Anda di halaman 1dari 9

IC3 - Module 3 - Living Online

ID QUESTION ANSWER
1 Click the Maximize button of the current window A windows screen is shown. Click button in upper
right corner that has a large rectangle on it and is
next to the X close button.
2 Which two are ways of communicating with external help resources? (Choose 2) -Phone
-Instant Messaging
3 Match each type of data transmitted using a network to the most common example -Making a video call = C
of network communication. -Listening to music stations = B
A. Computer network -Downloading a file = A
B. Radio network
C. Telephone network
4 Which two are benefits of networked computing? (Choose two) -Allowing network users to work together
-Allowing network users to share files and other
resources
5 Which two are examples of loss of autonomy when working in a network -The administrator has access to all information on
environment? (choose two) the network, confidential or not.
-Anyone using your computer has access to your
local drive and can see your files.

6 In the image below, click the network server Hint: NOT the Firewall DHCP Server or Router
-Domain Control (Active Directory)
7 Which two definitions best match Intranet? -A network that follows the Internet rules but is
used primarily within an organization
-A private network of computers normally located
in the same office or building
8 Which Internet connection is used when "high bandwidth" connections are not Dial-up
available due to low population and demand?
9 Which option can be used to provide security on a wireless network? Encrypt the network traffic
10 Which two are characteristics of instant messages? (choose two) -Can have multiple messages simultaneously
-Can send quick messages
11 What type of communication is shown below?+ Hint: Student must be able to identify weblog,
A. Weblog social network, chat room, instant message, and
B. Social network online conference visually.
C. Chat room -Image labeled "JS Blog" that includes "News &
D. Online conferencing Views", "Newsfeed", and "Recommended Reading"
=A

1 of 9
IC3 - Module 3 - Living Online
12 What is a social network? A virtual structure made of individuals that are tied
by one or more specific kind of relationship

13 What communication method is normally used to send small amounts of information Text message

14 Match each term with its definition - Enables people to… Drag and drop to match
A. Share ideas, post questions and answers, and support one another, kind of like a -Social network = D
bulletin board -Electronic mail = B
B. Send both text message and computer files to friends, family, and colleagues -Blog = C
C. Share personal observations over the Internet, kind of like a web-based diary -Newsgroup = A
D. Share experiences and opinions with each other using community-based Websites

15 Which type of communication is shown below? Hint: Student must be able to identify weblog,
A. Email social network, chat room, instant message, and
B. Weblog (blog) online conference visually.
C. Social network -Image shows various chat tabs, and the first one is
D. Instant message labeled "Chat with arin" = D
16 Which two components are part of an email address. (choose two) -@
-Domain
17 What is protocol for electronic communication? A set of standards or rules that allow computers to
communicate
18 How many people receiving this email share the domain with the sender Hint: Student must know that domain is whatever
follows the @ symbol in an email address.
-2 -- only chris_smith@contoso.org and
chris_white@contoso.org have the same domain as
the sender, greg_smith@contoso.org

19 Which symbol separates the user name from the domain name in an Internet email @
address?
20 Based on the email below, how many people will receive a response if you use the 1 -- reply only goes to sender, which is
Reply command? greg_smith@contoso.org
21 In the message shown below, what is "greg_smith@contoso.org"? The sender's address
22 What does the blue arrow associated with a message indicate? The message is a low priority.

