Internet Threats and Copyright Infringement Quiz
12 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary benefit of using quotation marks in keyword searching?

  • To join different topics in the search
  • To search for the first term and exclude sites with the second term
  • To search for a specific phrase and keep words linked together (correct)
  • To exclude common words from the search

Which Boolean operator should be used to join similar or synonymous topics in a search?

  • OR (correct)
  • NOT
  • AND
  • PLUS

How can you effectively narrow down search returns to a specific topic or phrase using search engines?

  • Using quotation marks in keyword searching
  • Using the NOT operator in Boolean searches
  • Accessing 'Advanced search' features on search engines (correct)
  • Applying the 6x7 rule in PowerPoint presentations

What is the purpose of using double spacing in word processors?

<p>Creating more readable text by increasing space between lines (A)</p> Signup and view all the answers

Which element is emphasized when creating an effective PowerPoint presentation according to the text?

<p>Applying the 6x7 rule for line length (D)</p> Signup and view all the answers

What distinguishes early word processors from current word processors according to the text?

<p>Early word processors were stand-alone devices while current ones are programs on general purpose computers. (B)</p> Signup and view all the answers

Which of the following is NOT a form of malware?

<p>Firewall (C)</p> Signup and view all the answers

What is the purpose of phishing attacks?

<p>To acquire sensitive personal information (B)</p> Signup and view all the answers

Which of the following statements about fair use of intellectual property is correct?

<p>Fair use means that intellectual property can be used without consent for certain stated purposes (A)</p> Signup and view all the answers

What is the difference between phishing and pharming?

<p>Pharming is a more complicated way of phishing that exploits the Domain Name Service (DNS) system (C)</p> Signup and view all the answers

Which of the following is an example of a worm?

<p>ILOVEYOU worm (Love Bug Worm) (D)</p> Signup and view all the answers

What is spam in the context of internet threats?

<p>Unwanted email from advertisers that can also be used to send malware (B)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser