Вы находитесь на странице: 1из 2

NC COMPUTER SKILLS TEST

TELECOMMUNICATIONS / INTERNET PRACTICE QUESTIONS

Circle the letter of the correct answer.

1. A _________ engine is a software 6. A secure web page can be identified by


program used by a search site to all of the following except which one?
retrieve web pages from a search A. a locked padlock
database that match certain criteria. B. a URL that begins with https
A. multimedia C. a non-broken key at the bottom of your
B. virtual Web browser
C. diesel D. a URL that begins with http
D. search

7. Online ________ make it possible to bid


2. An example of a natural language and purchase items, goods or services.
search engine is: A. stores
A. Ask Jeeves B. auctions
B. Google C. bids
C. Yahoo D. purchases
D. MSN Search

8. ________ banking services typically


3. _________ is a software program that include reviewing account activity and
secretly collects information and balance, sending electronic payments,
monitors your actions without your and transferring funds between
knowledge. accounts.
A. Adware A. Debit
B. Freeware B. Drive thru
C. Spyware C. Electronic
D. Investigativeware D. Online

9. A ___________ identifies a user’s


4. ___________ operators-most commonly
personal preferences and settings and
AND, OR, and NOT-can often be used in
allows the web site's server to retrieve
keyword searches to refine search
your information from its database.
criteria.
A. cookie
A. Google
B. file
B. Boolean
C. prototype
C. Engine
D. profile
D. Intranet

10. The area that contains the URL or web


5. A(n) __________ is a special symbol
address of the active web page is
that is used in conjunction with a part
called the ___________ bar.
of a word in order to search for
A. address
variations and plurals of the word. B. menu
A. asterisk C. link
B. wildcard D. browser
C. ampersand
D. value
NC COMPUTER SKILLS TEST
TELECOMMUNICATIONS / INTERNET PRACTICE QUESTIONS

Circle the letter of the correct answer.

11. A ________ program protects against 16. Electronic mail can not be used for:
hackers and other types of A. scanning pictures
unauthorized access. B. sending documents
A. firewall C. sending attachments
B. web nanny D. sending messages
C. surf watch
D. spyware
17. ___________ is a type of Internet
connection in which the PC must
12. If a web page is too large to fit on a connect to a service provider using
computer screen, the user can navigate standard telephone lines.
the page by using the vertical and A. HTTP
horizontal tools called the ______ bar B. Wireless
which are found at the bottom and right C. DSL
side of the display. D. Dial-up
A. tool
B. scroll
C. status 18. The Internet began as an experimental
D. title network called:
A. Intranet
B. ARPANET
13. The _______ button tracks Internet C. ARPA
sites recording date, times, and D. Department of Defense
frequency of visits.
A. favorite
B. bookmarks 19. A _____ room or online forum allows
C. history users to communicate through typed
D. search messages which are displayed almost
instantly.
A. mail
14. Typing thumb(*) would search for all of B. buddy
the following phases except for which C. chat
one? D. message
A. green thumb
B. thumb wrestle
C. thumb nail 20. A _________ is a software program
D. finger nail used for viewing various kinds of
Internet resources found on the World
Wide Web.
15. To connect to the address displayed in A. bookmark
the address bar, you would click on the B. Intranet
_______. C. domain
A. Go button D. browser
B. On/Off button
C. Stop switch
D. Toggle switch

Вам также может понравиться