You are on page 1of 4

THE INTERNET

1. What is a browser/internet browser? List the 3 commonly used browsers.


An internet browser is a software application that is used to view web pages. Most browsers can also be
used to send and receive email.
Three commonly used browsers are:
1. Google Chrome
2. Mozilla Firefox
3. Internet Explorer
2. Your screen display size will change the viewing size of any website you visit.
What is the term for screen display size? (Hint: starts with an "R"). Resolution
a. What is the unit of measure for it? Pixels
b. Can it be changed? If so, how? Yes it can be changed by: 1. open
display settings by clicking the start button, clicking control panel,
clicking appearance and personalization, clicking personalization and
then clicking display settings. 2. Under resolution, move the slider to
the resolution you want and then click apply. Or right click, display
settings, under resolution move the slider to the resolution you want
and then click apply.
c. You can also zoom in and out to change the site viewing size
without changing the display settings. How? Ctrl scroll wheel.
3. Indicate what the following acronyms stand for and define each.
a. ISP Internet Service Provider: An organization or company that provides access to the internet.
b. URL Uniform Resource Locator: Global address of documents and other pages and resources
on the world wide web.
c. HTML HyperText Markup Language: The main markup language for displaying web pages
and other information that a browser can display.
d. FTP File Transport Protocol: A standard network protocol that is used to transfer files from one
host to another over a TCP-based network like the internet.
e. PDF Portable Document Format: A file format that provides an electronic
image of text or text and graphics that looks like a printed document and can
be viewed regardless of the program that someone has.
4. Define the following terms
f. Favourites: Web pages or URLs that were chosen to be stored so they can be
accessed quickly
f.
Bookmarks/Internet Bookmarks: Stored web pages or URLs that are stored so they can be
retrieved quickly..
f.
Encryption/Data Encryption: Its coding that protects your data from identity theft when you use
your credit card.
f.
Cookies: A system that allows a web server to send a packet of information to a web browser
which is stored.
f.
Archive: A digital library that offers permanent storage and access to collections of digitized
materials.
f.
Spam: A junk email sent to a large group of people that is prohibited or discouraged.
f.
Firewall: A part of a network or computer system that is designed to block unauthorized websites.
f.
Netiquette: The correct or acceptable way of communicating on the internet.
f.
IP Address (what it stands for, what it is, what's the controversy?)Internet Protocol
Address (IP Address): a unique string of numbers that is separated by periods. It identifies every

computer that is attached to the internet. The controversy is that it prevents internet users from
having privacy on the internet.
f.
Blog: A website on which an individual user or a group of users post or record opinions,
information, etc. on a regular basis.
f.
Twitter: A social network and microblog that allows users to send, post and read text-based
messages of up to 140 characters called tweets.
f.
Phishing: The fraudulent action of sending emails and pretending that they are from legitimate
companies to induce people to reveal their personal information.
f. Domain Name (and give 3 examples): A series of alphanumeric
strings that are separated by periods. They serve as an address for a
computer network and they have to be rented or bought. ex.
sirwinston.dsbn.org, google.ca, facebook.com
f. Shareware: Free software that can be downloaded and is
informally distributed for evaluation, after which a fee may be
requested for continued use.
f.
Bing: A web search engine from microsoft. It was formerly known as Live Search,
Windows Live Search and MSN Search.
5. When you hover over a link on any web page and look on the status line at the bottom of the
screen, you'll see where that link goes. If you see a number sign near the end of that line (#),
what does it mean? It means that its a URL fragment and that if you click it, it will take you to a
specific part of the same webpage.

1. What is a search engine? Give 3 examples of search engines. A search engine is a


program that searches files, documents or data for a specific keyword and retrieves a
list of documents , data and files from a database network.
ex. Google, Bing, Yahoo
2.
In e-mail what do each of these stand for? What do they mean/how do they work?
a.
cc Carbon Copy: It is an exact copy of an email that is being sent to another recipient.
The abbreviation (cc) indicates those who are being sent the copy of the email.
b.
bcc Blind Carbon Copy: it is an exact copy of an email that is being sent to another
recipient but it doesnt indicate the list of people who are receiving it.
3.
In gmail and hotmail what is the maximum combined size of all attachments in an email
message? The combined size of all attachments in an email message is 25 megabytes.
4.
You cannot send a regular folder as an email attachment, but there is something you can
do to be able to. Yes
a. List the steps to set up a folder so that you can send it as an
attachment. Right click, click send to, click compressed zip folder.
Email a zip folder.
b. When you get the email message, download the folder then, to
unzip it, right-click on the zipped folder and choose
open .
c.
4.
Printing a webpage from Internet Explorer
a.
If you print a web page will it always fit on 1 printed page? No.
b.
To print a web page always print from preview (File Menu > Print Preview). The Toolbar
at the top of the Preview Screen looks like the one below. Indicate the letter of the tool to click
on to do the following:

i.
To View Full Width - _ F_ _
ii.
To shrink the size to View Full Page - J___
iii.
The Page Setup Tool (to set margins, landscape...) - ____d____
iv.
To Turn Headers and Footers Off - ___e_____
v.
To Print only what you've Selected on the Page - ____right click print_____
vi.
To change the size of the document to get it to print on 1 page - __Choose custom and
pick the percent______
vii.
To turn the page sideways (landscape) - _____C________
viii.
To see more than one page at a time? ___h_____
ix.
To Print - _A_.
x.
Question - When you click on the Print Tool, will it then allow you to then change the
printer to send it to? Yes
xi.
Question - On the Preview Screen where can you look to see how many pages are in the
web page? The bottom of the screen
xii.
xiii.
XAINAS QUESTIONS
11. Cloud Computing. -- Go to www.computer.howstuffworks.com/cloud-computing.htm
a.What is it? The practice of using a network of remote servers hosted on the Internet to store,
manage, and process data, rather than a local server.
b. What are the concerns with and what are the counterarguments for each concern? (See
Table of Contents at the top of above webpage) Security is a problem because all secret
information is expsosed.
12. Viruses -- Go to www.computer.howstuffworks.com/virus.htm > Read the article and scroll down to
watch the video called "Trojan Horse Viruses Explained". Give a short, point-form description of each of
the following terms.
1. Virus
computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs
against your wishes.

2.

Email Virus

3.

Trojan Horse

A virus that comes within an attached file in an e-mail message.


An application that masquerades as a legitimate file or helpful program but whose real purpose is, for
example, to grant a hacker unauthorized access to a computer.

4.

Worm

A computer worm is a standalone computer program that replicates itself in order to spread to other
computers.

13. Virus Origins -- In the Table of Contents at the top of www.computer.howstuffworks.com/virus.htm


go to "Virus Origins"
a. How are computer viruses created?
They are made using hidden code and usually inserted into software downloads.

b. List the 3 reasons given in this site for why people do it.

To take control of a computer and use it for specific tasks


To generate money
To steal sensitive information (credit card numbers, passwords, personal details, data etc.)

******c. What point are virus creators missing?


14. How to Protect Your Computer from Viruses -- Go to http://computer.howstuffworks.com/virus6.htm
and summarize by making one short point for each of the bulleted items listed there.
1. Virus- Virus protector software. Use a more secure operating system like Linux and Mac OS
X because they are targeted less.
2.Email Virus -Never accept an email from someone you dont know. Never run executables that
come in emails.
2. Worms - Dont use an insecure operating system or network
3. Trojan Horse - Dont download files when you dont know if theyre legitimate and dont
download files from unknown sources
4. Virus Orgins - Try and get rid of the virus before it can spread to other programs and
documents

You might also like