Module7 Information & Communication. 2 INDEX 1.Concepts & Terms 2.Internet Explorer 3.E-Mail &...
-
Upload
preston-mills -
Category
Documents
-
view
217 -
download
1
Transcript of Module7 Information & Communication. 2 INDEX 1.Concepts & Terms 2.Internet Explorer 3.E-Mail &...
2
INDEXINDEX
1.1. Concepts & Terms Concepts & Terms
2.2. Internet ExplorerInternet Explorer
3.3. E-Mail & Outlook E-Mail & Outlook
ExpressExpress
4
The World Wide Web is:The World Wide Web is:
1.1. a huge collection of linked files held on computers all over the world.a huge collection of linked files held on computers all over the world.
2.2. a world wide network of telephone cables and related equipment.a world wide network of telephone cables and related equipment.
3.3. a network of computers and cables that connect e-mail users all around the a network of computers and cables that connect e-mail users all around the
world.world.
4.4. a global network of communication satellites. a global network of communication satellites.
5
Name of file
Protocol used
Domain used
Commercial domain
Indicates World Wide Web
http:// WWW. flexitrain .com /Orders.htm
6
The set of rules used for transferring files on the World Wide Web.
The unique address for a web page
A clickable item in a web page that connects to another web page.
A company that enables individuals to connect their PCs to the internet.
A set of rules frequently used to transfer web pages to a host server on the Internet.
URL ISP Hyperlink FTP HTTP
7
Which one of these statements is false?Which one of these statements is false?
1.1. The content of web pages that you view while using a browser is lost from The content of web pages that you view while using a browser is lost from memory after the computer is shut down.memory after the computer is shut down.
2.2. Web browsers are software applications that are used to visit web pages in Web browsers are software applications that are used to visit web pages in various.various.
3.3. Browsers contain hypertext links to different documents and sites on the Browsers contain hypertext links to different documents and sites on the web.web.
4.4. A web browser is a site where you can search for information on the web.A web browser is a site where you can search for information on the web.
8
An internet tool that enables you to quickly find information on An internet tool that enables you to quickly find information on the web is called:the web is called:
1.1. a uniform Resource Locatora uniform Resource Locator
2.2. a Search Enginea Search Engine
3.3. a Find Wizarda Find Wizard
4.4. Online HelpOnline Help
9
A search engine is a programA search engine is a program
1.1. that helps you to find information located on the internet.that helps you to find information located on the internet.
2.2. that can be used to find errors in the HTML code for a web page.that can be used to find errors in the HTML code for a web page.
3.3. that is used to find the web sites you have most recently visited.that is used to find the web sites you have most recently visited.
4.4. on the internet that locates all users logged onto a web site.on the internet that locates all users logged onto a web site.
10
A cache helps web pages you haveA cache helps web pages you havevisited recently to load more quickly,visited recently to load more quickly,
A cache enables a web site to recallA cache enables a web site to recalldetails of your previous visit.details of your previous visit.
Your browser uses a cookie to store theYour browser uses a cookie to store thefiles you download from the internet.files you download from the internet.
A cookie is a small file sent to yourA cookie is a small file sent to yourcomputer when you visit a website.computer when you visit a website.
Cookie & CacheCookie & Cache
If a cookie gets too full, older files areIf a cookie gets too full, older files aredeleted to make space for new once.deleted to make space for new once.
11
Which one of these statements about digital signatures true?Which one of these statements about digital signatures true?A digital signature:A digital signature:
1.1. Automatically encrypts the contents of an e-mail.Automatically encrypts the contents of an e-mail.
2.2. Is a scanned image of your real signature.Is a scanned image of your real signature.
3.3. Is used to verify the identity of the sender of a message.Is used to verify the identity of the sender of a message.
4.4. Is used to add a personal touch to e-mail messages.Is used to add a personal touch to e-mail messages.
12
Drag the following statements about Drag the following statements about digital certificatesdigital certificates to the appropriate boxes. to the appropriate boxes.
TrueTrue FalseFalse
Enable you to registerEnable you to registerdownloaded software.downloaded software.
Can be used to provideCan be used to providea digital signature.a digital signature.
Enable you to print a guaranteeEnable you to print a guaranteefor goods purchased online.for goods purchased online.
Are commonly used to make webAre commonly used to make web sites more securesites more secure.
13
Which one of the following statements about online credit card Which one of the following statements about online credit card transactions is true?transactions is true?
