Search Header Logo
Tutorial 1  - Internet, Cloud and E-mail

Tutorial 1 - Internet, Cloud and E-mail

Assessment

Presentation

Other, Computers, Education

University

Practice Problem

Hard

Created by

TechMan TechMan

Used 1+ times

FREE Resource

13 Slides • 42 Questions

1

Tutorial 1:

Internet,

Cloud and

E-mail

By TechMan

media

2

Part A: Internet

media

3

Multiple Choice

1. What is the Internet? It is ________.

1

A. wireless network of computers at UKZN

2

B. global collection of different websites

3

C. globalized network of search engines such as Google and Yahoo

4

D. type of web browser

5

D. global network of computers and electronic devices

4

Multiple Choice

1. Which of the following can you do on the Internet (online)?

1

A. Pay bills and manage bank accounts

2

B. Watch movies and TV shows

3

C. Send and receive email and instant messages

4

D. Use search engines to find information

5

E. All of the above

5

Multiple Choice

3. A hyperlink on a Web page can _______.

1

A. open a graphics file

2

B. play a video file

3

C. play a sound file

4

D. open a text file

5

E. All of the above.

6

Multiple Choice

4. Which of the following is the part of the Internet that contains interconnected Web pages?

1

A. Microsoft web

2

B. Hypertext links

3

C. World Wide Web

4

D. Internet Explorer

5

E. Web browser

7

Open Ended

What is tabbed browsing and how does it work

8

  1. What is tabbed browsing and how does it work

Tabbed browsing allows more than one Web page to be open within the same browser window. Each Web page name appears on a separate tab. This method for organizing Web pages while browsing makes navigation between Web pages fast and simple.

It also minimizes the number of windows you need open on your desktop as you browse the Web. If you prefer, you can also open several Internet Explorer windows at the same time, each with its own series of Web pages accessible by tabs. You can easily change the default settings for tabbed browsing.

For example, you can have pages associated with one Web site open automatically in their own tabs. Alternatively, you can bypass the tab settings to open pages in their own windows.

9

Multiple Choice

Questions 6 and 7 are based on the narrative below:

You work as a location scout for a video production company in New York City and you need to find interesting locations for a corporate production shoot. In order to maintain your competitive edge for a breakthrough concept on your new movie, you need to browse in safety and discreetly so that no one can learn anything about the movie on which you are working.

6. What do you use to ensure that the browser will not store any data about your browsing session?

1

A. SmartScreen Filter

2

B. Internet Security

3

C. Digital Firewall

4

D. InPrivate Browsing

5

E. Digital Store

10

Multiple Choice

Questions 6 and 7 are based on the narrative below:

You work as a location scout for a video production company in New York City and you need to find interesting locations for a corporate production shoot. In order to maintain your competitive edge for a breakthrough concept on your new movie, you need to browse in safety and discreetly so that no one can learn anything about the movie on which you are working.

7. In order to find some information about the subject of your movie, you might need to visit some Web sites that are potentially unsafe. Which of the following should you use to be on the safe side?

1

A. SmartScreen Filter

2

B. Internet Security Firewire

3

C. Digital Firewire

4

D. InPrivate Browsing

5

E. Pop-up blocker

11

Multiple Choice

Questions 8 and 9 are based on the narrative below:

Jane is using the Web to do research for a term paper for her literature course. She has found that many of the pages she looks at have links to similar pages and before long has gotten lost in a maze of Web sites. She thinks that one way for her to keep better track is for her to understand the components of the URLs she is encountering.

8. In the URL http://www.nps.gov/yose/index.htm, what is the domain name?

1

A. http

2

B. nps

3

C. gov

4

D. yose

5

E. html

12

Multiple Choice

Questions 8 and 9 are based on the narrative below:

Jane is using the Web to do research for a term paper for her literature course. She has found that many of the pages she looks at have links to similar pages and before long has gotten lost in a maze of Web sites. She thinks that one way for her to keep better track is for her to understand the components of the URLs she is encountering.

9. In the URL http://www.nps.gov/yose/index.htm, what is the protocol standard?

1

A. http

2

B. nps

3

C. gov

4

D. yose

5

E. index.html

13

Multiple Choice

10. If you want to stop annoying windows from opening on your screen that advertise products you may not want, you need to enable the _______.

1

A. Pop-up Blocker

2

B. Spam filter

3

C. Phishing filter

4

D. Accelerator button

5

E. Phishing button

14

Multiple Choice

11. Which of the following is a Web search engine?

1

A. Internet Explorer

2

B. Linux

3

C. Google

4

D. Microsoft Edge

5

E. Mac

F. All of the Above

15

Multiple Choice

12. _______ is an illicit activity where people send you to fraudulent Web sites to gather your personal information for possible illegal purposes.

