Вы находитесь на странице: 1из 5

Exercise 28 1.

Which one of the following is a feed format used to publish frequently updated content such as news headlines or podcasts? a. b. c. d. 2. Really Simple Service (RSS). Real Summary Syndication (RSS). Really Simple Syndication (RSS). Real Site Software (RSS).

Which one of the following is used by web browsers to locate web sites on the Internet? a. b. c. d. SMS. VoIP. ISP. URL.

3.

Which one of the following refers to the domain name in the URL http://www.ecdl.org? a. b. c. d. .org http:// //www. ecdl

4.

Which one of the following describes software that is created and distributed for malicious purposes? a. b. c. d. Freeware. Vaporware. Shareware. Malware.

5.

Which one of the following icons is used to indicate a secure web page? a. b.

c. d.

6.

What is the purpose of a firewall a. b. c. d. To provide secure off-site data storage for a computer or network. To provide a computer or network with wireless access to the Internet. To delete temporary Internet files and cookies from a computer or network. To protect a computer or network against unauthorised intrusion.

7.

Which one of the following is a scheme where criminals send unsolicited e-mail or pop-up messages to get personal and financial information from unsuspecting victims? a. b. c. d. Browsing. Searching. Phishing. Blogging.

8.

Access a Search Engine and search using the keywords Greek cuisine. Write the URL up to the domain of the first website that appears.
http://www.greekcuisine.com/

9.

Select any web site that gives information about Greek cuisine from the search results and save the web page as a text file called greek food.txt to your folder.

10. In the e-mail address drossi@infaxa.it which part of the address identifies the geographical area? a. b. c. d. @ drossi it Infaxa

11. Which one of the following statements is true?

a. b. c. d.

e-mail cannot transmit images as attachments. e-mail is a low cost way to send and receive messages. e-mail cannot be infected by computer viruses. e-mail is a secure way to transmit and store confidential information.

12. Which one of the following allows voice communication across the Internet? a. b. c. d. VPN. IM. VoIP. SMS.

13. Which one of the following is an example of an online (virtual) community? a. b. c. d. Home Page. Chat Room. Cache. News feed.

14. Which one of the following is a worldwide collection of computer networks accessible by the public? a. b. c. d. The World Wide Web. The Internet. A website. A firewall.

15. Which one of the following is used to connect individuals, businesses, or other organisations to the Internet? a. b. c. d. Independent Software Provider (ISP). Universal Resource Locator (URL). Digital Certificate. Internet Service Provider (ISP).

16. Which one of the following refers to the transfer protocol in the URL http://www.ecdl.org a. b. c. d. .org http:// //www. ecdl

17. Which one of the following is a digital media file that is downloaded from the Internet for playback on portable media players and personal computers? a. b. c. d. Malware. Blog. Cookie. Podcast.

18. What is a digital certificate? a. b. c. d. A verification that a Web site is free from viruses. A verification of the date and time you viewed a Web page. A verification that authenticates a Web site. A version number indicating when a Web page was published.

19. Which one of the following is the best method to ensure access to a network is secure? a. b. c. d. The network requires a user name and password for access. The network only requires a user name for access. The network provides anti-virus protection. The network requires the user to pay a fee to gain access.

20. Which one of the following is the most likely to infect your computer with a virus while you are browsing the Internet? a. b. c. d. Downloading files from a web site. Refreshing web pages. Disabling cookies. Installing a firewall.

21. Access an Internet Search Engine and search using the keyword fishing. Select any web site that gives information about fishing from the search results and save as fishing.htm to your Candidate Drive. 22. What symbol is necessary to write between black horse to narrow the search and retrieve only information that consists of black horse? + 23. Which one of the following best describes the difference between the Cc and Bcc fields? a. b. c. d. There is no difference between the Cc and Bcc fields. The Bcc recipients name in a mail message is visible to other recipients of the message. The Bcc recipients name in a mail message is NOT visible to other recipients of the message. The Cc recipients name in a mail message is NOT visible to other recipients of the message.

24. Which one of the following actions would most likely infect a computer with a virus? a. b. c. d. Copying text from an e-mail message to a word processing document. Deleting an e-mail attachment. Opening an e-mail attachment. Adding a contact to your address book.

25. Which one of the following gives you the ability to know if a desired contact is online? a. b. c. d. Really Simple Syndication (RSS). Short message service (SMS). Instant messaging (IM). Uniform Resource Locator (URL).

Вам также может понравиться