From Big Brother security myths to the fabrication of what the Internet actually is, cyberspace is full of fictions of its own. Can you call a myth's bluff? Test your knowledge on what's real and what's not in the globe's largest electronic world.
The Internet is the same as:
the World Wide Web
a single server
When was the Internet developed?
in the 1960s
in the 1980s
in the 1990s
In the early 1990s, the U.S. Postal Service publicly denounced which of the following rumors?
that the Postal Service would charge 5 cents for every e-mail sent over the Internet
that the Postal Service would monitor e-mail content
that the Postal Service would buy the Internet
If a file is on the Internet, it:
must be free
must cost money
can be free or cost money
According to a popular myth, which politician claimed he invented the Internet?
True or false: The emoticon, or the idea to use text to create facial expressions, was devised first by Scott Fahlman of Carnegie Mellon.
True. He's the only one who used emoticons in the 1980s.
False. He had nothing to do with emoticons.
False -- but he definitely popularized emoticons on the Internet.
Which of the following is true about free speech and the Internet in the United States?
You can say anything you want online.
Internet speech is as free as print, but like print, some areas receive no protection.
You can't criticize the government online.
With excess bottled water and hopes for the worst, the world survived the hysteria surrounding the "Y2K" Internet scare. Which year was Y2K centered around?
A common myth is that you're protected from malicious e-mails as long as you don't open or click which of the following?
both e-mail attachments and links
Can your Internet Service Provider (ISP) track which Web sites you see on the Internet?
Yes. ISPs do it every day -- and probably at this very moment.
Yes, ISPs are capable of tracking their customers, but they choose not to. In special cases, the U.S. Department of Homeland Security may ask ISPs to track the online activities of criminals.
Censoring users' access to certain content isn't a myth in some countries. Which of the following Web sites is dedicated to this issue?
the Web site CensorChina.com
the Web site Netpolice.com
The Web site GreatFireWallofChina.org
Which of the following crimes was the Department of Homeland Security falsely accused of?
installing "keyloggers" on Dell keyboards that track computer activity
trying to buy the Internet
censoring anti-government Web sites
What would it take for the Internet to collapse?
damage to the handful of Internet powerhouses
too many people accessing one Web site at the same time
We're not exactly sure, but we know that many components (rather than a few) would have to be damaged since the Internet is an enormous, global series of networks.
Everything you read on the Internet is:
Some is true, while some things are false.
One common perception about the Internet is that it's swarming with child predators. True or false?
True. Internet sex crimes most often involve pedophiles.
False. Adults are more often looking for unforced sexual encounters with partners who are underage.
Both options carry the same risk.
What is the term used to describe people who use too much bandwidth?
With the touch of a keyboard or click of a mouse, the Internet allows us to send e-mail messages to one another. What exactly does the term "e-mail" stand for?
"Eudora mail" created by Eudora, a company named after a famous American writer
A common myth states that Internet companies like Google, Inc. can keep track of your individual searches using which of the following?
an Internet Protocol (IP) address
A recent poll showed that people use the Internet how many hours per week, excluding e-mail use?
True or false: If you try hard, you'll get rich from using the Internet.
True. All it takes is a little bit of elbow grease.