 6

You might also like