1

A. Spamming

2

B. Scamming

3

C. Browsing

4

D. Phishing

5

E. Pop-ups

16

Multiple Choice

13. A hyperlink, once clicked, on a Web page can _______.

1

A. open a graphics file

2

B. play a video file

C. play a sound file

3

D. open a text file

4

E. play an animation

5

F. All of the above.

17

Multiple Choice

14. An example of a Web browser program is _______.

1

A. Microsoft Web

2

B. Microsoft Edge

3

C. Yahoo!

4

D. AltaVista

5

E. Windows

F. Google

18

Multiple Choice

15. What are browser tabs mainly used for?

1

A. Viewing two webpages side-by-side

2

B. Selecting a Wi-Fi network to connect to

3

C. Opening multiple webpages in the same browser window

4

D. Ensuring that your personal information cannot be seen by hackers

5

E. Merging information from differing browsers

F. Browsing the Internet without worrying about security threats such as viruses and malware

19

Open Ended

16. Provide at least five different suggestions for how to protect your privacy online.

20

16. Provide at least five different suggestions for how to protect your privacy online.

Do not publish or post personal information, such as your home address, passwords, Social Security number, phone number, or account numbers.

Do not submit data to a social networking site until you’ve read its privacy policy and have made sure that you can remove your data when you no longer want to participate.

If asked for personal information, verify the Web site is legitimate, or make a phone call to confirm that you have to submit the information, and then confirm that the information will be securely transmitted and stored.

21

16. Provide at least five different suggestions for how to protect your privacy online.

Avoid financial transactions when using a public computer. Never click the save my password box and make sure you log out from password-protected sites.

Be wary of contacts you make in public chat rooms and on social networking sites.

Never use a password-protected Web site on a public computer that doesn't give you the option to save the password

22

Part B: Cloud

media

23

Open Ended

1. How do OneDrive and Office Web Apps work together?

24

1. How do OneDrive and Office Web Apps work together?

You can create a file in Office 2016 using Word, Excel, PowerPoint, or OneNote and then save it to your OneDrive. You can then open the Office file saved to OneDrive and edit it using your Office 2016 apps.

If you do not have Office 2016 installed on the computer you are using, you can edit the file using your Web browser and the corresponding Office Web App.

You can also use an Office Web App to create a new file, which is saved automatically to OneDrive while you work and you can download a file created with an Office Web App and work with the file in the full version of the corresponding Office application.

25

Open Ended

2. Discuss how to co-author documents using OneDrive.

26

2. Discuss how to co-author documents using OneDrive.​

You can work on a document, presentation, or workbook simultaneously with a partner. First, save the file to your OneDrive. Click the FILE tab, click Share, then click Invite People. Enter the email addresses of the people you want to work on the file with you and then click Share.

Once your partner has received, opened, and started editing the document, you can start working together. You will see a notification in the status bar that someone is editing the document with you.

When you click the notification, you can see the name of the other user and their picture if they have one attached to their Windows account. When your partner saves, you’ll see his or changes in green shading which goes away the next time you save.

27

Multiple Choice

3. If a file is stored in the cloud but you want to copy it to your computer, you will need to _______ it.

1

A. upload

2

B. print

3

C. bookmark

4

D. download

5

E. pin

28

Multiple Choice

4. The ________ is mass storage on remote computers.

1

A. USB

2

B. cloud

3

C. thumb drive

4

D. flash device

5

E. H:/ Drive

F. UKZN drive

29

Multiple Choice

5. Gmail and outlook.com are ______, which means that you do not need a program installed on your computer to run them, you just need a web browser to access them

1

A. Wirelessly-based

2

B. cloud-based

3

C. discrete-based

4

D. distributed

5

E. Windows apps

F. Web browser apps

30

Multiple Choice

6. The term _______ means that when you add, change, or delete files on one computer, the same files on your other devices are also updated.6. The term _______ means that when you add, change, or delete files on one computer, the same files on your other devices are also updated.

1

A. linked

2

B. integrated

3

C. embedded

4

D. synced

5

E. windows snap

31

Multiple Choice

7. Office Web Apps are versions of all of the following EXCEPT ____.

1

A. Access

2

B. Excel

3

C. OneNote

4

D. PowerPoint

5

E. Word

F. Excel

32

Multiple Choice

8. A(n) _______ is a scaled-down version of an Office program that is accessible on the cloud using a web browser.

1

A. applet

2

B. Office 2020

3

C. Sky app

4

D. Web App

5

E. accessory app

F. Windows app

33

Multiple Choice

9. The term _______ refers to the process of working with files and apps online.

1

A. World Wide Web (WWW)

B. Internet

2

B. Desktop Computing 

3

C. Website

D. Web browser

4

E. Cloud Computing

5

F. Mobile Computing

34

Multiple Choice

10. _______ is an online storage and file sharing service from Microsoft.

