Chap 8- Internet part 1
38 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a primary advantage of using search engines like Google and Bing?

  • They make finding information effortless. (correct)
  • They can process financial transactions securely.
  • They promote social networking.
  • They provide protection against cybercrimes.
  • Which of the following is a disadvantage of the internet related to computer security?

  • Ease of online shopping.
  • Unlimited access to information.
  • Enhanced communication opportunities.
  • Vulnerability to viruses. (correct)
  • What does spyware do in relation to a user's information?

  • It secretly collects information about browsing habits. (correct)
  • It protects sensitive information from being stolen.
  • It compresses files for easier sharing.
  • It accelerates computer processing speeds.
  • Which internet threat involves malicious software intended to sabotage computer performance?

    <p>Viruses.</p> Signup and view all the answers

    How can e-banking be considered both an advantage and a potential threat of the internet?

    <p>It enables remote management of finances but exposes users to cyberattacks.</p> Signup and view all the answers

    What is one of the main uses of the internet in daily life?

    <p>Sending emails</p> Signup and view all the answers

    Which of the following best describes e-commerce?

    <p>Online buying and selling of goods and services</p> Signup and view all the answers

    What is a primary benefit of using Google Drive?

    <p>It enables data storage and sharing in the cloud</p> Signup and view all the answers

    How can individuals express their views online?

    <p>By writing blogs</p> Signup and view all the answers

    What is a key difference between a website and a blog?

    <p>Blogs are typically updated more frequently and are often personal in nature</p> Signup and view all the answers

    What is the first step to creating an email account?

    <p>Open the website <a href="http://www.gmail.com">www.gmail.com</a>.</p> Signup and view all the answers

    What is one requirement for a strong password?

    <p>It must include uppercase letters and special symbols.</p> Signup and view all the answers

    Which of the following steps is NOT involved in logging into an email account?

    <p>Fill out a registration form.</p> Signup and view all the answers

    What happened to Hotmail accounts?

    <p>They have been transferred to Outlook.com.</p> Signup and view all the answers

    What is the first step while composing and sending an email?

    <p>Click on the 'Compose' option.</p> Signup and view all the answers

    What is the primary function of viruses in the context of malware?

    <p>To embed in systems and corrupt or destroy data.</p> Signup and view all the answers

    Which type of malware is specifically designed to disguise itself as a harmless program?

    <p>Trojans</p> Signup and view all the answers

    What defines a worm compared to other types of malware?

    <p>It replicates itself without human intervention.</p> Signup and view all the answers

    Which of the following best describes the function of keyloggers?

    <p>They capture and record every keystroke made on a computer.</p> Signup and view all the answers

    What is the purpose of cookies in online contexts?

    <p>To store data for customizing websites for users.</p> Signup and view all the answers

    What is a primary reason for using email over conventional mail?

    <p>Email allows for instant messaging worldwide.</p> Signup and view all the answers

    Which of the following is considered inappropriate behavior when using email?

    <p>Reading someone's email without permission.</p> Signup and view all the answers

    What components make up an email address?

    <p>Username and domain name.</p> Signup and view all the answers

    What is one way to minimize the risks of cyber threats associated with email usage?

    <p>Avoid revealing sensitive information online.</p> Signup and view all the answers

    What happens to emails that are moved to the Trash folder in Gmail?

    <p>They are permanently deleted after 30 days.</p> Signup and view all the answers

    What should be done when wanting to share someone else's email content?

    <p>Seek permission before sharing the content.</p> Signup and view all the answers

    Which of the following statements about Google Drive is correct?

    <p>Users can store and share multiple file types.</p> Signup and view all the answers

    Which of the following actions is an example of spamming?

    <p>Flooding inboxes with unwanted advertisements.</p> Signup and view all the answers

    What is an example of a domain name in an email address?

    <p>gmail.com</p> Signup and view all the answers

    Which of the following actions will successfully log a user out of their Gmail account?

    <p>Clicking the Sign out button.</p> Signup and view all the answers

    In creating an email account, which information is least likely required?

    <p>Age and marital status.</p> Signup and view all the answers

    What type of messages does the Spam folder typically contain?

    <p>Junk mail and advertisements.</p> Signup and view all the answers

    What is the primary purpose of the Outbox in email services?

