0% found this document useful (0 votes)
1K views7 pages

THE INTERNET & THE WORLD WIDE WEB - Chapter Review Questions and Answers

This document contains a self-test with multiple choice and true/false questions about internet terminology and concepts. It covers topics such as data transmission speeds, internet connections, web browsers, servers, URLs, cookies, spam, and security risks online. The self-test is designed to assess a student's understanding of foundational internet technology terms and how the internet works at a basic level.

Uploaded by

evangiebalunsat9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views7 pages

THE INTERNET & THE WORLD WIDE WEB - Chapter Review Questions and Answers

This document contains a self-test with multiple choice and true/false questions about internet terminology and concepts. It covers topics such as data transmission speeds, internet connections, web browsers, servers, URLs, cookies, spam, and security risks online. The self-test is designed to assess a student's understanding of foundational internet technology terms and how the internet works at a basic level.

Uploaded by

evangiebalunsat9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Kenneth L.

Estanislao

BSAIS 3-B THE INTERNET WORLD & THE WORLD WIDE WEB Page: 1

Self-Test Questions

1. Today’s data transmission speeds are measured in __Bps_, Kbps, __Mbps__, and _Gps__ .

2. A(n) _Cable__, __Modern__ connects a personal computer to a cable-TV system that offers an internet

connection.

3. A space station that transmits data as microwaves is a __Satellite__ .

4. A company that connects you through your communications line to its server, which connects you too the

internet, is a(n) _Connection__ .

5. A rectangular area on the computer screen that contains a document or displays an activity is called a(n)

__Window____ .

6. __Note pad_ is writing an online message that uses derogatory, obscene, or inappropriate language.

7. A(n) __Web browser__ is software that enables users to view web pages and to jump from one page to another.

8. A computer with a domain name is called a(n)__Server__.

9. __HTTP___ comprises the communications rules that allow browsers to connect with web servers.

10. A(n) __Plug-in___ is a program that adds a specific feature to a browser, allowing it to play or view certain files.

11. Unsolicited email in the form of advertising or chain letters is known as _Spam__ .

12. The expression of how much data—text, voice, video, and so on—can be sent through a communications

channel in a given amount of time is known as __Recorder___.

13. A(n) _URL__ is a string of characters that points to a specific piece of information somewhere on the web.

14. Some websites may leave files on your hard disk that contain information such as your name, password, and

preferences; they are called _Cookies__.

15. Using trusted institutional names to elicit confidential information is called _Phishing__ .
Kenneth L. Estanislao

BSAIS 3-B THE INTERNET WORLD & THE WORLD WIDE WEB Page: 2

16. The kind of spyware that can record each character you type and transmit that information to someone else on

the internet, making it possible for strangers to learn your passwords and other information, is called. Keyloggers.

Multiple-Choice Questions

B 1. Kbps means how many bits per second?

a. 1 billion

b. 1 thousand

c. 1 million

d. 1 hundred

e. 1 trillion

C 2. A location on the internet is called a

a. network.

b. user ID.

c. domain.

d. browser.

e. web.

D 3. In the email address [email protected], Kim_ Lee is the

a. domain.

b. URL.

c. site.

d. user ID.

e. location.

C 4. Which of the following is not one of the four components of a URL?

a. web protocol

b. name of the web server

c. name of the browser

d. name of the directory on the web server

e. name of the file within the directory


Kenneth L. Estanislao

BSAIS 3-B THE INTERNET WORLD & THE WORLD WIDE WEB Page: 3

E 5. Which of the following is the fastest method of data transmission?

a. ISDN

b. DSL

c. modem

d. T1 line

e. cable modem

A 6. Which of the following is not a netiquette rule?

a. Consult FAQs.

b. Flame only when necessary.

c. Don’t shout.

d. Avoid huge file attachments.

e. Avoid sloppiness and errors.

C 7. Which protocol is used to retrieve email messages from the server to your computer?

a. HTTP (Hyper Text Transfer Protocol)

b. SMTP (Simple Mail Transfer Protocol)

c. POP3 (Post Office Protocol version 3)

d. POP (point of presence)

E 8. Who owns the internet?

a. Microsoft

b. IBM

c. Apple

d. U.S. government

e. No one owns the internet; the components that make up the Internet are owned and shared by

thousands of public and private entities.