1

A. OneNote

B. Dropbox

2

C. Web drive

3

D. Google Drive

4

E. OneDrive

5

F. USB drive

35

Part C:

Emails

media

36

Multiple Choice

1. Identify the correctly written email address below.

1

A. sipho@gmail

2
3

C. sipho at gmail dot com

37

Multiple Choice

2. The _______ is a brief description of what the email is about.

1

A. forward

2

B. subject

3

C. attachment

D. recipient

4

E. signature

5

F. Bcc field

G. Cc field

38

Multiple Choice

3. The benefits of using email include all the following EXCEPT ____.

1

A. you can communicate from a remote place

2

B. you can send graphics file, text files, photos and video

3

C. you can send confidential information and files without worrying about privacy issues

4

D. you will have a record of messages sent

5

E. you can download attached files from your mailbox

39

Multiple Choice

4. The last part of an email address is the ______.

1

A. domain name

2

B. top-level domain

3

C. username

4

D. prefix address

5

E. protocol

40

Multiple Choice

5. To send a message so that the recipients can see who else received the message you enter the addresses in the ______ text box.

1

A. Cc

2

B. Bcc

3

C. Forward

4

D. Subject

5

E. Reply

41

Multiple Choice

6. The message _______ contains basic information about the message, such as the recipients, date and time stamp, and the subject.

1

A. header

2

B. body

3

C. composition

4

D. address

5

E. attachment

42

Multiple Choice

7. Which of the following features or fields can an email have? Select all that apply.

1

A. Recipients

B. Body

2

C. Attachments

3

D. Bcc

E. Cc

4

F. Subject

5

G. All of the above

43

Multiple Choice

8. If you want to share an email you have received, you can _______ it.

1

A. forward

2

B. reply

3

C. archive

4

D. Google

5

E. Bcc

F. Cc

44

Multiple Choice

9. In the context of email technology, the term "phishing" refers to _______.

1

A. the process of creating a new email address

2

B. an email that tries to steal personal information

3

C. recovering a deleted email from the trash can

4

D. accidentally sending an email to the wrong recipient

5

E. the process of merging email messages from different address addresses

F. retrieving email from the junk folder

45

Multiple Choice

10. _______ is another term for junk email.

1

A. Malware

2

B. Big attachment

C. Bcc

3

D. Spam

4

E. Virus email

F. Dirty email

5

G. Recycle bin email

46

Fill in the Blanks

Type answer...

47

Multiple Choice

11. Names entered in the Bcc text box of a message window are not visible to other message recipients.

1

A. True

2

B. False

48

Multiple Choice

12. Most email programs allow you to set up a(n) ______ response if you are not going to be able to get your email for a specified period of time.

1

A. after delay

2

B. addressable

3

C. automatic

4

D. answering

5

E. reminder

F. personal assistant

49

Multiple Choice

13. _______ your email is an easy way to categorize it.

1

A. Coloring

2

B. Flagging

3

C. Filing

D. Reading

4

E. Spamming

F. Phishing

5

G. Renaming

50

Multiple Choice

14. One advantage of using a distribution list is that  it ________.

1

A. tracks files that you sent to your contacts

2

B. automatically forwards your emails to your contacts

3

C. contains all of your contacts’ email addresses

4

D. allows you to send emails to a group instead of individually

5

E. automatically alerts you whenever new messages arrive in your Inbox.

51

Multiple Choice

15. Which is NOT labelled a good email practice?

1

A. Send only work related email

2

B. Be considerate

3

C. Think before forwarding

4

D. Limit emoticons

52

16. Discuss ways in which you should make sure to control your email messages.

When you communicate with email, take extra care in what you say and how you say it. The recipient of an email message cannot see body language or hear the tone of voice to interpret the meaning of the message.

For example, using all capital letters in the text of a message is the email equivalent of shouting and is not appropriate. Carefully consider the content of a message before you send it, and don’t send confidential or sensitive material.

Remember, once you send a message, you might not be able to prevent it from being delivered. Email is not private; you cannot control who might read the message once it has been sent. Do not write anything in an email that you would not write on a postcard that you send through the postal service.

53

16. Discuss ways in which you should make sure to control your email messages.

If your email account is a company account, be sure you know the policy on whether or not your company permits the sending of personal messages.

All messages you send through an employer’s email system legally belong to the company for which you work, so don’t assume that your messages are private.​

54

17.  Briefly describe the functions/features/use of these Outlook modules:

A. Tasks

B. People/Contacts

C. Calendar

D. Mail

55

media

P​lease leave your student numbe chat before exit the session

The END

Tutorial 1:

Internet,

Cloud and

E-mail

By TechMan

media

Show answer

Auto Play

Slide 1 / 55

SLIDE