Module7 Information & Communication
2 INDEX 1.Concepts & Terms 2.Internet Explorer 3. & Outlook Express
3 SECTION ONE Concepts & Terms
4 The World Wide Web is: 1.a huge collection of linked files held on computers all over the world. 2.a world wide network of telephone cables and related equipment. 3.a network of computers and cables that connect users all around the world. 4.a global network of communication satellites.
5 Name of file Protocol used Domain used Commercial domain Indicates World Wide Web
6 The set of rules used for transferring files on the World Wide Web. The unique address for a web page A clickable item in a web page that connects to another web page. A company that enables individuals to connect their PCs to the internet. A set of rules frequently used to transfer web pages to a host server on the Internet. URLISPHyperlinkFTPHTTP
7 Which one of these statements is false? 1.The content of web pages that you view while using a browser is lost from memory after the computer is shut down. 2.Web browsers are software applications that are used to visit web pages in various. 3.Browsers contain hypertext links to different documents and sites on the web. 4.A web browser is a site where you can search for information on the web.
8 An internet tool that enables you to quickly find information on the web is called: 1.a uniform Resource Locator 2.a Search Engine 3.a Find Wizard 4.Online Help
9 A search engine is a program 1.that helps you to find information located on the internet. 2.that can be used to find errors in the HTML code for a web page. 3.that is used to find the web sites you have most recently visited. 4.on the internet that locates all users logged onto a web site.
10 A cache helps web pages you have visited recently to load more quickly, A cache enables a web site to recall details of your previous visit. Your browser uses a cookie to store the files you download from the internet. A cookie is a small file sent to your computer when you visit a website. Cookie & Cache If a cookie gets too full, older files are deleted to make space for new once.
11 Which one of these statements about digital signatures true? A digital signature: 1.Automatically encrypts the contents of an . 2.Is a scanned image of your real signature. 3.Is used to verify the identity of the sender of a message. 4.Is used to add a personal touch to messages.
12 Drag the following statements about digital certificates to the appropriate boxes. TrueFalse Enable you to register downloaded software. Can be used to provide a digital signature. Enable you to print a guarantee for goods purchased online. Are commonly used to make web sites more secure sites more secure.
13 Which one of the following statements about online credit card transactions is true? 1. is the quickest and most secure way of sending credit card details. 2.A web page displaying this symbol is locked: you can’t enter credit card details 3.You should only enter credit card details into a form secured by a digital certificate. 4.Using your credit card on the internet is safer than a face-to-face transaction.
14 The main purpose of a firewall is to: 1.Prevent unauthorized users from gaining access to a network. 2.Protect network servers from the risk of fire. 3.Prevent employees from accessing the internet during work hours. 4.Prevent network users from sending and receiving personal .
15 Which two of the following statements about Protected website are true? 1.You are assigned a username. 2.When you enter your username, asterisks (*) appear in place of the letters. 3.Once you have a login and Password you can access all areas of a protected website. 4.You can only view pages of a protected website if you are registered user. 5.A Protected web site is one that is free from viruses.
16 Which one of the following statements about online credit card transactions is true? 1.This global symbol means a site is secure for entering credit card details. 2.You should enter credit card details onto a form on a secure web site. 3.Your credit card statement may not include extra costs such as shipping. 4. is the most secure way to send credit card details to a web site.
17 Which one of these statements is true? 1.It is not possible to encrypt content of messages. 2.Encryption prevents unauthorised users from reading data. 3.You can’t send encrypted data out over the internet. 4.Encryption converts data so that it can be understood.
18 Which two of these statements about encryption are true? 1.An encryption key used to compress documents that you wish to store safely. 2.Encryption prevents unauthorized users from reading your data. 3.Encryption converts data so that it cannot be understood. 4.You can’t encrypt your messages. 5.Encryption can only be used to encrypt text files.