2 of 9
IC3 - Module 3 - Living Online
23 Open the email message from Paul Red that has the subject Certification -Find Paul's name in the "From" list
(visual of Microsoft Outlook email inbox) -Double-click on the subject "Certification"
24 Send a reply to everyone that received this email message. Click "Reply All" button on the ribbon
(shows an Outlook email)
25 Send this email to paul_red@certiprep.info -In the "To" field, type Paul's email address
(shows an Outlook email with a blank "To" field" -Click Send
26 Underline the selected text -Click "U" button
27 Click the attachment in the message -Choose "quote.xls (14 KB)"
28 Save the attachment to this email message to the Desktop -Right click on Certification.pdf
-Save As
-(Already on the Desktop) Click Save
29 Attach the file named Certification.pdf, located in the Documents folder to this -Clilck Attach File (paperclip)
message. -(Already in User -->Documents) Choose the
"Certification.pdf" file
-Insert
30 Move the selected email message to the Certification folder -Right click on message
-Move to Folder
-Click on Certification
-OK
31 Create a new email folder names Red -Folder Tab
-New Folder button
-Type "Red" as folder name
-OK
32 Automatically save the email address of the sender of this message in the Contacts -Right click on email address in "From" field
folder -Click "Add to Outlook Contacts"
33 For the contact Paul Red, change the company name to Contoso. Click Close and Save -Double-click on Paul Red
when you are finished. -Type "Contoso" in "Company" field
-Click "Save and Close" on the ribbon
34 Which term identifies the process of creating data and information in an unreadable Encryption
form?
35 What should you do to make sure you review at a later time an email message you Flag the message
have received
36 Which message format is supported by all email applications? Plain text
37 What is the purpose of encryption in communication? Making the email difficult to read except by the
person you sent it to
38 Which method is real-time, text-based communication between two or more Instant messaging
participatns using the Internet?
3 of 9
IC3 - Module 3 - Living Online
39 Which type of communication is most appropriate for correspondence that requires a Electronic mail
paper trail?
40 Which option matches with spreading rumors or information you know to be fals on a Unethical and illegal online communication
weblog (blog)?
41 What is the email shown below an example of? (Choose two) Hint: Student should know definitions for libel,
A. Libel spam, phishing, and trademark infringement, so
B. Spam they can look at an email and identify these
C. Phishing elements
D. Trademark Infringement -Spam
-Phishing
42 Which kind of malware must attach itself to an existing program? Worms
43 What application is used to communicate, to access information, to conduct business, Hint: it asks for an application
and for recreational purposes? -Web browser
A. Internet
B. World Wide Web
C. Web browser
D. Internet Service Provider
44 Which option matches a personal online journal that is frequently updated and Weblog (blog)
intended for general public consumption?
45 Which definition matches World Wide Web? A system of interconnected multimedia documents
browsed using Internet rules
46 What does RSS stand for? Really Simple Syndication
47 Match each term with its definition Drag and drop to match
A. An organized, lined collection of Web pages stores on an Internet server -Web browser = D
B. The first or main page of a Web site -Home page = B
C. An HTML file, containing text, graphics, and/or mini-applications -Web page = C
D. A program that translates the Hypertext Markup Language (HTML) of the Web into -Web site = A
viewable Web pages

4 of 9
IC3 - Module 3 - Living Online
48 Click and drag each label to the box pointing to that part of a web page. Hint: Student must be able to look at a web page
window and label various parts of the screen
-Button" points to a "Next" button
-"Hyperlinked text" points to "Click here to view
Privacy Statement"
-"Web site address" points to "http://…."
-"Text box" points to blank field next to "Email:"
-"Radio button" points to circle next to "Male"

49 Using the Web address http://www.certiprep.net, go to the Certiprep Website -Select "http://www.google.com" and type
"http://certiprep.net"
-Enter
50 Using the IP address http://62.149.230.139, go to the Certiprep website -Select "http://www.google.com" and type
http://62.149.230.139
-Enter
51 Display the current web page so that it shows updated content. -Click Refresh button on address bar (cirle with an
arrow at the top)
52 Refresh the contents of the current web page. -Click Refresh button on address bar (cirle with an
arrow at the top)
53 Display a history of recently visited websites -Click the star icon in the top right corner
-Click History tab
54 Delete the history of visited web pages -Click "Tools"
-Internet Options
-Click "Delete" button
-Click to check box for "History"
-Click "Delete"
55 Use the current website to display all of the information it contains on Alabama. Do -Click "Alabama"
NOT open a new window or tab.
56 Use the current website to display all of the information it contains on Alabama -Click "Alabama"
Colleges and Universities. Do NOT open a new window or tab. -Click "Alabama Colleges"
57 Delete Contoso Club from your favorite sites. -Click star icon in top right corner
-Right click on "Contoso Club"
-Delete

