No student devices needed. Know more
15 questions
A network application is a computer application in which either the program you are using, the data you are working with, or both, are on a____ network.
True
False
What does URL stand for?
Uniform Resource Locator
Uniform Resource Link
Uniform Remote Link
Uniform Remote Locator
Web browsers are network applications used to access the__ internet
True
False
What is the correct term represented by the letter A:
host
protocol
location
file
What is the correct term represented by the letter B:
location
protocol
file type
host
What is the correct term represented by the letter C:
host
protocol
location
file extension
The host identify represents all of the following except?
network device
computer
webpage
user id
What does the letter B in the picture represent?
Status Bar
Viewport
Dashboard Menu
Address and Search bar
What does the letter E in the picture represent?
Settings Button
Home Button
Refresh Button
Bookmark Button
Emails can be organized into folders. Instead of folders, Gmail uses ______ to organize email messages.
directories
sub directories
labels
categories
“Carbon copy.” The only___ email address that is visible to all the recipients is the one in the to: field
True
False
List all the ways that malware can be shared:
email attachments
fictitious websites
pop-up ads
spam
All options listed
The primary goal of an internet scam is just to tease someone with fake information.
True
False
Phishing is an attempt to steal sensitive information like usernames, passwords, social security numbers, and credit card numbers.
True
False
Strong passwords include all of the following these elements:
Upper and lower case letters
8 or more characters
Numbers and letters
full sentences
Explore all questions with a free account