1.1. E-mail is the quickest and most secure way of sending credit card details.E-mail is the quickest and most secure way of sending credit card details.
2.2. A web page displaying this symbol is locked: you can’t enter credit card A web page displaying this symbol is locked: you can’t enter credit card detailsdetails
3.3. You should only enter credit card details into a form secured by a digital You should only enter credit card details into a form secured by a digital certificate.certificate.
4.4. Using your credit card on the internet is safer than a face-to-face Using your credit card on the internet is safer than a face-to-face transaction.transaction.
14
The main purpose of a firewall is to:The main purpose of a firewall is to:
1.1. Prevent unauthorized users from gaining access to a network.Prevent unauthorized users from gaining access to a network.
2.2. Protect network servers from the risk of fire.Protect network servers from the risk of fire.
3.3. Prevent employees from accessing the internet during work hours.Prevent employees from accessing the internet during work hours.
4.4. Prevent network users from sending and receiving personal e-mail.Prevent network users from sending and receiving personal e-mail.
15
Which two of the following statements about Protected website Which two of the following statements about Protected website are true?are true?
1.1. You are assigned a username.You are assigned a username.
2.2. When you enter your username, asterisks (*) appear in place of the letters.When you enter your username, asterisks (*) appear in place of the letters.
3.3. Once you have a login and Password you can access all areas of a Once you have a login and Password you can access all areas of a
protected website.protected website.
4.4. You can only view pages of a protected website if you are registered user.You can only view pages of a protected website if you are registered user.
5.5. A Protected web site is one that is free from viruses.A Protected web site is one that is free from viruses.
16
Which one of the following statements about online credit card Which one of the following statements about online credit card transactions is true?transactions is true?
1.1. This global symbol means a site is secure for entering credit card details.This global symbol means a site is secure for entering credit card details.
2.2. You should enter credit card details onto a form on a secure web site.You should enter credit card details onto a form on a secure web site.
3.3. Your credit card statement may not include extra costs such as shipping.Your credit card statement may not include extra costs such as shipping.
4.4. E-mail is the most secure way to send credit card details to a web site.E-mail is the most secure way to send credit card details to a web site.
17
Which one of these statements is true?Which one of these statements is true?
1.1. It is not possible to encrypt content of e-mail messages.It is not possible to encrypt content of e-mail messages.
2.2. Encryption prevents unauthorised users from reading data.Encryption prevents unauthorised users from reading data.
3.3. You can’t send encrypted data out over the internet.You can’t send encrypted data out over the internet.
4.4. Encryption converts data so that it can be understood.Encryption converts data so that it can be understood.
18
Which two of these statements about encryption are true?Which two of these statements about encryption are true?
1.1. An encryption key used to compress documents that you wish to store safely.An encryption key used to compress documents that you wish to store safely.
2.2. Encryption prevents unauthorized users from reading your data.Encryption prevents unauthorized users from reading your data.
3.3. Encryption converts data so that it cannot be understood.Encryption converts data so that it cannot be understood.
4.4. You can’t encrypt your e-mail messages.You can’t encrypt your e-mail messages.
5.5. Encryption can only be used to encrypt text files.Encryption can only be used to encrypt text files.
20
Use the web address http://www.macromedia.com to navigate to the Macromedia website.
Press Enter when you have finished.
http://www.macromedia.com
Click then typeClick then typehttp://www.macromedia.com
Press Enter
21
Make this page http://www.fruit.com your browser’s new Home Page.
Don’t change any other settings.
27
Use Internet Explorer Help to access information about History lists.
Click here then type Click here then type History listsHistory lists
History lists
29
Change the settings of this web browser so that the images will NOT be displayed.
Don’t change any other settings.
30
Use the browser address bar to display previously visited URLs and access the site that you visited before this one.
32
A web search has been carried out producing the results displayed on screen.
Use these results to navigate to Kennel Clubs web site
Click on Click on Kennel ClubsKennel Clubs
34
Use this site to reserve a single room at Park’s Inn.
Follow the instructions that are provided on the web page.
Click on an option to make a reserve
Rooms / Accommodation
Events and venues
Select: a hotel from the dropdown box.
and a room from this dropdown box.
Now press ‘book now’ button to reserve your room
book now!
Tomas hotelPark’s InnVenus
Single roomDouble room
Use this site to reserve a single ticket for the concert in the park.
