IC3 - Module 3 Questions Multiple Choice Identify the choice that best completes the statement or answers the question. You will need your answers on Wednesday!!!!!!!!!!! ____ ____ ____ ____ ____ ____ ____ ____ ____ 1. Which of the following is true about e-mail? a. The cost depends on the size of the c. It is private message b. Delivery is almost instantaneous d. It cannot be sabotaged 2. In a client/server network, which of the following would be considered the client? a. Microsoft Windows c. Printer b. Internet Explorer d. Desktop computer 3. Handbooks, employee manuals, and employment forms would most likely be found on ____. a. an intranet c. the Internet b. an extranet d. a hub 4. Which of the following uses coaxial cable to send and receive data? a. Modem c. Digital subscriber line (DSL) b. Cable modem d. T-1 line 5. “Sniffer” software is used to ____. a. prevent hackers from accessing your computer b. locate wireless hot spots c. transmit voice data over telephone lines d. set up and manage a peer-to-peer network 6. Antivirus software should ____. a. be run when you suspect a problem c. be run monthly b. be run weekly d. always be running 7. A cache is a(n) ____. a. place to store something temporarily c. external wireless adapter b. special type of password d. dedicated connection to the Internet 8. Companies handling sensitive information should back up data regularly and store it ____. a. on the same computer c. on CDs b. on the network server d. off site 9. Biometric security measures examine any of the following, except ____. a. fingerprints c. voice pattern b. blood type d. retina of the eye FIGURE 24-2 ____ 10. Figure 24-2 above shows a computer with a ____ attached. a. dial-up modem c. hub b. wireless router d. T-1 line Case 24-1 Javier has decided to upgrade his communication hardware and get a faster Internet connection. After considering all the options, he has decided to use a wireless Internet service provider. ____ 11. To connect his laptop wirelessly to the Internet, Javier will need a(n) ____. a. hub c. T-1 line b. router d. adapter Case 24-2 Bryah owns a small business and travels frequently. She is concerned about the security of the data on her laptop, which includes valuable information and trade secrets. ____ 12. When Bryah creates a password to restrict access to her computer, she should ____. a. change it frequently c. write it down b. use all lowercase letters d. use the same one as her Internet account ____ 13. Which service uses a cell phone or other mobile device to send and receive written messages? a. E-mail c. VoIP b. Instant messaging d. Text messaging ____ 14. ARPANET was established ____. a. to provide rules governing the transfer of data b. to regulate the use of domain names c. as a testing ground for new networking technologies d. as a way to build online communities of people who share common interests ____ 15. Which of the following is not part of an e-mail address? a. User name c. @ symbol b. # symbol d. Domain name ____ 16. Which part of an e-mail message should fully but briefly describe the purpose of the message? a. Address c. Body b. Subject line d. Attachment ____ 17. Which option would you use to respond to a message if you are sending it to people other than those who sent the original message? ____ 18. ____ 19. ____ 20. ____ 21. ____ 22. ____ 23. ____ 24. ____ 25. ____ 26. ____ 27. ____ 28. ____ 29. a. Reply to Sender c. Forward b. Reply All d. Copy Google’s Gmail, Hotmail, and Ymail are examples of ____. a. Web-based e-mail services c. social networking sites b. message boards d. text messaging services Which Outlook feature is used to set up appointments and meetings? a. Contacts c. Tasks b. Calendar d. Mail A closed envelope icon next to a message in the Inbox indicates that it ____. a. is displayed in the Navigation pane c. has not been read yet b. has been permanently deleted d. is ready to send The Outlook ____ stores names, e-mail addresses, phone numbers, and other contact information. a. Address Book c. Mailing List b. Distribution List d. Navigation pane If the primary addressee does not see that others are copied on the message, it is a “____” copy. a. hidden c. screened b. private d. blind The title of the message window contains ____. a. the sender’s e-mail address c. the subject line b. the recipient’s e-mail address d. all of the above When you type a Web site address in an Outlook e-mail message, it is ____. a. bolded c. underlined b. italicized d. none of the above You can save an e-mail message as a(n)____. a. text file c. template b. HTML document d. any of the above Which of the following indicates that it is a reply message? a. The word Reply in the title c. The letter R on the envelope icon b. The letters Re preceding text in the subject d. A different color in the title line An exclamation point on a message icon means that ____. a. it has not been read c. it contains a virus b. it is considered high-priority d. it has an attached file If you are sending or copying an e-mail to more than one person, each e-mail