1. An e-mail address typically consists of a user ID followed by the _________ sign and the name of the e-mail server that manages the user’s electronic post office box ?

@

#

&

*

Answer: @

Explanation:

An e-mail address typically consists of a user ID followed by the @ sign and the name of the e-mail server that manages the user’s electronic post office box.


2. __________ makes it possible for shoppers to make purchases using their computers ?

E-world

E-commerce

E-spend

E-business

Answer: E-business

Explanation:

E-commerce makes it possible for shoppers to make purchases using their computers.


3. What are the four things required to connect to the Internet ?

Telephone line, Modem, Computer and an ISP

Modem, Computer, PDA and ISP

Telephone line, PDA, Modem and Computer

Computer, ISP, Modem and Communication software

Answer: Telephone line, Modem, Computer and an ISP

Explanation:

Telephone line, Modem, Computer and an ISP


4. A popular way to learn about computers without ever going to a classroom is called _________ ?

i-learning

isolated learning

e-learning

close learning

Answer: e-learning

Explanation:

A popular way to learn about computers without ever going to a classroom is called e-learning


5. The secret code that gives you access to some programs ?

clue

cue

password

help

Answer: password

Explanation:

The secret code that gives you access to some programs is called a password


6. Which of the following operations is safe if an e-mail from an unknown sender is received ?

Open it to know about the sender and answer it

Delete it after opening it

Delete it without opening it

Open it and try to find who the sender is

Answer: Delete it without opening it

Explanation:

It is safe to delete an e-mail from an unknown sender without opening it.


7. Why should you delete unknown e-mail attachments ?

It can make you land in jail.

The person could track you down and hurt you.

It is a bad manners.

It might contain a virus that could hurt your computer.

Answer: It might contain a virus that could hurt your computer.

Explanation:

The correct answer is (d) It might contain a virus that could hurt your computer. Unknown e-mail attachments could contain viruses or malware that can harm your computer or steal personal information. It is important to be cautious and not open attachments from unknown senders or that seem suspicious.


8. Online documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with relative information are called ?

hypermedia

hypertext

HTML

URL

Answer: hypertext

Explanation:

The correct term for the described online documents is (b) hypertext.


9. You can use the ________ bar to type a URL, and display a Web page, or type a keyword to display a list of related Web pages ?

Menu

Title

Search

Address

Answer: Address

Explanation:

Address bar is used to type a URL, and display a Web page, or type a keyword to display a list of related Web pages.


10. With _________, the computer’s modem uses a standard telephone line to connect to the Internet ?

DSL

dial-up access

ISDN

cable television Internet services

Answer: dial-up access

Explanation:

With dial-up access, the computer's modem uses a standard telephone line to connect to the Internet.