5 of 9
IC3 - Module 3 - Living Online
58 Add Contoso Club to your favorites -Click star icon in top right corner
-Click "Add to favorites"
-Click "Add to favorites"
-Add
59 Copy the selected text from the current web page to the open document -Right click on selection
-Copy
-Click on minimized Word document
-Right click in document
-Paste
60 Copy the selected text from the current web page to the clipboard -Right click on selection
-Copy
61 Download the file Certification.pdf to the Desktop -Click text link "Certification"
-(already on Desktop) Save
62 Download the file Certification.pdf to the Documents folder -Click text link "Certification"
-Click "Documents" on left side of screen
-Save
63 Print 2 copies of the current web page using current settings -Click printer icon
-Click "Print"
-Change "number of copies' to 2
-Print
64 Preview the current Web page for printing. Click Printer icon
-Click "Print Preview"
65 Make the current Web page your browser's new Home Page. Click button the house icon (two buttons to left of
printer button)
Choose "Add or Change Home Page"
Click "Use current"
Click "OK"
66 Make www.google.com your browser's new Home Page. Since www.google.com is the browser named
already, do the same as above.
67 What is a pop-up ad? A type of window that appears on top of the user's
Web browser
68 Which communication tool allows people to distribute and syndicate their own News feeds
stories, press releases, and other information to subscribers?
69 Which two features are typical of Weblogs (blogs)? Choose two. Regular postings that normally appear in reverse
chronological order
Lists of links to other blogs or sites that might be of
interest to readers
6 of 9
IC3 - Module 3 - Living Online
70 Which communication tool allows people to create and customize their own profiles Social networks
with photos, videos, and information about themselves?
71 Click on the link that shows the Best Exchange Rate. Click on the box that says "How to Get the Best
Exchange Rate"
72 What is ithe best search string for information about Roger that doesn't include the Roger -Rabbit
word Rabbit?
73 Go to www.google.com and search foro the phrase "IC3 Certification." Google is already available, so type IC3 Certification
in the box
Click Google Search
74 Refine the search criteria to display only documents that don't include 2007. In the box next to Microsoft Office, type a space
and type -2007
Click Advanced search button
75 Which kind of written material can be used without first obtaining copyright Public domain material
permission?
76 You are working on a project to determine the average birth in six different countries. Drag and drop to match:
Match each activity to the step used to perform that activity. Evaluating information - D
A. Input the data into a spreadsheet with birth information for each country on a Collecting information - B
separat worksheet Communicating information - C
B. Use the Internet to search for information on average biths in each country. Organizing information - A
C. Present your results in a table included in a report created with a word processor
D. Calculate the average birth per country using a spreadsheet formula

77 What is an example of of the Internet being used to facilitate learning? Complete an online course
78 Which tool provides reliable positioning, navigation, and timing services to worldwide Global positioning systems
users?
79 Which two statements are benefits gained from the use of e-commerce? (Choose You can shop 24 hours a day, 365 days a year.
two.) You can compare prices from different companies.

80 Which tool is used for Web-based distance education with no face-to-face E-learning
interaction?
81 Which two options contibute to maintaining a safe working environment? (Choose Proper positioning of equipment
two.) Proper positioning of cables
82 Which action reduces the risk of eye-strain? Sitting approximately 12" from your monitor
83 Which option is an effective security measure for a business? Periodically change passwords
84 Which device is regularly used for backing up data? Network disk

7 of 9
IC3 - Module 3 - Living Online
85 What is Spyware? Any technology, such as tracking software, that
secretly monitors, intercepts, or takes control of a
user's interaction with the computer

86 Which two options, in a school environment, are valid reasons for restricting student
Prevent the viewing or editing of certain files or
access to networks and the Internet? (Choose two.) folders
Monitor and filter online activities
87 When you create a document, in which case could you assume to have ownership and When a document is stored on a home computer
control of the document? owned by you
88 Which option contributes to minimizing risk when purchasing online? Make sure the site is secure and the URL address
displays https
89 Which option protects your privacy and personal security online? Use a separate e-mail address for non-personal
items, and use an alias instead of your name

90 Which option would be covered by company computer use policy, rather than laws or Surfing the Internet for fun at work
guidelines?
91 What should you do before you donate or throw away a computer? Make sure to clean your personal information

92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
8 of 9
IC3 - Module 3 - Living Online
111
112
113
114
115
116
117
118
119
120

9 of 9

Anda mungkin juga menyukai