
Tutorial 1 - Internet, Cloud and E-mail
Presentation
•
Other, Computers, Education
•
University
•
Practice Problem
•
Hard
TechMan TechMan
Used 1+ times
FREE Resource
13 Slides • 42 Questions
1
Tutorial 1:
Internet,
Cloud and
By TechMan
2
Part A: Internet
3
Multiple Choice
1. What is the Internet? It is ________.
A. wireless network of computers at UKZN
B. global collection of different websites
C. globalized network of search engines such as Google and Yahoo
D. type of web browser
D. global network of computers and electronic devices
4
Multiple Choice
1. Which of the following can you do on the Internet (online)?
A. Pay bills and manage bank accounts
B. Watch movies and TV shows
C. Send and receive email and instant messages
D. Use search engines to find information
E. All of the above
5
Multiple Choice
3. A hyperlink on a Web page can _______.
A. open a graphics file
B. play a video file
C. play a sound file
D. open a text file
E. All of the above.
6
Multiple Choice
4. Which of the following is the part of the Internet that contains interconnected Web pages?
A. Microsoft web
B. Hypertext links
C. World Wide Web
D. Internet Explorer
E. Web browser
7
Open Ended
What is tabbed browsing and how does it work
8
What is tabbed browsing and how does it work
Tabbed browsing allows more than one Web page to be open within the same browser window. Each Web page name appears on a separate tab. This method for organizing Web pages while browsing makes navigation between Web pages fast and simple.
It also minimizes the number of windows you need open on your desktop as you browse the Web. If you prefer, you can also open several Internet Explorer windows at the same time, each with its own series of Web pages accessible by tabs. You can easily change the default settings for tabbed browsing.
For example, you can have pages associated with one Web site open automatically in their own tabs. Alternatively, you can bypass the tab settings to open pages in their own windows.
9
Multiple Choice
Questions 6 and 7 are based on the narrative below:
You work as a location scout for a video production company in New York City and you need to find interesting locations for a corporate production shoot. In order to maintain your competitive edge for a breakthrough concept on your new movie, you need to browse in safety and discreetly so that no one can learn anything about the movie on which you are working.
6. What do you use to ensure that the browser will not store any data about your browsing session?
A. SmartScreen Filter
B. Internet Security
C. Digital Firewall
D. InPrivate Browsing
E. Digital Store
10
Multiple Choice
Questions 6 and 7 are based on the narrative below:
You work as a location scout for a video production company in New York City and you need to find interesting locations for a corporate production shoot. In order to maintain your competitive edge for a breakthrough concept on your new movie, you need to browse in safety and discreetly so that no one can learn anything about the movie on which you are working.
7. In order to find some information about the subject of your movie, you might need to visit some Web sites that are potentially unsafe. Which of the following should you use to be on the safe side?
A. SmartScreen Filter
B. Internet Security Firewire
C. Digital Firewire
D. InPrivate Browsing
E. Pop-up blocker
11
Multiple Choice
Questions 8 and 9 are based on the narrative below:
Jane is using the Web to do research for a term paper for her literature course. She has found that many of the pages she looks at have links to similar pages and before long has gotten lost in a maze of Web sites. She thinks that one way for her to keep better track is for her to understand the components of the URLs she is encountering.
8. In the URL http://www.nps.gov/yose/index.htm, what is the domain name?
A. http
B. nps
C. gov
D. yose
E. html
12
Multiple Choice
Questions 8 and 9 are based on the narrative below:
Jane is using the Web to do research for a term paper for her literature course. She has found that many of the pages she looks at have links to similar pages and before long has gotten lost in a maze of Web sites. She thinks that one way for her to keep better track is for her to understand the components of the URLs she is encountering.
9. In the URL http://www.nps.gov/yose/index.htm, what is the protocol standard?
A. http
B. nps
C. gov
D. yose
E. index.html
13
Multiple Choice
10. If you want to stop annoying windows from opening on your screen that advertise products you may not want, you need to enable the _______.
A. Pop-up Blocker
B. Spam filter
C. Phishing filter
D. Accelerator button
E. Phishing button
14
Multiple Choice
11. Which of the following is a Web search engine?
A. Internet Explorer
B. Linux
C. Google
D. Microsoft Edge
E. Mac
F. All of the Above
15
Multiple Choice
12. _______ is an illicit activity where people send you to fraudulent Web sites to gather your personal information for possible illegal purposes.