Follow the instructions that are provided on the web page.
Click here Click here
Click hereClick hereClick hereClick here
Click hereClick here
Click hereClick here
39
Create a new folder for sorting some of your favorites.
Call this folder Cooking.
Type CookingType Cooking
43
Navigate to the www.AltaVista.com Search engine.
http://www.AltaVista.com
Click then typeClick then typehttp://www.AltaVista.com
Click Go
44
““movies reviews” OR Cinemasmovies reviews” OR Cinemas ““movies reviews” movies reviews” ــــــ CinemasCinemas
““movies reviews” ? Cinemasmovies reviews” ? Cinemas ““movies reviews” @ Cinemasmovies reviews” @ Cinemas
““movies reviews” + Cinemasmovies reviews” + Cinemas
Using click and drag facility to move the text into the look for box thatwould return a list of movie reviews that include cinemas
46
Modify the search requirements to include any of the words listed in the search criteria Click go! To submit your answer.Do not change any other setting.
47
Modify the search requirements to include an exact phrase match of the words listed in the search criteria. Click go! To submit your answer.Do not change any other setting.
48
Modify the search requirements to include a look-it-up categories only for the words listed in the search criteria. Click go! To submit your answer.Do not change any other setting.
50
Save this web page as a text file onto the A: drive of this computer.
Note: this is a simulation – you don’t need a floppy disk in the disk drive.
51
Save a copy of the photograph onto the Desktop of this computer.
Right click on Right click on the the photograph
54
Click the option that would enable you to run a virus check on a file before opening it on your PC.
60
At
Company department
User name
Country domain
Domain name
bsmithbsmith @@ Accounts.Accounts. Encel.Encel. ukuk
62
Which one of these Messages conforms to the basic rules of netiquette? Which one of these Messages conforms to the basic rules of netiquette?
63
Clue:Clue:
Unsolicited e-mail is often referred to as:Unsolicited e-mail is often referred to as:
(1 word, 4 letters)(1 word, 4 letters)
P A M
64
Which two of these statements about e-mail are true?Which two of these statements about e-mail are true?
1.1. You must send and receive e-mail on separate telephone lines.You must send and receive e-mail on separate telephone lines.
2.2. E-mail stands for Electronic Mail.E-mail stands for Electronic Mail.
3.3. The cost of sending e-mail depends on where the recipient lives.The cost of sending e-mail depends on where the recipient lives.
4.4. You can only send or receive e-mail offline.You can only send or receive e-mail offline.
5.5. The distance over which e-mail is sent does not significantly affect the The distance over which e-mail is sent does not significantly affect the speed of delivery.speed of delivery.
65
Which one of these statements about e-mail is true ?Which one of these statements about e-mail is true ?
1.1. You must send and receive e-mail on separate telephone line.You must send and receive e-mail on separate telephone line.
2.2. The cost of sending e-mail depends on where the recipient lives.The cost of sending e-mail depends on where the recipient lives.
3.3. You can only send or receive e-mail offline.You can only send or receive e-mail offline.
4.4. Sending message by e-mail is easier than Postal MailSending message by e-mail is easier than Postal Mail
66
Which one of those statements about e-mail is true?Which one of those statements about e-mail is true?
1.1. You can only access one e-mail account at any time.You can only access one e-mail account at any time.
2.2. Each user can only access their e-mail account from a signal PC.Each user can only access their e-mail account from a signal PC.
3.3. You need a user name and password to access your e-mail.You need a user name and password to access your e-mail.
4.4. Email accounts on a single PC share the same folders.Email accounts on a single PC share the same folders.
67
Which two of these statements about web-based e-mail are true?Which two of these statements about web-based e-mail are true?
1.1. Web-based e-mail is only available from Microsoft.Web-based e-mail is only available from Microsoft.
2.2. Web-based e-mail can only be accessed from the PC you set it up on.Web-based e-mail can only be accessed from the PC you set it up on.
3.3. Computers in internet cafés can be used to access web-based e-mail.Computers in internet cafés can be used to access web-based e-mail.
4.4. You can often access web-based e-mail from computers in libraries.You can often access web-based e-mail from computers in libraries.
5.5. With web-based e-mail you can only send and receive text messages.With web-based e-mail you can only send and receive text messages.
68
Which two of the following statements, about organizing your Which two of the following statements, about organizing your e-mail within most popular e-mail applications, are true?e-mail within most popular e-mail applications, are true?