    <p>To hold outgoing or unsent messages.</p> Signup and view all the answers

    What is the purpose of the Bcc field in an email?

    <p>To send a copy of the email to hidden recipients.</p> Signup and view all the answers

    What happens if you try to attach a file larger than 25 MB?

    <p>A Google Drive link will be included instead.</p> Signup and view all the answers

    What information is typically found in the header of received emails in the Inbox?

    <p>Sender's name, subject, time, and date.</p> Signup and view all the answers

    Which of the following is the correct sequence to attach a file to an email?

    <p>Click 'Attach files' &gt; Click 'Open' &gt; Click 'Send'.</p> Signup and view all the answers

    What is the primary function of the Subject line in an email?

    <p>To provide a summary of the email's body.</p> Signup and view all the answers

    Study Notes

    Advantages and Disadvantages of the Internet

    • Information can be found easily with search engines
    • People with similar interests can communicate using social media and email
    • Online services such as banking and shopping can be done remotely
    • Information can be shared with many people at the same time
    • Sensitive information can be compromised by cyberattacks
    • Not all information found online is accurate
    • Computers connected to the internet are vulnerable to malware
    • Cybercrimes such as forgery and phishing are increasing

    Learning Outcomes for using the internet

    • Communicate over email
    • Explain online services like e-commerce
    • Share views and opinions using blogs
    • Store and share data using Google Drive
    • Create blogs and podcasts
    • Differentiate between a website and a blog

    The Internet

    • Is a global network of computers connected through telephone lines or cables
    • Allows for information sharing, data storage, and communication

    Email

    • Electronic mail sent through the internet
    • It functions like traditional mail but is more convenient and efficient
    • Emails can be sent to multiple recipients at once
    • Attachments such as photos, videos, and data can be added to emails

    Netiquette

    • A set of rules for behaving politely online
    • Includes appropriate behavior for emails, forums, blogs, and social media

    Malware

    • Malicious software that can harm computer systems
    • Includes viruses, trojans, worms, and ransomware
    • Viruses spread from computer to computer and can corrupt or delete data
    • Worms replicate automatically and spread quickly through networks
    • Trojans disguise themselves as harmless programs and can steal sensitive information

    Email Address

    • Users need to create a personal account
    • A unique email address is generated for each account
    • Consists of a username and a domain name separated by the @ symbol
    • Example: [email protected]

    Creating an Email Account

    • Users need to fill a registration form with a username and password
    • An email account is created if all details are filled correctly

    Logging into an Email Account

    • Users need to enter their username and password to access their account

    Composing and Sending an Email

    • Clicking "Compose" opens a window for writing an email
    • The email includes fields for the recipient's email address, subject, and message body
    • Users can attach files to emails

    Gmail Features

    • Inbox: Displays received emails
    • Outbox: Stores outgoing emails that are in the process of sending
    • Trash: Holds deleted emails
    • Spam: Stores unwanted messages

    Google Drive

    • A free service that allows users to store and share files online
    • Provides 15 GB of free storage
    • Users can access files from anywhere at any time
    • Supports various file types and enables collaboration on documents

    Protecting Yourself Online

    • Never disclose sensitive information like passwords or credit card numbers online
    • Be cautious of phishing scams and suspicious links
    • Use strong passwords and update security software regularly

    Fact Files

    • The first email was sent by Raymond Samuel Tomlinson
    • Hotmail was a popular email site that was merged with Outlook.com

    Gmail Features

    • Outbox: stores unsent messages
    • Trash: permanently deletes emails after 30 days
    • Spam: holds unwanted emails
    • Logout/Sign Out: allows users to exit their email account

    Additional Tips for Using the Internet Safely

    • Be respectful in online discussions
    • Do not read or forward other people's emails without permission
    • Cite sources when using information from the internet
    • Avoid sending spam
    • Use appropriate language

    Other Threats

    • Spamming: sending unwanted messages
    • Keyloggers: record every keystroke
    • Cookies: used by websites to track user behavior

    Fact Files

    • The first antivirus software was created by Ray Tomlinson in 1972
    • Gmail was created by Paul Buchheit

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Explore the multifaceted nature of the internet in this quiz. Learn about the ease of access to information and communication, as well as the potential risks such as cyberattacks and misinformation. Test your knowledge about online services and communication tools.

    More Like This

    Use Quizgecko on...
    Browser
    Browser