19 SECTION TWO Internet Explorer
20 Use the web address to navigate to the Macromedia website. Press Enter when you have finished. Click then type Press Enter
21 Make this page your browser’s new Home Page. Don’t change any other settings.
23 Open this web page in a new window.
24 This web page is not displaying properly. Stop this web page from downloading.
25 This web page has not loaded properly. Reload the web page to your browser.
26 Refresh this web page.
27 Use Internet Explorer Help to access information about History lists. Click here then type History lists History lists
28 Hide the Standard Buttons toolbar of this web browser.
29 Change the settings of this web browser so that the images will NOT be displayed. Don’t change any other settings.
30 Use the browser address bar to display previously visited URLs and access the site that you visited before this one.
31 Clear this browser’s entire History list. Don’t use the History Bar to carry out this task
32 A web search has been carried out producing the results displayed on screen. Use these results to navigate to Kennel Clubs web site Click on Kennel Clubs
33 You just navigate to this web page using a hyperlink. Return to the previous page.
34 Use this site to reserve a single room at Park’s Inn. Follow the instructions that are provided on the web page. Click on an option to make a reserve Rooms / Accommodation Events and venues Select: a hotel from the dropdown box. and a room from this dropdown box. Now press ‘book now’ button to reserve your room book now! Tomas hotel Park’s Inn Venus Single room Double room
Use this site to reserve a single ticket for the concert in the park. Follow the instructions that are provided on the web page. Click here
36 Without changing its name, add this web page to your favorites.
37
38 The MSN web site is one of your listed favorites. Use this fact to navigate to MSN site.
39 Create a new folder for sorting some of your favorites. Call this folder Cooking. Type Cooking
40 Add this web page to the Media folder in your favorites.
41 Delete Club Internet from your favorites menu.
42
43 Navigate to the Search engine. Click then type Click Go
44 “movies reviews” OR Cinemas “movies reviews” ـــ Cinemas “movies reviews” ? Cinemas “movies Cinemas “movies reviews” + Cinemas Using click and drag facility to move the text into the look for box that would return a list of movie reviews that include cinemas
45 -
46 Modify the search requirements to include any of the words listed in the search criteria Click go! To submit your answer. Do not change any other setting.
47 Modify the search requirements to include an exact phrase match of the words listed in the search criteria. Click go! To submit your answer. Do not change any other setting.
48 Modify the search requirements to include a look-it-up categories only for the words listed in the search criteria. Click go! To submit your answer. Do not change any other setting.
49 Copy the selected text from this web page to the clipboard.
50 Save this web page as a text file onto the A: drive of this computer. Note: this is a simulation – you don’t need a floppy disk in the disk drive.
51 Save a copy of the photograph onto the Desktop of this computer. Right click on the Right click on the photograph
52 Download the Virtual Tour movie file to the My Document folder.
53 Click the option that would download the selected file with the least risk of virus Infection?
54 Click the option that would enable you to run a virus check on a file before opening it on your PC.
55 Preview this web page for printing.
56 Print one copy of this web page using the current settings.
57 Print three copies of this web page using the current settings.
Change settings for this web page so that it will print an 8mm top margin.
59 SECTION THREE & Outlook Express
60 At Company department User name Country domain Domain Accounts. Encel. uk
At Domain extension User name James microelecticnet Co.uk.
62 Which one of these Messages conforms to the basic rules of netiquette?
63 Clue: Unsolicited is often referred to as: (1 word, 4 letters) P A M
64 Which two of these statements about are true? 1.You must send and receive on separate telephone lines. 2. stands for Electronic Mail. 3.The cost of sending depends on where the recipient lives. 4.You can only send or receive offline. 5.The distance over which is sent does not significantly affect the speed of delivery.
65 Which one of these statements about is true ? 1.You must send and receive on separate telephone line. 2.The cost of sending depends on where the recipient lives. 3. You can only send or receive offline. 4. Sending message by is easier than Postal Mail
66 Which one of those statements about is true? 1.You can only access one account at any time. 2.Each user can only access their account from a signal PC. 3.You need a user name and password to access your accounts on a single PC share the same folders.
67 Which two of these statements about web-based are true? Which two of these statements about web-based are true? 1.Web-based is only available from Microsoft. 2.Web-based can only be accessed from the PC you set it up on. 3.Computers in internet cafés can be used to access web-based . 4.You can often access web-based from computers in libraries. 5.With web-based you can only send and receive text messages.
