Search Header Logo

Exploring the Internet and Networking

Authored by James Blonde

Information Technology (IT)

12th Grade

Used 1+ times

Exploring the Internet and Networking
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What is the Internet and how does it function?

The Internet is a physical device that connects to the power supply.

The Internet is a type of software that runs on a single computer.

The Internet is a global network of interconnected computers that communicate using standardized protocols.

The Internet is a local network used only within a single building.

2.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Explain the role of URLs in navigating websites.

URLs are automatically generated by web browsers.

URLs are essential for navigating websites as they provide the specific addresses needed to access web resources.

URLs are irrelevant for website navigation.

URLs are only used for bookmarking pages.

3.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What are hyperlinks and how do they enhance web navigation?

Hyperlinks are clickable links that enhance web navigation by connecting users to related content easily.

Hyperlinks are buttons that require a password to access.

Hyperlinks are used to store data on a server.

Hyperlinks are images that display when a page loads.

4.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

List three safe browsing practices to follow online.

Ignore all security warnings from your browser.

Use strong, unique passwords for different accounts. Enable two-factor authentication wherever possible. Be cautious of suspicious links and emails to avoid phishing attacks.

Use the same password for all your accounts.

Share your passwords with friends for convenience.

5.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What is phishing and how can it be avoided?

Phishing is a cyber attack that tricks individuals into revealing sensitive information. It can be avoided by being cautious with communications, verifying senders, and using security software.

Phishing can be avoided by ignoring all emails from unknown senders.

Phishing is a method of securing sensitive information online.

Phishing is a type of software that protects against viruses.

6.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Define malware and its potential impact on users.

Malware is software that only affects mobile devices and has no impact on computers.

Malware is a security feature that protects users from online threats.

Malware is malicious software that can harm users by causing data loss, identity theft, and financial damage.

Malware is a type of hardware that improves computer performance.

7.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What does HTTPS stand for and why is it important?

HyperText Transfer Protocol Standard

HyperText Transfer Protocol Secure

HyperText Transfer Protocol Securely

HyperText Transfer Protocol

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?