Chap 8- Internet part 1
38 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a primary advantage of using search engines like Google and Bing?

  • They make finding information effortless. (correct)
  • They can process financial transactions securely.
  • They promote social networking.
  • They provide protection against cybercrimes.

Which of the following is a disadvantage of the internet related to computer security?

  • Ease of online shopping.
  • Unlimited access to information.
  • Enhanced communication opportunities.
  • Vulnerability to viruses. (correct)

What does spyware do in relation to a user's information?

  • It secretly collects information about browsing habits. (correct)
  • It protects sensitive information from being stolen.
  • It compresses files for easier sharing.
  • It accelerates computer processing speeds.

Which internet threat involves malicious software intended to sabotage computer performance?

<p>Viruses. (C)</p> Signup and view all the answers

How can e-banking be considered both an advantage and a potential threat of the internet?

<p>It enables remote management of finances but exposes users to cyberattacks. (B)</p> Signup and view all the answers

What is one of the main uses of the internet in daily life?

<p>Sending emails (C)</p> Signup and view all the answers

Which of the following best describes e-commerce?

<p>Online buying and selling of goods and services (D)</p> Signup and view all the answers

What is a primary benefit of using Google Drive?

<p>It enables data storage and sharing in the cloud (C)</p> Signup and view all the answers

How can individuals express their views online?

<p>By writing blogs (D)</p> Signup and view all the answers

What is a key difference between a website and a blog?

<p>Blogs are typically updated more frequently and are often personal in nature (A)</p> Signup and view all the answers

What is the first step to creating an email account?

<p>Open the website <a href="http://www.gmail.com">www.gmail.com</a>. (B)</p> Signup and view all the answers

What is one requirement for a strong password?

<p>It must include uppercase letters and special symbols. (B)</p> Signup and view all the answers

Which of the following steps is NOT involved in logging into an email account?

<p>Fill out a registration form. (A)</p> Signup and view all the answers

What happened to Hotmail accounts?

<p>They have been transferred to Outlook.com. (A)</p> Signup and view all the answers

What is the first step while composing and sending an email?

<p>Click on the 'Compose' option. (C)</p> Signup and view all the answers

What is the primary function of viruses in the context of malware?

<p>To embed in systems and corrupt or destroy data. (A)</p> Signup and view all the answers

Which type of malware is specifically designed to disguise itself as a harmless program?

<p>Trojans (C)</p> Signup and view all the answers

What defines a worm compared to other types of malware?

<p>It replicates itself without human intervention. (C)</p> Signup and view all the answers

Which of the following best describes the function of keyloggers?

<p>They capture and record every keystroke made on a computer. (D)</p> Signup and view all the answers

What is the purpose of cookies in online contexts?

<p>To store data for customizing websites for users. (A)</p> Signup and view all the answers

What is a primary reason for using email over conventional mail?

<p>Email allows for instant messaging worldwide. (A)</p> Signup and view all the answers

Which of the following is considered inappropriate behavior when using email?

<p>Reading someone's email without permission. (B)</p> Signup and view all the answers

What components make up an email address?

<p>Username and domain name. (B)</p> Signup and view all the answers

What is one way to minimize the risks of cyber threats associated with email usage?

<p>Avoid revealing sensitive information online. (B)</p> Signup and view all the answers

What happens to emails that are moved to the Trash folder in Gmail?

<p>They are permanently deleted after 30 days. (A)</p> Signup and view all the answers

What should be done when wanting to share someone else's email content?

<p>Seek permission before sharing the content. (B)</p> Signup and view all the answers

Which of the following statements about Google Drive is correct?

<p>Users can store and share multiple file types. (A)</p> Signup and view all the answers

Which of the following actions is an example of spamming?

<p>Flooding inboxes with unwanted advertisements. (D)</p> Signup and view all the answers

What is an example of a domain name in an email address?

<p>gmail.com (A)</p> Signup and view all the answers

Which of the following actions will successfully log a user out of their Gmail account?

<p>Clicking the Sign out button. (A)</p> Signup and view all the answers

In creating an email account, which information is least likely required?

<p>Age and marital status. (A)</p> Signup and view all the answers

What type of messages does the Spam folder typically contain?

<p>Junk mail and advertisements. (D)</p> Signup and view all the answers

What is the primary purpose of the Outbox in email services?

<p>To hold outgoing or unsent messages. (D)</p> Signup and view all the answers

What is the purpose of the Bcc field in an email?

<p>To send a copy of the email to hidden recipients. (A)</p> Signup and view all the answers

What happens if you try to attach a file larger than 25 MB?

<p>A Google Drive link will be included instead. (A)</p> Signup and view all the answers

What information is typically found in the header of received emails in the Inbox?

<p>Sender's name, subject, time, and date. (A)</p> Signup and view all the answers

Which of the following is the correct sequence to attach a file to an email?

<p>Click 'Attach files' &gt; Click 'Open' &gt; Click 'Send'. (A)</p> Signup and view all the answers

What is the primary function of the Subject line in an email?

<p>To provide a summary of the email's body. (C)</p> Signup and view all the answers

Flashcards

Internet

A global network connecting computers via phone lines or cables.

Email

Electronic mail sent over the internet; more convenient than traditional mail.

