module7 information & communication. 2 index 1.concepts & terms 2.internet explorer 3.e-mail...

117
Module7 Information & Communication

Upload: preston-mills

Post on 25-Dec-2015

217 views

Category:

Documents


1 download

TRANSCRIPT

Module7

Information & Communication

2

INDEXINDEX

1.1. Concepts & Terms Concepts & Terms

2.2. Internet ExplorerInternet Explorer

3.3. E-Mail & Outlook E-Mail & Outlook

ExpressExpress

3

SECTION ONESECTION ONE

Concepts & Terms

4

The World Wide Web is:The World Wide Web is:

1.1. a huge collection of linked files held on computers all over the world.a huge collection of linked files held on computers all over the world.

2.2. a world wide network of telephone cables and related equipment.a world wide network of telephone cables and related equipment.

3.3. a network of computers and cables that connect e-mail users all around the a network of computers and cables that connect e-mail users all around the

world.world.

4.4. a global network of communication satellites. a global network of communication satellites.

5

Name of file

Protocol used

Domain used

Commercial domain

Indicates World Wide Web

http:// WWW. flexitrain .com /Orders.htm

6

The set of rules used for transferring files on the World Wide Web.

The unique address for a web page

A clickable item in a web page that connects to another web page.

A company that enables individuals to connect their PCs to the internet.

A set of rules frequently used to transfer web pages to a host server on the Internet.

URL ISP Hyperlink FTP HTTP

7

Which one of these statements is false?Which one of these statements is false?

1.1. The content of web pages that you view while using a browser is lost from The content of web pages that you view while using a browser is lost from memory after the computer is shut down.memory after the computer is shut down.

2.2. Web browsers are software applications that are used to visit web pages in Web browsers are software applications that are used to visit web pages in various.various.

3.3. Browsers contain hypertext links to different documents and sites on the Browsers contain hypertext links to different documents and sites on the web.web.

4.4. A web browser is a site where you can search for information on the web.A web browser is a site where you can search for information on the web.

8

An internet tool that enables you to quickly find information on An internet tool that enables you to quickly find information on the web is called:the web is called:

1.1. a uniform Resource Locatora uniform Resource Locator

2.2. a Search Enginea Search Engine

3.3. a Find Wizarda Find Wizard

4.4. Online HelpOnline Help

9

A search engine is a programA search engine is a program

1.1. that helps you to find information located on the internet.that helps you to find information located on the internet.

2.2. that can be used to find errors in the HTML code for a web page.that can be used to find errors in the HTML code for a web page.

3.3. that is used to find the web sites you have most recently visited.that is used to find the web sites you have most recently visited.

4.4. on the internet that locates all users logged onto a web site.on the internet that locates all users logged onto a web site.

10

A cache helps web pages you haveA cache helps web pages you havevisited recently to load more quickly,visited recently to load more quickly,

A cache enables a web site to recallA cache enables a web site to recalldetails of your previous visit.details of your previous visit.

Your browser uses a cookie to store theYour browser uses a cookie to store thefiles you download from the internet.files you download from the internet.

A cookie is a small file sent to yourA cookie is a small file sent to yourcomputer when you visit a website.computer when you visit a website.

Cookie & CacheCookie & Cache

If a cookie gets too full, older files areIf a cookie gets too full, older files aredeleted to make space for new once.deleted to make space for new once.

11

Which one of these statements about digital signatures true?Which one of these statements about digital signatures true?A digital signature:A digital signature:

1.1. Automatically encrypts the contents of an e-mail.Automatically encrypts the contents of an e-mail.

2.2. Is a scanned image of your real signature.Is a scanned image of your real signature.

3.3. Is used to verify the identity of the sender of a message.Is used to verify the identity of the sender of a message.

4.4. Is used to add a personal touch to e-mail messages.Is used to add a personal touch to e-mail messages.

12

Drag the following statements about Drag the following statements about digital certificatesdigital certificates to the appropriate boxes. to the appropriate boxes.

TrueTrue FalseFalse

Enable you to registerEnable you to registerdownloaded software.downloaded software.