1.1. You need to create folders before you can send or receive e-mail.You need to create folders before you can send or receive e-mail.
2.2. You must read e-mail before you can organize it into folders.You must read e-mail before you can organize it into folders.
3.3. You can use cut-and-paste to move mail to different folders.You can use cut-and-paste to move mail to different folders.
4.4. You must open an e-mail before you can duplicate it.You must open an e-mail before you can duplicate it.
5.5. E-mail messages can be sorted alphabetically inside a folderE-mail messages can be sorted alphabetically inside a folder
69
Which two of these statements regarding the risk of transmitting Which two of these statements regarding the risk of transmitting viruses via e-mail are true?viruses via e-mail are true?
1.1. Viruses can only be transmitted via an e-mail attachment.Viruses can only be transmitted via an e-mail attachment.
2.2. A virus can spread via e-mail by mailing itself to everyone in a victim’s A virus can spread via e-mail by mailing itself to everyone in a victim’s address book.address book.
3.3. Viruses are only spread via unsolicited mail.Viruses are only spread via unsolicited mail.
4.4. You should not open e-mail if it has a suspicious subject line.You should not open e-mail if it has a suspicious subject line.
5.5. You are more at risk from viruses if you use web based e-mail.You are more at risk from viruses if you use web based e-mail.
70
Which two of these statements on the risk of transmitting viruses Which two of these statements on the risk of transmitting viruses via e-mail are true?via e-mail are true?
1.1. You are less at risk from viruses if you use web based e-mail.You are less at risk from viruses if you use web based e-mail.
2.2. You can safely open an attachment sent to you by a friend.You can safely open an attachment sent to you by a friend.
3.3. You can set anti-virus software to automatically scan new content arriving You can set anti-virus software to automatically scan new content arriving on your PC.on your PC.
4.4. If you open an attachment with a virus, it can mail itself to everyone in your.If you open an attachment with a virus, it can mail itself to everyone in your.
5.5. Viruses are only spread via unsolicited mail.Viruses are only spread via unsolicited mail.
75
Use Outlook Express Help to access information on unread messages.
unread messages
Click here then type Click here then type unread messages
Click hereClick here
Click hereClick here
82
Without opening this attachment, save it onto the Desktop of this computer
Right click on the attachment
83
Reply to Rob Wilson’s e-mail with the message Yes, it will. This should be sent only to Rob Wilson. Do not open the message.Send the message immediately when you have finished.
Select the messageSelect the message
Click here then typeClick here then typeYes, it will
Yes, it will
84
Reply to everyone that received Sean White’s e-mail with the message Can you call me about this? Do not open the message.Send the message immediately when you have finished.
Select the messageSelect the message
Click here then typeClick here then typeCan you call me about this?
Can you call me about this?
85
Change the application settings so that when you reply to messages, the original message does not display.
88
Make [email protected] the mail recipient of this e-mail message.
Click the SUBMIT button when you have finished.
SUBMITSUBMIT
89
Send a carbon copy of this message to [email protected]
Send the message immediately when you have finished.
90
Enter the phrase Company meeting into the appropriate field to indicate what the message is aboutSend the message when you have finished.
Company meeting
91
Change the subject of this message to Meeting.
Send the message immediately when you have finished.
Meeting
Delete usingBackspaceBackspaceType Meeting
92
Attach the file Accounts.xls to this message.
This file is in the My Documents folder.
94
Forward the e-mail message from Rob Wilson to [email protected] not open the message.Send the message immediately when you have finished.
Select the message
99
Create a new group called Research Team that contains addresses for Rob Wilson and Sean White.
Research Team Research Team
101
Use the application’s built-in features to automatically add the sender of this message to your Address Book.
Right click here
102
There is group in the Address Book for this e-mail account.
Make the group the recipient of this message.
103
Messages under the Subject heading Planning are located in various mail folder in Outlook Express.Use the Find tool to display a complete listing of them.
Planning
Messages from Rob stone are located in various mail folder in Outlook Express.Use the Find tool to display a complete listing of them.
104
Rob stone
105
Create a new folder in your Inbox and name this folder Personal.
Personal
Click then typePersonal
110
Empty the Deleted Items folder.
Do not use the Delete key for this exercise.
Right Click on the Deleted Items
Use the application spell check tool to correct the spelling mistake tomorrw in this e-mail message.