A 9. Each time you connect to your ISP, it will assign your computer a new address called a(n)

a. domain.

b. IP address.

c. plug-in.
Kenneth L. Estanislao

BSAIS 3-B THE INTERNET WORLD & THE WORLD WIDE WEB Page: 4

d. POP.

e. URL (Universal Resource Locator).

B 10. ISPs that don’t run their own backbones connect to an internet backbone through a

a. NAP network access point.

b. web portal.

c. web browser.

d. URL.

e. TCP/IP.

D 11. Which of the following is not a protocol?

a. TCP/IP

b. IE

c. HTTP

d. SMTP

B 12. The sending of phony email that pretends to be from a credit-card company or bank, luring you to a
website that attempts to obtain confidential information from you, is called

a. spoofing.

b. phishing.

c. spamming.

d. keylogging.

e. cookies.
Kenneth L. Estanislao

BSAIS 3-B THE INTERNET WORLD & THE WORLD WIDE WEB Page: 5

True/False Questions

T F 1. POP3 is used for sending email, and SMTP is used for retrieving email.

T F 2. A dial-up modem is an ISP (internet service provider).

T F 3. Replying to spam email messages with the statement “remove” will always get spammers to stop
sending you unsolicited email.

T F 4. All computer communications use the same bandwidth.

T F 5. A T1 line is the slowest but cheapest form of internet connection.

T F 6. A dynamic IP address gives you faster internet access than a static IP address does.

T F 7. A bookmark lets you return to a favorite website quickly.

T F 8. Radio buttons are used for listening to radio stations on the internet.

T F 9. Spoofing means using fake email sender names.

T F 10. Hypertext refers to text presented with very large letters.

Stage 2 Learning:

Short-Answer Questions

1. Name three methods of data transmission that are faster than a regular modem connection.
Ans: DSL, cable modem, satellite, T1/T3, radio waves

2. What does log on mean?


Ans: Go through the procedures to begin using a computer, database, or system.

3. What is netiquette, and why is it important?


Ans: Because online communication is typically non-verbal.

4. Briefly define bandwidth.


Ans: Describes the maximum data transfer rate of a network or Internet connection.

5. Many web documents are “linked.” What does that mean?


Ans: You have access to a system called hypertext that allows you to link words or phrases in one
document to another that is located at a different location. Underlining or highlighting a word or phrase
signifies a link. The user gets directed to a different document or website if they click the link.

6. Compare and contrast a cable modem service to a DSL service.


Ans: DSL offers users a choice of speeds ranging from 128 Kbps to 3 Mbps while Cable modem download
speeds are typically up to 2 times faster than DSL.
Kenneth L. Estanislao

BSAIS 3-B THE INTERNET WORLD & THE WORLD WIDE WEB Page: 6

7. Explain the basics of how the internet works.


Ans: By utilizing a network for packet routing that adheres to Transport Control Protocol (TCP) and
Internet Protocol (IP) (TCP)

8. What expanded functions does IMAP (Internet Message Access Protocol) have?
Ans: offers expanded functions compared to POP3 (Post Office Protocol version 3) for retrieving email.

9. Briefly explain what TCP/IP does.


Ans: The packets are reassembled in the proper order using TCP after being sent over the internet
through IP to their intended destination.

10. Why was ICANN established?


Ans: To control the use of human-friendly internet domain names (.com,.org, and.NET), which hide IP
addresses and specify the nature of websites.

11. What’s the difference between a dynamic IP address and a static IP address?
Ans: To control the use of human-friendly internet domain names (.com,.org, and.NET), which hide IP
addresses and specify the nature of websites.

12. Explain what a blog is.


Ans: Internet Journal

13. State your answer to a person who asks you the question “Who owns the internet?”
Ans: Nobody owns the internet; we the user of the internet owns it our self.

14. What is B2B commerce?


Ans: Electronic sale or exchange of goods and services directly between, cutting out traditional
intermediaries

15. List and briefly describe three kinds of spyware.


Ans: Adware- Is a type of software that is responsible for displaying advertisements to the users on their
computers.
Browser Hijacker- are the ones that alter the user browser settings. This is carried out without the user’s
knowledge.
Key logger- is nothing but a program that records the keystrokes typed by the users on the computer.

You might also like