A. Spamming
B. Scamming
C. Browsing
D. Phishing
E. Pop-ups
16
Multiple Choice
13. A hyperlink, once clicked, on a Web page can _______.
A. open a graphics file
B. play a video file
C. play a sound file
D. open a text file
E. play an animation
F. All of the above.
17
Multiple Choice
14. An example of a Web browser program is _______.
A. Microsoft Web
B. Microsoft Edge
C. Yahoo!
D. AltaVista
E. Windows
F. Google
18
Multiple Choice
15. What are browser tabs mainly used for?
A. Viewing two webpages side-by-side
B. Selecting a Wi-Fi network to connect to
C. Opening multiple webpages in the same browser window
D. Ensuring that your personal information cannot be seen by hackers
E. Merging information from differing browsers
F. Browsing the Internet without worrying about security threats such as viruses and malware
19
Open Ended
16. Provide at least five different suggestions for how to protect your privacy online.
20
16. Provide at least five different suggestions for how to protect your privacy online.
Do not publish or post personal information, such as your home address, passwords, Social Security number, phone number, or account numbers.
Do not submit data to a social networking site until you’ve read its privacy policy and have made sure that you can remove your data when you no longer want to participate.
If asked for personal information, verify the Web site is legitimate, or make a phone call to confirm that you have to submit the information, and then confirm that the information will be securely transmitted and stored.
21
16. Provide at least five different suggestions for how to protect your privacy online.
Avoid financial transactions when using a public computer. Never click the save my password box and make sure you log out from password-protected sites.
Be wary of contacts you make in public chat rooms and on social networking sites.
Never use a password-protected Web site on a public computer that doesn't give you the option to save the password
22
Part B: Cloud
23
Open Ended
1. How do OneDrive and Office Web Apps work together?
24
1. How do OneDrive and Office Web Apps work together?
You can create a file in Office 2016 using Word, Excel, PowerPoint, or OneNote and then save it to your OneDrive. You can then open the Office file saved to OneDrive and edit it using your Office 2016 apps.
If you do not have Office 2016 installed on the computer you are using, you can edit the file using your Web browser and the corresponding Office Web App.
You can also use an Office Web App to create a new file, which is saved automatically to OneDrive while you work and you can download a file created with an Office Web App and work with the file in the full version of the corresponding Office application.
25
Open Ended
2. Discuss how to co-author documents using OneDrive.
26
2. Discuss how to co-author documents using OneDrive.
You can work on a document, presentation, or workbook simultaneously with a partner. First, save the file to your OneDrive. Click the FILE tab, click Share, then click Invite People. Enter the email addresses of the people you want to work on the file with you and then click Share.
Once your partner has received, opened, and started editing the document, you can start working together. You will see a notification in the status bar that someone is editing the document with you.
When you click the notification, you can see the name of the other user and their picture if they have one attached to their Windows account. When your partner saves, you’ll see his or changes in green shading which goes away the next time you save.
27
Multiple Choice
3. If a file is stored in the cloud but you want to copy it to your computer, you will need to _______ it.
A. upload
B. print
C. bookmark
D. download
E. pin
28
Multiple Choice
4. The ________ is mass storage on remote computers.
A. USB
B. cloud
C. thumb drive
D. flash device
E. H:/ Drive
F. UKZN drive
29
Multiple Choice
5. Gmail and outlook.com are ______, which means that you do not need a program installed on your computer to run them, you just need a web browser to access them
A. Wirelessly-based
B. cloud-based
C. discrete-based
D. distributed
E. Windows apps
F. Web browser apps
30
Multiple Choice
6. The term _______ means that when you add, change, or delete files on one computer, the same files on your other devices are also updated.6. The term _______ means that when you add, change, or delete files on one computer, the same files on your other devices are also updated.
A. linked
B. integrated
C. embedded
D. synced
E. windows snap
31
Multiple Choice
7. Office Web Apps are versions of all of the following EXCEPT ____.
A. Access
B. Excel
C. OneNote
D. PowerPoint
E. Word
F. Excel
32
Multiple Choice
8. A(n) _______ is a scaled-down version of an Office program that is accessible on the cloud using a web browser.
A. applet
B. Office 2020
C. Sky app
D. Web App
E. accessory app
F. Windows app
33
Multiple Choice
9. The term _______ refers to the process of working with files and apps online.
A. World Wide Web (WWW)
B. Internet
B. Desktop Computing
C. Website
D. Web browser
E. Cloud Computing
F. Mobile Computing
34
Multiple Choice
10. _______ is an online storage and file sharing service from Microsoft.