Can be used to provideCan be used to providea digital signature.a digital signature.

Enable you to print a guaranteeEnable you to print a guaranteefor goods purchased online.for goods purchased online.

Are commonly used to make webAre commonly used to make web sites more securesites more secure.

13

Which one of the following statements about online credit card Which one of the following statements about online credit card transactions is true?transactions is true?

1.1. E-mail is the quickest and most secure way of sending credit card details.E-mail is the quickest and most secure way of sending credit card details.

2.2. A web page displaying this symbol is locked: you can’t enter credit card A web page displaying this symbol is locked: you can’t enter credit card detailsdetails

3.3. You should only enter credit card details into a form secured by a digital You should only enter credit card details into a form secured by a digital certificate.certificate.

4.4. Using your credit card on the internet is safer than a face-to-face Using your credit card on the internet is safer than a face-to-face transaction.transaction.

14

The main purpose of a firewall is to:The main purpose of a firewall is to:

1.1. Prevent unauthorized users from gaining access to a network.Prevent unauthorized users from gaining access to a network.

2.2. Protect network servers from the risk of fire.Protect network servers from the risk of fire.

3.3. Prevent employees from accessing the internet during work hours.Prevent employees from accessing the internet during work hours.

4.4. Prevent network users from sending and receiving personal e-mail.Prevent network users from sending and receiving personal e-mail.

15

Which two of the following statements about Protected website Which two of the following statements about Protected website are true?are true?

1.1. You are assigned a username.You are assigned a username.

2.2. When you enter your username, asterisks (*) appear in place of the letters.When you enter your username, asterisks (*) appear in place of the letters.

3.3. Once you have a login and Password you can access all areas of a Once you have a login and Password you can access all areas of a

protected website.protected website.

4.4. You can only view pages of a protected website if you are registered user.You can only view pages of a protected website if you are registered user.

5.5. A Protected web site is one that is free from viruses.A Protected web site is one that is free from viruses.

16

Which one of the following statements about online credit card Which one of the following statements about online credit card transactions is true?transactions is true?

1.1. This global symbol means a site is secure for entering credit card details.This global symbol means a site is secure for entering credit card details.

2.2. You should enter credit card details onto a form on a secure web site.You should enter credit card details onto a form on a secure web site.

3.3. Your credit card statement may not include extra costs such as shipping.Your credit card statement may not include extra costs such as shipping.

4.4. E-mail is the most secure way to send credit card details to a web site.E-mail is the most secure way to send credit card details to a web site.

17

Which one of these statements is true?Which one of these statements is true?

1.1. It is not possible to encrypt content of e-mail messages.It is not possible to encrypt content of e-mail messages.

2.2. Encryption prevents unauthorised users from reading data.Encryption prevents unauthorised users from reading data.

3.3. You can’t send encrypted data out over the internet.You can’t send encrypted data out over the internet.

4.4. Encryption converts data so that it can be understood.Encryption converts data so that it can be understood.

18

Which two of these statements about encryption are true?Which two of these statements about encryption are true?

1.1. An encryption key used to compress documents that you wish to store safely.An encryption key used to compress documents that you wish to store safely.

2.2. Encryption prevents unauthorized users from reading your data.Encryption prevents unauthorized users from reading your data.

3.3. Encryption converts data so that it cannot be understood.Encryption converts data so that it cannot be understood.

4.4. You can’t encrypt your e-mail messages.You can’t encrypt your e-mail messages.

5.5. Encryption can only be used to encrypt text files.Encryption can only be used to encrypt text files.

19

SECTION TWOSECTION TWO

Internet Explorer

20

Use the web address http://www.macromedia.com to navigate to the Macromedia website.

Press Enter when you have finished.

http://www.macromedia.com

Click then typeClick then typehttp://www.macromedia.com

Press Enter

21

Make this page http://www.fruit.com your browser’s new Home Page.

Don’t change any other settings.

23

Open this web page in a new window.

24

This web page is not displaying properly. Stop this web page from downloading.

25

This web page has not loaded properly.

Reload the web page to your browser.

26

Refresh this web page.

27

Use Internet Explorer Help to access information about History lists.