Netiquette

Rules for polite online behavior.

Malware

Harmful software (e.g., viruses, trojans).

Signup and view all the flashcards

Virus

Malware that spreads from computer to computer and damages data.

Signup and view all the flashcards

Worm

Malware that replicates automatically and spreads rapidly.

Signup and view all the flashcards

Trojan

Malware that disguises itself as a harmless program.

Signup and view all the flashcards

Email Address

A unique identifier used to send and receive emails.

Signup and view all the flashcards

Email Account

A personal online account for sending and receiving email.

Signup and view all the flashcards

Username

Part of an email address; used to log in.

Signup and view all the flashcards

Password

Secret code used to access an account.

Signup and view all the flashcards

Gmail

A free email service.

Signup and view all the flashcards

Inbox

Mailbox for received emails.

Signup and view all the flashcards

Outbox

Mailbox for emails being sent.

Signup and view all the flashcards

Spam

Unwanted email messages.

Signup and view all the flashcards

Google Drive

Online storage for files.

Signup and view all the flashcards

Online Services

Services accessible through the internet (e.g., banking, shopping).

Signup and view all the flashcards

Phishing

Tricking people into revealing sensitive information.

Signup and view all the flashcards

Cybercrime

Criminal activity on the internet.

Signup and view all the flashcards

Data Security

Measures protecting important information.

Signup and view all the flashcards

Composing an Email

Creating a new message for sending through email.

Signup and view all the flashcards

Email Attachments

Files added to an email for sending (photos, videos, etc.).

Signup and view all the flashcards

Study Notes

Advantages and Disadvantages of the Internet

  • Information can be found easily with search engines
  • People with similar interests can communicate using social media and email
  • Online services such as banking and shopping can be done remotely
  • Information can be shared with many people at the same time
  • Sensitive information can be compromised by cyberattacks
  • Not all information found online is accurate
  • Computers connected to the internet are vulnerable to malware
  • Cybercrimes such as forgery and phishing are increasing

Learning Outcomes for using the internet

  • Communicate over email
  • Explain online services like e-commerce
  • Share views and opinions using blogs
  • Store and share data using Google Drive
  • Create blogs and podcasts
  • Differentiate between a website and a blog

The Internet

  • Is a global network of computers connected through telephone lines or cables
  • Allows for information sharing, data storage, and communication

Email

  • Electronic mail sent through the internet
  • It functions like traditional mail but is more convenient and efficient
  • Emails can be sent to multiple recipients at once
  • Attachments such as photos, videos, and data can be added to emails

Netiquette

  • A set of rules for behaving politely online
  • Includes appropriate behavior for emails, forums, blogs, and social media

Malware

  • Malicious software that can harm computer systems
  • Includes viruses, trojans, worms, and ransomware
  • Viruses spread from computer to computer and can corrupt or delete data
  • Worms replicate automatically and spread quickly through networks
  • Trojans disguise themselves as harmless programs and can steal sensitive information

Email Address

  • Users need to create a personal account
  • A unique email address is generated for each account
  • Consists of a username and a domain name separated by the @ symbol
  • Example: [email protected]

Creating an Email Account

  • Users need to fill a registration form with a username and password
  • An email account is created if all details are filled correctly

Logging into an Email Account

  • Users need to enter their username and password to access their account

Composing and Sending an Email

  • Clicking "Compose" opens a window for writing an email
  • The email includes fields for the recipient's email address, subject, and message body
  • Users can attach files to emails

Gmail Features

  • Inbox: Displays received emails
  • Outbox: Stores outgoing emails that are in the process of sending
  • Trash: Holds deleted emails
  • Spam: Stores unwanted messages

Google Drive

  • A free service that allows users to store and share files online
  • Provides 15 GB of free storage
  • Users can access files from anywhere at any time
  • Supports various file types and enables collaboration on documents

Protecting Yourself Online

  • Never disclose sensitive information like passwords or credit card numbers online
  • Be cautious of phishing scams and suspicious links
  • Use strong passwords and update security software regularly

Fact Files

  • The first email was sent by Raymond Samuel Tomlinson
  • Hotmail was a popular email site that was merged with Outlook.com

Gmail Features

  • Outbox: stores unsent messages
  • Trash: permanently deletes emails after 30 days
  • Spam: holds unwanted emails
  • Logout/Sign Out: allows users to exit their email account

Additional Tips for Using the Internet Safely

  • Be respectful in online discussions
  • Do not read or forward other people's emails without permission
  • Cite sources when using information from the internet
  • Avoid sending spam
  • Use appropriate language

Other Threats

  • Spamming: sending unwanted messages
  • Keyloggers: record every keystroke
  • Cookies: used by websites to track user behavior

Fact Files

  • The first antivirus software was created by Ray Tomlinson in 1972
  • Gmail was created by Paul Buchheit

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Explore the multifaceted nature of the internet in this quiz. Learn about the ease of access to information and communication, as well as the potential risks such as cyberattacks and misinformation. Test your knowledge about online services and communication tools.

More Like This

Cybercrime Study Notes Quiz
10 questions
Internet Safety for College Students
13 questions
Cybercrime Overview and Laws
16 questions
Use Quizgecko on...
Browser
Browser