0% found this document useful (0 votes)
117 views8 pages

Web Browsing and Communication Question Bank: First Year Students

The document discusses web browsing and communication. It contains a question bank for first year students with questions related to topics like secure socket layer (SSL), malware, internet terminology, email structure, and communication terms.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
117 views8 pages

Web Browsing and Communication Question Bank: First Year Students

The document discusses web browsing and communication. It contains a question bank for first year students with questions related to topics like secure socket layer (SSL), malware, internet terminology, email structure, and communication terms.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Web browsing and

communication
Question Bank
First year students

Prepared by: Drawsh J. Mohamed


3rd Apr 2016
Q.1/Write down the steps to make a secure connection between Sender (Alice) and Receiver (Bob) over
Secure Socket Layer (SSL), when Alice and Bob communicate with each other, this connection should
prevent Eve to attack their communication.
A/

 Browser connects to a web server (website) secured with SSL (https).

A. Browser requests the server to identify itself.


B. Server sends a copy of its SSL Certificate.
C. Browser checks the certificate root against a list of trusted CAs and that the certificate is
unexpired, If the browser trusts the certificate, it creates and sends back a key.
D. Server accepts the key and send back acknowledgement.
 Server and Browser now encrypt all transmitted data with that key.

Q.2/ Choose the correct answer:


1. Which one of the following describes software that is created and distributed for malicious purposes?
(A) Freeware (B) Vaporware (C) Shareware (D) Malware

2. Which one of the following is used to connect individuals, businesses, or other organizations to the Internet?
(A) Independent Software Provider (B) Universal Resource Locator
(C) Digital Certificate (D) Internet Service- Provider

3. Which one of the following refers to the transfer protocol in the URL “http://www.ecdl.org”?
(A) .org (B) http:// (C) //www. (D) ecdl
4. Which one of the following is a digital media file that is downloaded from the Internet for playback on
portable media players and personal computers?
(A) Malware (B) Blog (C) Cookie (D) Podcast

5. Type of software that gathers information of you on your computer.


(A) Malware (B) Spyware (C) Anti-virus (D) Firewall

6. Type of malware that copies itself inside your computer.


(A) Trojan-Horse (B) Virus (C) worm (D) None of them
7. Is a protection wall between user and Hackers when user connects to the Internet?
(A) Fire Wall (B) Fire Fox (C) Browser (D) URL

8. ____________ is a way to change the data as much as possible to protect our data from Hackers?
(A) Encryption (B) decryption (C) www (D) ISP

9. SSL is a technology that used to:


(A) Hack people (B) make a secure communication between client-And server
(C) play digital media files (D) All of them

10. The ____________consists of all computers and networks across the world which are able to
communicate with each other.
(A) Internet (B) Arpanet (C) Google Chrome (D) ISP

Q.3/ State the difference between RSS and Podcast?


A/
RSS: is used to deliver to the user the content of a website in the form of a brief description (summary), with
clickable links leading to the full content while Podcasts: are another form of syndicated feed, by which
digital media files are can be downloaded to subscriber’s computer.

Q.4/ What do these abbreviation stand for?


1- RSS 2- HTTPS 3- URL 4- ISP 5- WWW
A/
1- RSS really simple syndication
2- HTTPS Hypertext Transfer Protocol over secure socket layer
3- URL Uniform Resource Locator
4- ISP Internet Service Provider
5- WWW World Wide Web

Q.5/ Describe this URL structure.

https://www.youtube.com/index.html

A/
1- https:// stands for hypertext transfer protocol
2- www. Indicates that this is a World Wide Web address
3- youtube domain name
4- .com TLD (top level domain)
5- Index.html File name

Q.6/ Rewrite the true consequence (correct order) of this email content:

1. I enjoyed your presentation about [topic] on [date]. “Compliment”


2. I have a proposition/opportunity I think you may be interested in “Reason for email”

3. I will call you on Tuesday at Lunch to see how things are progressing “Call to action”
4. Dear Mr. Smith “Greeting”
5. Feel free to contact me if you have any questions or issues “Closing Line”
6. I found your details on xyz website “How you got their details”
7.
We feel that your proposal is very workable
with the proposed cost and applications.
Hence, Steel Technology Solutions is
accepting your proposed project. We are “Situation”
agreeable to the terms and conditions stated
in your proposal with no amendments.

8. Yours Sincerely,

Matthew C. Hinson “Signature”

Drummer Lights Industry

A/

A. Salutation

a. Greeting

b. a compliment or pleasantry

c. How you got their details

d. reason for email

B. Body Topic

a. Situation

b. Call to Action

C. Closing

a. Closing Line

b. Signature

Q.7/ Write down only two of the Internet forum’s “Message board” advantages.

A/
1- Ability to express and see differing views and opinions on a diverse range of topics.
2- Forums create a discussion environment by saving any information posted on a certain topic for others to
see at any time
Q.8/ Search engine uses both Indexing and crawling techniques to perform its task which is searching
and providing answers, thus define both of them.

A/

1- Crawling and Indexing: Crawling and indexing the billions of documents, pages, files, news, videos, and
media on the World Wide Web.
2- Providing Answers: Providing answers to user queries, most frequently through lists of relevant pages
that they've retrieved and ranked (arranged) for relevancy.

Q.9/ Write down the protocols (abbreviations of them) that are used to transfer the mails from sender to
a receiver.