68 Which two of the following statements, about organizing your within most popular applications, are true? 1.You need to create folders before you can send or receive . 2.You must read before you can organize it into folders. 3.You can use cut-and-paste to move mail to different folders. 4.You must open an before you can duplicate it. 5. messages can be sorted alphabetically inside a folder
69 Which two of these statements regarding the risk of transmitting viruses via are true? 1.Viruses can only be transmitted via an attachment. 2.A virus can spread via by mailing itself to everyone in a victim’s address book. 3.Viruses are only spread via unsolicited mail. 4.You should not open if it has a suspicious subject line. 5.You are more at risk from viruses if you use web based .
70 Which two of these statements on the risk of transmitting viruses via are true? 1.You are less at risk from viruses if you use web based . 2.You can safely open an attachment sent to you by a friend. 3.You can set anti-virus software to automatically scan new content arriving on your PC. 4.If you open an attachment with a virus, it can mail itself to everyone in your. 5.Viruses are only spread via unsolicited mail.
71 Open the message from Selina Kyle. Double click on Kyle, Selina
72 Display the message from Selina Kyle in the Preview pane Just ! Click on the message
73 Make the other open , Schedule changes, the active . Click here
74 Close the message that is currently open.
75 Use Outlook Express Help to access information on unread messages. unread messages Click here then type Click here then type unread messages Click here
76 Remove the Flag heading from the Inbox.
77 Change the column headers so that the Priority column is no longer displayed
78 Remove the Toolbar from Outlook Express application window.
79 Flag the message from Rob Wilson. Select the message
80 Remove the flag from James Corrigan’s message. Select the message
81 Mark the message from Rob Wilson as Unread. Select the message
82 Without opening this attachment, save it onto the Desktop of this computer Right click on the attachment
83 Reply to Rob Wilson’s with the message Yes, it will. This should be sent only to Rob Wilson. Do not open the message. Send the message immediately when you have finished. Select the message Click here then type Yes, it will Yes, it will
84 Reply to everyone that received Sean White’s with the message Can you call me about this? Do not open the message. Send the message immediately when you have finished. Select the message Click here then type Can you call me about this? Can you call me about this?
85 Change the application settings so that when you reply to messages, the original message does not display.
86 Create a new message. Do not use any stationery templates for this question. Click here
87 Open the New Message window to create a new message. Click here
88 Make the mail recipient of this message. Click the SUBMIT button when you have finished. SUBMIT
89 Send a carbon copy of this message to Send the message immediately when you have finished.
90 Enter the phrase Company meeting into the appropriate field to indicate what the message is about Send the message when you have finished. Company meeting
91 Change the subject of this message to Meeting. Send the message immediately when you have finished. Meeting Delete usingBackspace Type Meeting
92 Attach the file Accounts.xls to this message. This file is in the My Documents folder.
93 Change the priority for this message to High.
94 Forward the message from Rob Wilson to Do not open the message. Send the message immediately when you have finished. Select the message
95 Copy the selected text and paste it below the line The details are as follows:
96 Paste the contents of the clipboard into the subject area of the window. Right Click
97 Delete the file entitled Agenda.doc from this message. Right Click on the attached file
98 Delete the file attachment from this message. Right Click on the attached file
99 Create a new group called Research Team that contains addresses for Rob Wilson and Sean White. Research Team Research Team
100 Add Eric Lambert to the Sales group in this address BOOK
101 Use the application’s built-in features to automatically add the sender of this message to your Address Book. Right click here
102 There is group in the Address Book for this account. Make the group the recipient of this message.
103 Messages under the Subject heading Planning are located in various mail folder in Outlook Express. Use the Find tool to display a complete listing of them. Planning
Messages from Rob stone are located in various mail folder in Outlook Express. Use the Find tool to display a complete listing of them. 104 Rob stone
105 Create a new folder in your Inbox and name this folder Personal. Personal Click then type Personal
106 Move the message from James Corrigan to the Drafts folder. Right click on the message
107 Sort the Inbox messages by sender.
108 Delete the message from Selina Kyle. Select the message
109 Move the deleted mail from Claudia Walker back to the Inbox. Right click on the message
110 Empty the Deleted Items folder. Do not use the Delete key for this exercise. Right Click on the Deleted Items
111 Print two copies of this entire message.
` Print just the selected text of this message.
Use the application spell check tool to correct the spelling mistake tomorrw in this message.
I can meet with you after lunch.
I can meet with you after lunch.