A. OneNote
B. Dropbox
C. Web drive
D. Google Drive
E. OneDrive
F. USB drive
35
Part C:
Emails
36
Multiple Choice
1. Identify the correctly written email address below.
A. sipho@gmail
C. sipho at gmail dot com
37
Multiple Choice
2. The _______ is a brief description of what the email is about.
A. forward
B. subject
C. attachment
D. recipient
E. signature
F. Bcc field
G. Cc field
38
Multiple Choice
3. The benefits of using email include all the following EXCEPT ____.
A. you can communicate from a remote place
B. you can send graphics file, text files, photos and video
C. you can send confidential information and files without worrying about privacy issues
D. you will have a record of messages sent
E. you can download attached files from your mailbox
39
Multiple Choice
4. The last part of an email address is the ______.
A. domain name
B. top-level domain
C. username
D. prefix address
E. protocol
40
Multiple Choice
5. To send a message so that the recipients can see who else received the message you enter the addresses in the ______ text box.
A. Cc
B. Bcc
C. Forward
D. Subject
E. Reply
41
Multiple Choice
6. The message _______ contains basic information about the message, such as the recipients, date and time stamp, and the subject.
A. header
B. body
C. composition
D. address
E. attachment
42
Multiple Choice
7. Which of the following features or fields can an email have? Select all that apply.
A. Recipients
B. Body
C. Attachments
D. Bcc
E. Cc
F. Subject
G. All of the above
43
Multiple Choice
8. If you want to share an email you have received, you can _______ it.
A. forward
B. reply
C. archive
D. Google
E. Bcc
F. Cc
44
Multiple Choice
9. In the context of email technology, the term "phishing" refers to _______.
A. the process of creating a new email address
B. an email that tries to steal personal information
C. recovering a deleted email from the trash can
D. accidentally sending an email to the wrong recipient
E. the process of merging email messages from different address addresses
F. retrieving email from the junk folder
45
Multiple Choice
10. _______ is another term for junk email.
A. Malware
B. Big attachment
C. Bcc
D. Spam
E. Virus email
F. Dirty email
G. Recycle bin email
46
Fill in the Blanks
Type answer...
47
Multiple Choice
11. Names entered in the Bcc text box of a message window are not visible to other message recipients.
A. True
B. False
48
Multiple Choice
12. Most email programs allow you to set up a(n) ______ response if you are not going to be able to get your email for a specified period of time.
A. after delay
B. addressable
C. automatic
D. answering
E. reminder
F. personal assistant
49
Multiple Choice
13. _______ your email is an easy way to categorize it.
A. Coloring
B. Flagging
C. Filing
D. Reading
E. Spamming
F. Phishing
G. Renaming
50
Multiple Choice
14. One advantage of using a distribution list is that it ________.
A. tracks files that you sent to your contacts
B. automatically forwards your emails to your contacts
C. contains all of your contacts’ email addresses
D. allows you to send emails to a group instead of individually
E. automatically alerts you whenever new messages arrive in your Inbox.
51
Multiple Choice
15. Which is NOT labelled a good email practice?
A. Send only work related email
B. Be considerate
C. Think before forwarding
D. Limit emoticons
52
16. Discuss ways in which you should make sure to control your email messages.
When you communicate with email, take extra care in what you say and how you say it. The recipient of an email message cannot see body language or hear the tone of voice to interpret the meaning of the message.
For example, using all capital letters in the text of a message is the email equivalent of shouting and is not appropriate. Carefully consider the content of a message before you send it, and don’t send confidential or sensitive material.
Remember, once you send a message, you might not be able to prevent it from being delivered. Email is not private; you cannot control who might read the message once it has been sent. Do not write anything in an email that you would not write on a postcard that you send through the postal service.
53
16. Discuss ways in which you should make sure to control your email messages.
If your email account is a company account, be sure you know the policy on whether or not your company permits the sending of personal messages.
All messages you send through an employer’s email system legally belong to the company for which you work, so don’t assume that your messages are private.
54
17. Briefly describe the functions/features/use of these Outlook modules:
A. Tasks
B. People/Contacts
C. Calendar
D. Mail
55
Please leave your student numbe chat before exit the session
The END
Tutorial 1:
Internet,
Cloud and
By TechMan
Show answer
Auto Play
Slide 1 / 55
SLIDE
Similar Resources on Wayground
50 questions
APA Formatting
Presentation
•
University
49 questions
Food and Beverages
Presentation
•
University
49 questions
Diseño de Ambientes Virtuales
Presentation
•
University
48 questions
PKn Pertemuan 1
Presentation
•
University
52 questions
DSF - 07 Digital Forensics
Presentation
•
University
50 questions
Chapter 7 - Urinary System
Presentation
•
University
52 questions
MODEL-MODEL PTK
Presentation
•
University
50 questions
¡RULETA TDA!
Presentation
•
University
Popular Resources on Wayground
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
6 questions
Marshmallow Farm Quiz
Quiz
•
2nd - 5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
19 questions
Classifying Quadrilaterals
Quiz
•
3rd Grade
12 questions
What makes Nebraska's government unique?
Quiz
•
4th - 5th Grade