A/ SMTP, POP, IAMP, HTTP

Q.10/ Search on the web exercise:


Fill in the blanks:
1. If you interested in searching social networking on the web, the best writing technique to prevent
irrelevant results is to type the word as ---“ social networking “-----------------.
2. During the search when you want to extract some topics in the result you will use
------Minus---------- Symbol.

Q.11/ What are HTTP and FTP, and what are the issues of using them?

A/

1- Any specific type of communication that takes place needs additional rules that define how it will take
place, when HTML pages are transmitted across the Internet, the procedures are defined by
another protocol called HTTP or Hypertext Transfer Protocol.
2- One of the features of the Internet is the ability to download files from sites. Downloading files
requires another protocol called FTP or File Transfer Protocol.

Q.12/ what is an e-mail structure (email makeup)?

A/ aperson@aprovider.ending

Q.13/ Define the following terms that are the communication terms:-
1. SMS 2. VOIP 3. IM 4. Online community 5. Internet forums
6. Chat rooms 7. Online games
A/
1. SMS: is a mean of sending Short text messages between mobile phones, it has become an increasingly
popular form of communication.
2. VOIP: enables voice messages to be sent from one computer to a computer over the Internet, using a
Headphone users can talk for free to their VoIP contacts, via programs such as Skype or Windows Live
Messenger.
3. IM: is a form of online textual conversation.
4. Online community: an online activity also known as a virtual community. It is a group which
communicates and interacts either the internet-using text, voice or video.
5. An Internet forum: or message board, is an online discussion site where people can hold conversations
in the form of posted messages.
6. Chat rooms: Via either text, voice or video users converse with each other in real-time over the internet.
7. Online computer games: Via the internet, users can connect to interactive, multiplayer computer games.
This gives users the ability to play with other users rather than the computer.

Q.14/ State the advantage and disadvantage of the Internet forums.


A/
Advantage Disadvantage

 Ability to express and see differing views and  Opens you up to hackers
opinions on a diverse range of topics.  Creating a successful forum is exhausting
 Forums create a discussion environment by  Administrators can edit people’s posts, and
saving any information posted on a certain they can ban/mute people if they put some
topic for others to see at any time ideas with which they don’t feel comfortable
 Due to continuous posting, users (e.g. with, even if the ideas may be useful and true
students) increase their writing skills and to others.
habits  Etc.
 Relationships can easily be made between
people through active comments and posts.
 Etc.

Q.15/ what is the term “Phishing” means, and what is the purpose of Phishing mails?
A/
 It comes from password harvesting” or fishing for passwords, Phishing is a kind of deception (trick) in
which the attacker pretends to be someone else in order to obtain sensitive information from the victim.

Q.16/ What should we do if we receive phishing e-mails


A/
1- Delete them from spam folder
2- Forward the email to the “report phishing sites”.

Q.17/ What are SPMAS?


A/
 Spam is flooding the Internet with many copies of the same message, in an attempt to force the message
on people who would not otherwise choose to receive it.
Q.18/ How do the spammers collect the addresses of the victims?
A/
 Spammers collect email addresses from chatrooms, websites, customer lists, and newsgroups and are
sold to other spammers.

Q.19/ what is the term “email appending”?


A/
 "Email appending" or "epending" is another way which spammers to get victims email address which
they use known information about their target to search for the target's email address.

Q.20/ What are the Issues Created by SPAM?


A/
1. Unwanted email irritating Internet consumers.
2. Critical email messages are missed and/or delayed.
3. Loss of Internet performance and bandwidth.
4. Billions of dollars lost worldwide.
5. Increase in Worms and Trojan Horses.
6. Spam can crash mail servers and fill up hard drives.

Q.21/ What are the Real time Black-hole Lists (RBLs)?


A/
 RBL's are lists on the Internet that track the IP addresses of machines recently known to be Spamming.

Q.22/ State the difference between Formal and Informal emails?


A/
Formal Email Informal Email

 Written to a professor, colleague, boss, etc.  Written to friends and family


 Must always be professional  Accuracy and grammar (spelling and
 Accurate grammar, punctuation, and spelling punctuation) are not important
necessary  You can make up your own rules
Q.23/ Define the Internet?
A/
 Internet: consists of all computers and networks across the world which are able to communicate with
each other.

Q.24/ what is the purpose of using protocols?


A/
 Computers on the Internet use specific rules, called protocols, that define the procedures for
communication.
Q.25/ who will provide Internet access to individuals and organizations?
A/
 To access the Internet Backbone, you need to have a link to an organization that does. Special
types of businesses have arisen whose purpose is to provide links for individuals and small
organizations to the Internet. These companies are called Internet Service Providers or ISPs.

Q.26/ Define what are web browsers and give two examples?
A/
• A browser is a software or an application that has a very straightforward purpose, to locate files
using their URL and display their contents on-screen.
• Examples of browsers include Mozilla Firefox, Internet Explorer, Opera and Netscape, etc.

Q.27/ What are the web pages?


A/
• A web page or webpage is a document commonly written in Hypertext Markup Language (HTML) that
is accessible through the Internet or other network using a browser, a web page is accessed by entering a
URL address and may contain text, graphics, and hyperlinks to other web pages and files.

Q.28/ Define the Structure of a Web address?


A/
 Protocol – Subdomain or (WWW) – Domain name – TLD – Folder – File name
Ex: http://www.w3schools.com/html/default.asp
Q.29/ Write down only two email etiquette, when using electronic mails.

A/
1- Include a clear, direct subject line
2- Use a professional email address

You might also like