address should be separated by a(n) ____. a. colon c. comma b. semicolon d. plus sign The Forwarding command in Outlook automatically redirects your mail to ____. a. another e-mail address c. the folder you designate b. your mobile phone d. the Deleted Items folder FIGURE 25-1 ____ 30. To open the dialog box shown in Figure 25-1 above, click ____ on the menu bar, point to New, and then click Folder. a. Create c. Open b. File d. Personal FIGURE 25-2 ____ 31. In the e-mail address shown in Figure 25-2 above, which is the domain code? a. dolores014 c. verizon b. @ d. .net Case 25-1 Both at work and in her personal life, April uses many different forms of electronic communication. Every day she uses the Internet to transmit and receive information in a variety of ways. ____ 32. In the morning, April spends a few minutes posting personal journal entries to her ____. a. VoIP c. chat room b. blog d. message board ____ 33. Sometimes April uses a(n) ____ service to make phone calls with an Internet connection instead of a regular telephone line. a. VoIP c. text messaging b. IM d. newsgroup Case 25-2 Hunter uses Microsoft Office Outlook at work to manage his e-mail. He gets a lot of messages, so he needs to spend time each day organizing them. ____ 34. In the Outlook window, Hunter uses the ____ to create mail folders for various topics, special projects, and individuals. a. Navigation pne c. Inbox b. Reading pane d. Outbox ____ 35. To search for a message, Hunter would click ____ on the menu bar, point to Instant Search and then select Search All Mail Items. a. File c. Tools b. Preferences d. View ____ 36. Which of the following was originally developed to facilitate the syndication of news articles? a. Phishing c. RDF Summary b. Teleconferencing d. Google Docs ____ 37. Which type of correspondence is possible with electronic communication? a. One to one c. Many to many b. One to many d. Any of the above ____ 38. ____ is the process of selecting paths in a network along which to send network traffic. a. Forwarding c. Tagging b. Routing d. Phishing ____ 39. Which of the following allows people to use voice, full-motion video, and interactive desktop sharing? a. Community building c. History tracking b. Collaborative communication d. Tagging ____ 40. Google Docs is an example of what type of program? a. Anti-virus c. Online document sharing b. History tracking d. Collaborative communication ____ 41. Which of the following is not a sort option for displaying the History list in Internet Explorer? a. By Total Time c. By Site b. By Date d. By Most Visited ____ 42. If you are having trouble configuring your e-mail account with Windows Mail, you might consider using ____. a. the Network Repair Tool c. rich text format (RTF) b. Windows Live Mail d. HTML formatting ____ 43. A “bounced” e-mail refers to a message that ____. a. has an attachment c. gets returned because of delivery failure b. has a virus d. is sent in rich text format and gets garbled ____ 44. Mistyping an e-mail address can cause the message to ____. a. fail to be delivered c. get caught in the spam filter b. spread a virus d. get sorted into the Junk folder ____ 45. What is a paper trail? a. A written record created in the course of activities b. A message that gets garbled during transmission c. An attachment that gets blocked by your e-mail program d. Notification that an e-mail message was not delivered properly ____ 46. If the reply message is not applicable to other recipients, which is the best response option? ____ 47. ____ 48. ____ 49. ____ 50. ____ 51. ____ 52. ____ 53. a. Reply c. Cc b. Reply All d. Bcc Radio listeners believing that invaders from Mars were attacking the world is an example of a(n) ____. a. hoax c. urban legend b. virus d. pyramid scheme Which is an integrated security system that prevents unauthorized electronic access to a network computer system while permitting outward communication? a. Firewall c. Antivirus software b. Electronic identification cards d. Biometric security measures Encryption technologies can help keep ____ information secure. a. anti-virus c. teleconferencing b. instant messaging d. credit card If a customer needs immediate assistance or has a complaint, then the reply should be within ____. a. 5 minutes c. 5 to 10 hours b. 30 minutes to 3 hours d. 24 hours What is the estimated yearly cost of spam for U.S. businesses? a. $20 thousand c. $20 billion b. $20 million d. $20 trillion GlobalSign and VeriSign are commercial digital ID groups that can help you ____. a. encrypt an e-mail message c. prevent viruses b. control unsolicited e-mail d. add hyperlinks to an e-mail message The Vmyths or Snopes Web site can help people identify ____. a. pyramid schemes c. Trojan horses b. hoaxes d. worms FIGURE 26-1 ____ 54. Figure 26-1 above shows an example of ____. a. encryption technology c. biometric security measures b. a firewall d. virus protection FIGURE 26-2 ____ 55. The interface shown in Figure 26-2 above would be used for ____. a. teleconferencing c. sharing the content of blogs b. instant