Академический Документы
Профессиональный Документы
Культура Документы
11. A ________ program protects against 16. Electronic mail can not be used for:
hackers and other types of A. scanning pictures
unauthorized access. B. sending documents
A. firewall C. sending attachments
B. web nanny D. sending messages
C. surf watch
D. spyware
17. ___________ is a type of Internet
connection in which the PC must
12. If a web page is too large to fit on a connect to a service provider using
computer screen, the user can navigate standard telephone lines.
the page by using the vertical and A. HTTP
horizontal tools called the ______ bar B. Wireless
which are found at the bottom and right C. DSL
side of the display. D. Dial-up
A. tool
B. scroll
C. status 18. The Internet began as an experimental
D. title network called:
A. Intranet
B. ARPANET
13. The _______ button tracks Internet C. ARPA
sites recording date, times, and D. Department of Defense
frequency of visits.
A. favorite
B. bookmarks 19. A _____ room or online forum allows
C. history users to communicate through typed
D. search messages which are displayed almost
instantly.
A. mail
14. Typing thumb(*) would search for all of B. buddy
the following phases except for which C. chat
one? D. message
A. green thumb
B. thumb wrestle
C. thumb nail 20. A _________ is a software program
D. finger nail used for viewing various kinds of
Internet resources found on the World
Wide Web.
15. To connect to the address displayed in A. bookmark
the address bar, you would click on the B. Intranet
_______. C. domain
A. Go button D. browser
B. On/Off button
C. Stop switch
D. Toggle switch