Click here then type Click here then type History listsHistory lists

History lists

28

Hide the Standard Buttons toolbar of this web browser.

29

Change the settings of this web browser so that the images will NOT be displayed.

Don’t change any other settings.

30

Use the browser address bar to display previously visited URLs and access the site that you visited before this one.

31

Clear this browser’s entire History list.

Don’t use the History Bar to carry out this task

32

A web search has been carried out producing the results displayed on screen.

Use these results to navigate to Kennel Clubs web site

Click on Click on Kennel ClubsKennel Clubs

33

You just navigate to this web page using a hyperlink.

Return to the previous page.

34

Use this site to reserve a single room at Park’s Inn.

Follow the instructions that are provided on the web page.

Click on an option to make a reserve

Rooms / Accommodation

Events and venues

Select: a hotel from the dropdown box.

and a room from this dropdown box.

Now press ‘book now’ button to reserve your room

book now!

Tomas hotelPark’s InnVenus

Single roomDouble room

Use this site to reserve a single ticket for the concert in the park.

Follow the instructions that are provided on the web page.

Click here Click here

Click hereClick hereClick hereClick here

Click hereClick here

Click hereClick here

36

Without changing its name, add this web page to your favorites.

37

38

The MSN web site is one of your listed favorites.

Use this fact to navigate to MSN site.

39

Create a new folder for sorting some of your favorites.

Call this folder Cooking.

Type CookingType Cooking

40

Add this web page to the Media folder in your favorites.

41

Delete Club Internet from your favorites menu.

42

43

Navigate to the www.AltaVista.com Search engine.

http://www.AltaVista.com

Click then typeClick then typehttp://www.AltaVista.com

Click Go

44

““movies reviews” OR Cinemasmovies reviews” OR Cinemas ““movies reviews” movies reviews” ــــــ CinemasCinemas

““movies reviews” ? Cinemasmovies reviews” ? Cinemas ““movies reviews” @ Cinemasmovies reviews” @ Cinemas

““movies reviews” + Cinemasmovies reviews” + Cinemas

Using click and drag facility to move the text into the look for box thatwould return a list of movie reviews that include cinemas

45

-

46

Modify the search requirements to include any of the words listed in the search criteria Click go! To submit your answer.Do not change any other setting.

47

Modify the search requirements to include an exact phrase match of the words listed in the search criteria. Click go! To submit your answer.Do not change any other setting.

48

Modify the search requirements to include a look-it-up categories only for the words listed in the search criteria. Click go! To submit your answer.Do not change any other setting.

49

Copy the selected text from this web page to the clipboard.

50

Save this web page as a text file onto the A: drive of this computer.

Note: this is a simulation – you don’t need a floppy disk in the disk drive.

51

Save a copy of the photograph onto the Desktop of this computer.

Right click on Right click on the the photograph

52

Download the Virtual Tour movie file to the My Document folder.

53

Click the option that would download the selected file with the least risk of virus Infection?

54

Click the option that would enable you to run a virus check on a file before opening it on your PC.

55

Preview this web page for printing.

56

Print one copy of this web page using the current settings.

57

Print three copies of this web page using the current settings.

Change settings for this web page so that it will print an 8mm top margin.

59

SECTION THREESECTION THREE

E-Mail & Outlook Express

60

At

Company department

User name

Country domain

Domain name

bsmithbsmith @@ Accounts.Accounts. Encel.Encel. ukuk

At

Domain extension

User name

Domain name

@@JamesJames microelecticnetmicroelecticnet Co.uk.Co.uk.

62

Which one of these Messages conforms to the basic rules of netiquette? Which one of these Messages conforms to the basic rules of netiquette?

63

Clue:Clue:

Unsolicited e-mail is often referred to as:Unsolicited e-mail is often referred to as:

(1 word, 4 letters)(1 word, 4 letters)

P A M

64

Which two of these statements about e-mail are true?Which two of these statements about e-mail are true?

1.1. You must send and receive e-mail on separate telephone lines.You must send and receive e-mail on separate telephone lines.