messaging d. tagging Case 26-1 Gilbert uses Windows Mail as his e-mail program. He has been getting a lot of junk e-mail in his inbox and wants to take steps to help prevent the number of unsolicited messages that he receives. ____ 56. The type of junk e-mail that Gilbert is receiving is called ____. a. fraud c. worm b. hoax d. spam ____ 57. To display the Junk E-mail Options dialog box, Gilbert would click ____ on the menu bar and then click Junk E-mail Options. a. File c. Internet b. Tools d. Filter Case 26-2 Wanda has just been hired to work for a Web design company. As part of her new employee training, her supervisor reviews the company’s list of guidelines for the use of electronic communications. ____ 58. Wanda’s supervisor explains that she is expected to follow the rules of ____ when communicating through electronic media. a. netiquette c. tagging ____ 59. ____ 60. ____ 61. ____ 62. ____ 63. ____ 64. ____ 65. ____ 66. ____ 67. ____ 68. ____ 69. ____ 70. ____ 71. ____ 72. ____ 73. b. phishing d. filtering Wanda learns that when the correspondence requires a paper trail, the best communication method is ____. a. instant messaging c. cell phone b. teleconferencing d. e-mail Which type of online content is usually displayed in reverse-chronological order? a. Web page c. Blog b. Wiki d. Peer-to-peer media sharing site “Wiki” means ____ in Hawaiian. a. valuable c. quick b. information d. search Facebook, Twitter, and LinkedIn are examples of ____. a. blogs c. social networking sites b. wikis d. social bookmarking sites A news feed is similar to a(n) ____. a. blog c. wiki b. podcast d. peer-to-peer media sharing site When searching online, one of the primary tools you can use to find information is a(n) ____. a. gadget c. news feed b. bookmark d. search engine Delicious.com was a pioneer Web site for what type of technology? a. Blog c. Link list b. Shared bookmark d. Index If you want to search for words that appear next to each other, which is your best choice? a. Phrase searching c. Wildcard searching b. Boolean searching d. Title searching When searching for more than one phrase, you can separate phrases or proper names with a ____. a. comma c. plus sign b. dash d. space Which of the following is called an exclusion operator? a. A plus sign (+) c. OR b. A minus sign (-) d. AND AND, NOT, and OR are used in ____ searching. a. Boolean c. wildcard b. phrase d. title Which symbol is considered a wildcard character? a. # c. * b. & d. @ The phrase Similar pages in Google indicates what type of search? a. Phrase c. Boolean b. Wildcard d. Related Which question would you ask if you were evaluating the validity and bias of a Web site? a. Is the information current? b. Is the site organized and well designed? c. Is the information sufficient for your particular purpose? d. Is it trying to influence public opinion? If you are asking whether the purpose of the Web site is stated and if the information is accurate, which criteria are you evaluating? a. Relevance and reliability c. Writing style b. Page layout d. Coverage ____ 74. You should be able to verify that a Web site represents an organization by ____. a. looking at the title bar b. checking for misspelled words and incorrect grammar c. contacting a site representative d. whether the ideas and opinions are supported ____ 75. Certain material is considered to be in the public domain when ____. a. it is protected as a trademark b. the copyright or patent protection has lapsed c. the copyright notice isn’t prominently displayed on the Web site d. the inventor has exclusive rights to the process or method ____ 76. If you publish your opinion on a Web site, you should ____. a. update it frequently b. cite the source using The Chicago Manual of Style c. ensure that the information is true d. provide backup information or links to supportive documents FIGURE 28-1 ____ 77. Figure 28-1 above shows an example of a ____. a. social networking site c. blog b. wiki d. podcast FIGURE 28-2 ____ 78. The site shown in Figure 28-2 above would be used to ____. a. store, organize, search, and manage a collection of links to Web pages b. provide users with frequently updated content c. share photos, music, or video with other users d. download multimedia files automatically through a subscription Case 28-1 Melody needs to do some research for a paper that is due in her continuing education class next week. She is searching on the Web for the information that she needs. ____ 79. Which online tool is Melody likely using if it contains a listing of over 35,000 free books on the Web? a. A links list c. An index b. A shared bookmark d. A podcast ____ 80. If Melody does not know how to spell a word that she is searching for, she could use a ____ search. a. title c. phrase b. Boolean d. wildcard Case 28-2 Chandler is writing a paper for an upcoming academic conference where he will present it. At the end of his paper, he cites the Internet resources that he used. ____ 81. If Chandler did not give proper credit for the information included in his paper, it could be considered ____. a. plagiarism c. libel ____ 82. ____ 83. ____ 84. ____ 85. ____ 86. ____ 87. ____ 88. ____ 89. ____ 90. ____ 91. ____ 92. ____ 93. ____ 94. ____ 95. ____ 96. b. a copyright violation d. public domain If Chandler included the complete URL and date of access, he would likely be citing which Internet resource? a. Online journal article c. Web site b. Online magazine article d. Any of the above How long ago were Google and PayPal founded? a. 3 years c. 10 years b. 5 years d. 20 years Technology provides ____ options such as e-mail, instant messaging, blogs, and social Web sites such as MySpace and Twitter. a. organization c. productivity b. communication d. evaluation Using ____, you can collaborate with other people all over the world who might otherwise never meet or know of each other. a. online communities c. ATMs b. e-commerce sites d. embedded computers ____ let you access electronic catalogs, select goods, store them in a digital cart or bag, and then check out by paying with a credit card or online account. a. Online learning sites c. Commercial Web sites b. Social Networking sites d. Government Web sites PIN stands for ____. a. pretty important number c. private information now b. personal identity name d. personal identification number ____ information is a security concern on the Internet. a. RFID card c. Credit card b. Frequent buyer card d. Library card A terminal used for electronic processing of payment transactions in a retail outlet is called a(n) ____. a. embedded computer c. global positioning system (GPS) b. Automated Teller Machine (ATM) d. point-of-sale (POS) system A(n) ____ device can match patterns stored in a database with a person’s iris, retina, voice, fingerprint, or handprint to confirm or deny someone’s identity. a. embedded c. GPS b. biometric d. robotic Junk mail sent to your e-mail address is called ____. a. spam c. digital cash b. ham d. encryption ____ describes transactions between businesses and consumers. a. Business-to-government (B2G) c. Business-to-business (B2B) b. Radio-frequency identification (RFID) d. Business-to-consumer (B2C) ____ tags are used in electronic toll collection and in mass transit passes. a. Point-of-sale (POS) c. Biometric b. Radio-frequency identification (RFID) d. Business-to-government (B2G) Blackboard, Moodle, and Angel are examples of ____. a. virtual high schools c. learning management systems b. social networking sites d. e-commerce sites ____ enable groups of people to interact online through a communication media rather than face-to-face. a. E-commerce sites c. Biometrics b. Robots d. Online communities Hurricanes, tornadoes, and other recent disasters have increased awareness of the need for ____. ____ 97. ____ 98. ____ 99. ____ 100. a. disaster recovery plans c. biometrics b. assistive technologies d. embedded computers Simulation analysts need which of the following skills? a. Logical thinker c. Good memory b. Good technical writer d. All of the above NASA’s Mars Rover Spirit is a(n) ____ device. a. biometric c. global positioning system (GPS) b. robot d. online learning ____ are integrated into virtually all medical equipment. a. E-commerce systems c. Personal computers b. Keyless entry systems d. Embedded computers When you use ____, no one can obtain information about you. a. credit cards c. ATM cards b. digital cash d. debit cards FIGURE 29-1 ____ 101. Figure 29-1 above displays what kind of Web site? a. Commercial c. Social networking b. Governmental d. Online learning FIGURE 29-2 ____ 102. What kind of computer would be in an appliance like the one shown in Figure 29-2 above? a. Robot c. Embedded computer b. Point-of-sale system d. Global positioning system Case 29-1 MacKenzie is excited about buying a new car. She is researching and comparing options and features of new cars using the Internet but she is not familiar with a lot of the new technologies and terminology. ____ 103. MacKenzie wants to be able to start her car with the press of a button. What kind of system can accomplish this? a. Global positioning system (GPS) c. Biometric device b. Keyless entry system d. Point-of-sale system ____ 104. MacKenzie wants a feature that can help her if she is in an accident. Which technology should she be looking for? a. Global positioning system (GPS) c. Biometrics b. Keyless entry system d. Robotics Case 29-2 Zach is relocating to another state for college. He knows he will miss his family and friends, but he’s hoping he will be able to stay in touch through the Internet. ____ 105. Zach’s new roommate told him about Facebook. What kind of site is it? a. Social networking c. E-commerce b. Online learning d. Electronic government ____ 106. Zach’s boss has agreed to let him continue working part-time as a webmaster even though he will be out of the state, using e-mail and the Internet to transfer files. What is this arrangement called? ____ 107. ____ 108. ____ 109. ____ 110. ____ 111. ____ 112. ____ 113. ____ 114. ____ 115. ____ 116. ____ 117. ____ 118. ____ 119. a. Encryption c. Online learning b. E-commerce