What is a worldwide network of computers that allows users to access other computers, data, and information?
A) Intranet
B) Internet
B) Internet
What is the written code used in creating Web pages? A) HTML B) HTTP
A) HTML
What is the common abbreviation for "electronic mail"? A) SMS
B) Email
B) Email
What online platforms allow people to build social networks and connect with others who share similar interests?
A) Search Engines
B) Social Media
B) Social Media
What is the general term for malicious software designed to disrupt computer operations or gain unauthorized access?
A) Firmware B) Malware
B) Malware
Which military computer network, established in 1969, was a precursor to the internet?
A) ARPANET
B) NSFNET
A) ARPANET
Which part of a web browser typically displays the web page's URL?
A) Address Bar
B) Toolbar
A) Address Bar
Which email field is used to specify the main recipient's address?
A) CC
B) To
B) To
Which of the following is a significant risk associated with using social media, involving harm caused by online harassment?
A) Information sharing
B) Cyberbullying
B) Cyberbullying
Which type of malware is characterized by its ability to replicate itself and spread to other computers without requiring user intervention or attaching to other programs?
A) Trojan Horse B) Worm
B) Worm
Which internet connection type uses a modem and a telephone line, preventing phone use during connection?
A) Broadband
B) Dial-up
In a web browser, what button is used to go back to the previously viewed page?
A) Forward Button
B) Back Button
Unwanted, unsolicited digital communication, especially email, sent in bulk, is known as:
A) Spam
B) Phishing
A) Spam
Stealing your personal information (name, birthday, credit card) to pretend to be you is called:
A) Online Fraud B) Identity Theft
B) Identity Theft
A program that pretends to be a useful application, tricking users into installing it, and then secretly creating a "backdoor" for unauthorized access is a:
A) Spyware B) Trojan Horse
B) Trojan Horse
What is currently known as the fastest broadband internet connection type?
Fiber Internet
This is the common term for electronic mail, allowing the sending of messages across the Internet.
This refers to people who illegally break into computer systems, often referred to as digital burglars or thieves.
Crackers
This type of malware attaches itself to programs or files and can spread when you share those infected items.
Computer Virus
What type of business provides people with access to the internet and typically charges a fee for the connection?
Internet Service Provider
A software that lets a user display and interact with documents and resources in the Web is called a?
Web Browser
This is where the user will enter the full message of email.
Body
This refers to people using computers/internet to trick you, steal money, or information.
Digital Thieves
This type of online fraud involves tricking you into giving sensitive information (like passwords or bank details) through fake emails or websites.
Phishing