2.2. E-mail stands for Electronic Mail.E-mail stands for Electronic Mail.

3.3. The cost of sending e-mail depends on where the recipient lives.The cost of sending e-mail depends on where the recipient lives.

4.4. You can only send or receive e-mail offline.You can only send or receive e-mail offline.

5.5. The distance over which e-mail is sent does not significantly affect the The distance over which e-mail is sent does not significantly affect the speed of delivery.speed of delivery.

65

Which one of these statements about e-mail is true ?Which one of these statements about e-mail is true ?

1.1. You must send and receive e-mail on separate telephone line.You must send and receive e-mail on separate telephone line.

2.2. The cost of sending e-mail depends on where the recipient lives.The cost of sending e-mail depends on where the recipient lives.

3.3. You can only send or receive e-mail offline.You can only send or receive e-mail offline.

4.4. Sending message by e-mail is easier than Postal MailSending message by e-mail is easier than Postal Mail

66

Which one of those statements about e-mail is true?Which one of those statements about e-mail is true?

1.1. You can only access one e-mail account at any time.You can only access one e-mail account at any time.

2.2. Each user can only access their e-mail account from a signal PC.Each user can only access their e-mail account from a signal PC.

3.3. You need a user name and password to access your e-mail.You need a user name and password to access your e-mail.

4.4. Email accounts on a single PC share the same folders.Email accounts on a single PC share the same folders.

67

Which two of these statements about web-based e-mail are true?Which two of these statements about web-based e-mail are true?

1.1. Web-based e-mail is only available from Microsoft.Web-based e-mail is only available from Microsoft.

2.2. Web-based e-mail can only be accessed from the PC you set it up on.Web-based e-mail can only be accessed from the PC you set it up on.

3.3. Computers in internet cafés can be used to access web-based e-mail.Computers in internet cafés can be used to access web-based e-mail.

4.4. You can often access web-based e-mail from computers in libraries.You can often access web-based e-mail from computers in libraries.

5.5. With web-based e-mail you can only send and receive text messages.With web-based e-mail you can only send and receive text messages.

68

Which two of the following statements, about organizing your Which two of the following statements, about organizing your e-mail within most popular e-mail applications, are true?e-mail within most popular e-mail applications, are true?

1.1. You need to create folders before you can send or receive e-mail.You need to create folders before you can send or receive e-mail.

2.2. You must read e-mail before you can organize it into folders.You must read e-mail before you can organize it into folders.

3.3. You can use cut-and-paste to move mail to different folders.You can use cut-and-paste to move mail to different folders.

4.4. You must open an e-mail before you can duplicate it.You must open an e-mail before you can duplicate it.

5.5. E-mail messages can be sorted alphabetically inside a folderE-mail messages can be sorted alphabetically inside a folder

69

Which two of these statements regarding the risk of transmitting Which two of these statements regarding the risk of transmitting viruses via e-mail are true?viruses via e-mail are true?

1.1. Viruses can only be transmitted via an e-mail attachment.Viruses can only be transmitted via an e-mail attachment.

2.2. A virus can spread via e-mail by mailing itself to everyone in a victim’s A virus can spread via e-mail by mailing itself to everyone in a victim’s address book.address book.

3.3. Viruses are only spread via unsolicited mail.Viruses are only spread via unsolicited mail.

4.4. You should not open e-mail if it has a suspicious subject line.You should not open e-mail if it has a suspicious subject line.

5.5. You are more at risk from viruses if you use web based e-mail.You are more at risk from viruses if you use web based e-mail.

70

Which two of these statements on the risk of transmitting viruses Which two of these statements on the risk of transmitting viruses via e-mail are true?via e-mail are true?

1.1. You are less at risk from viruses if you use web based e-mail.You are less at risk from viruses if you use web based e-mail.

2.2. You can safely open an attachment sent to you by a friend.You can safely open an attachment sent to you by a friend.

3.3. You can set anti-virus software to automatically scan new content arriving You can set anti-virus software to automatically scan new content arriving on your PC.on your PC.

4.4. If you open an attachment with a virus, it can mail itself to everyone in your.If you open an attachment with a virus, it can mail itself to everyone in your.

5.5. Viruses are only spread via unsolicited mail.Viruses are only spread via unsolicited mail.

71

Open the e-mail message from Selina Kyle.

Double click onKyle, Selina

72

Display the message from Selina Kyle in the Preview pane

Just !Just !Click on the message

73

Make the other open e-mail, Schedule changes, the active e-mail.

Click hereClick here

74

Close the e-mail message that is currently open.

75

Use Outlook Express Help to access information on unread messages.

unread messages

Click here then type Click here then type unread messages

Click hereClick here

Click hereClick here

76

Remove the Flag heading from the Inbox.

77

Change the column headers so that the Priority column is no longer displayed

78

Remove the Toolbar from Outlook Express application window.

79

Flag the message from Rob Wilson.

Select the message

80

Remove the flag from James Corrigan’s message.

Select the message

81

Mark the message from Rob Wilson as Unread.

Select the message

82

Without opening this attachment, save it onto the Desktop of this computer

Right click on the attachment

83

Reply to Rob Wilson’s e-mail with the message Yes, it will. This should be sent only to Rob Wilson. Do not open the message.Send the message immediately when you have finished.

Select the messageSelect the message

Click here then typeClick here then typeYes, it will

Yes, it will

84

Reply to everyone that received Sean White’s e-mail with the message Can you call me about this? Do not open the message.Send the message immediately when you have finished.

Select the messageSelect the message

Click here then typeClick here then typeCan you call me about this?

Can you call me about this?

85

Change the application settings so that when you reply to messages, the original message does not display.

86

Create a new e-mail message.

Do not use any stationery templates for this question.

Click here

87

Open the New Message window to create a new message.

Click here

88

Make [email protected] the mail recipient of this e-mail message.

Click the SUBMIT button when you have finished.

SUBMITSUBMIT

[email protected]

89

Send a carbon copy of this message to [email protected]

Send the message immediately when you have finished.

[email protected]

[email protected]

90

Enter the phrase Company meeting into the appropriate field to indicate what the message is aboutSend the message when you have finished.

[email protected]

Company meeting

91

Change the subject of this message to Meeting.

Send the message immediately when you have finished.

Meeting

Delete usingBackspaceBackspaceType Meeting

92

Attach the file Accounts.xls to this message.

This file is in the My Documents folder.

[email protected]

93

Change the priority for this message to High.

94

Forward the e-mail message from Rob Wilson to [email protected] not open the message.Send the message immediately when you have finished.

Select the message

[email protected]

95

Copy the selected text and paste it below the line The details are as follows:

96

Paste the contents of the clipboard into the subject area of the window.

Right Click

97

Delete the file entitled Agenda.doc from this e-mail message.

Right Click on the attached file

98

Delete the file attachment from this message.

Right Click on the attached file

99

Create a new group called Research Team that contains addresses for Rob Wilson and Sean White.

Research Team Research Team

100

Add Eric Lambert to the Sales group in this address BOOK

101

Use the application’s built-in features to automatically add the sender of this message to your Address Book.

Right click here

102

There is group in the Address Book for this e-mail account.

Make the group the recipient of this message.

103

Messages under the Subject heading Planning are located in various mail folder in Outlook Express.Use the Find tool to display a complete listing of them.

Planning

Messages from Rob stone are located in various mail folder in Outlook Express.Use the Find tool to display a complete listing of them.

104

Rob stone

105

Create a new folder in your Inbox and name this folder Personal.

Personal

Click then typePersonal

106

Move the e-mail message from James Corrigan to the Drafts folder.

Right click on the message

107

Sort the Inbox messages by sender.

108

Delete the e-mail message from Selina Kyle.

Select the message

109

Move the deleted mail from Claudia Walker back to the Inbox.

Right click on the message

110

Empty the Deleted Items folder.

Do not use the Delete key for this exercise.

Right Click on the Deleted Items

111

Print two copies of this entire message.

`

Print just the selected text of this e-mail message.

Use the application spell check tool to correct the spelling mistake tomorrw in this e-mail message.

I can meet with you after lunch.

I can meet with you after lunch.