d. Telecommuting What action might obstruct the air vents in your notebook computer and cause it to overheat? a. Leaving it in the same position on the desk for too long b. Using a cooling pad c. Setting it directly on your lap d. Plugging it into a grounded outlet What can result from making too many of the same motions over a long period of time? a. Browser hijacking c. Repetitive strain injury b. Brute force attacks d. Relaxed eye muscles It is estimated that ____ causes millions of dollars of damage each year, along with the theft of important and valuable data. a. hacking c. spying b. encryption d. eavesdropping One easy way to avoid data loss is to ____. a. plug the computer into a grounded outlet c. install a firewall b. save frequently d. turn on some form of encryption Surge protectors help protect computers from ____. a. hackers c. power spikes b. sniffers d. hard disk crashes External hard drives can be used to help ____. a. prevent computer hacking c. safeguard against software threats b. avoid data loss d. protect your system against spyware Often, you can inadvertently run a virus program by ____. a. installing a security update c. opening an e-mail message or attachment b. backing up data d. using a surge protector What is another term for brute force attacks? a. Browser hijacking c. Keylogger attacks b. Spyware attacks d. Dictionary attacks The goal of ____ is to collect information about the user, the user’s browsing habits, and other personal information. a. a sniffer c. a virus b. worms d. spyware Any information stored on a computer in an educational facility is the property of the ____. a. person using the computer c. person who created the information b. school d. none of the above TSL and SSL technology enables ____. a. data to be backed up securely b. companies to monitor unauthorized computer activity c. system administrators to restrict access to files d. sensitive information to be encrypted To make sure your e-commerce transactions are secure and to protect your private information, you should ____. a. use a secure browser c. keep personal information private b. check privacy policies d. all of the above When is it possible for the information that you submit on the Internet to be gathered by many persons and used for various situations? a. When you use a secure site c. When the data is encrypted ____ 120. ____ 121. ____ 122. ____ 123. ____ 124. b. Only if you don’t have a firewall d. Any time Which of the following is not true about spyware? a. It tracks your Web habits b. It can take over control of your computer c. It has redeeming qualities d. It can direct you to Web sites you have not chosen to visit When you use a computer in a public place, you should ____. a. verify that you have logged off c. use cookies to track your computer use b. install antivirus software d. use a code name If non-copyrighted information is published on a Web site, ____. a. it is true c. it is false b. it cannot be copied and used as your own d. the author is relieved of any responsibility What should you do before donating a computer? a. Remove the antivirus software c. Delete data from the hard drive b. Password-protect the operating system d. Turn off any encryption technologies Which of the following would be considered the strongest password? a. JeR3My c. SouTHWeST! b. tHund3r$t0rM d. #1fusion FIGURE 30-1 ____ 125. The message in Figure 30-1 above shows an example of ____. a. hacking c. sniffing b. phishing d. browser hijacking FIGURE 30-2 ____ 126. You could use the program shown in Figure 30-2 above to ____. a. protect your system against spyware c. configure a hardware firewall b. back up files d. password protect your wireless network Case 30-1 Nelson is a graphic designer who works long hours on his computer. He tries to take precautions to avoid chronic physical maladies such as eyestrain, back problems, and repetitive strain injuries. ____ 127. What kind of furniture should Nelson use to help adapt his equipment and his workplace to fit himself? a. Expensive c. Ergonomic b. Light-weight d. Soft ____ 128. What can Nelson do to help avoid or minimize eyestrain? a. Use a low-resolution monitor to increase visibility b. Stay in the same position so his eyes become more comfortable c. Avoid using extra lighting so the monitor is more easily visible d. Take regular breaks to allow the eye muscles to relax Case 30-2 Molly has just purchased a router and is setting up a wireless network in her home office. She wants to secure it properly. ____ 129. What is the first step Molly should take when setting up her wireless network? a. Download eavesdropping software c. Turn off the default encryption b. Change the default password d. Configure a hardware firewall ____ 130. If Molly does not properly secure her wireless network connection, what could happen if her neighbor uses her broadband connection? a. Her Internet access could be slower b. She could be charged additional costs c. She could be held responsible for any illegal activity d. Any of the above
© Copyright 2026 Paperzz