A Class on the Net for Librarians with Little or No Net Experience


"I was thrown out of college for cheating on the metaphysics exam; I looked into the soul of the boy next to me."

-- Woody Allen, n.d.

Here's your exam. PLEASE DON'T MAIL YOUR ANSWERS TO ME! Look for the link to the answers at the end of this lesson...

The first ten questions are multiple choice.

  1. I have come to depend upon email because it is:

             a. the most basic function of networks, and available
                to users with even the lowest levels of connectivity
             b. the means by which I communicate electronically on
                the same network and, through 'gateways', to other
             c. my access to academic listservs
             d. the means by which I can deliver BCK2SKOL to you
                as a distribution listserv
             e. all of the above

  2. I'm subscribing to a listserv called somefun@foobar.edu and I'm about to go on vacation. I don't want mail messages sent to the list to be forwarded to me while I'm away, so I send the command "set somefun nomail" before I leave (I will send the command "set somefun mail" to turn delivery back on when I return). To which address do I send my request:
             a. somefun@foobar.edu
             b. listserv@foobar.edu
             c. the list owner's email address
             d. my service provider's email address

  3. I want to send a message to everyone on the somefun listserv list. To which address do I send my message:

             a. somefun@foobar.edu
             b. listserv@foobar.edu
             c. the list owner's email address
             d. my service provider's email address
  4. Whoa! I just received a bunch of nasty flames in my mailbox. Is it because I ...
             b. joined a listserv and jumped into the ongoing discussion
                right away by asking to be brought up-to-date
             c. created a big sig file and appended it to all my
             d. all of the above

  5. Lately, I've been busy flooding the Net with files advertising my personal business. What have I been up to?
             a. lurking
             b. hacking
             c. fingering
             d. spamming
             e. surfing

  6. When I telnet, I am:
             a. subscribing to a newsgroup or discussion list
             b. logging on to a remote computer
             c. transferring files from a remote computer to my own
             d. all of the above

  7. I know that Usenet newsgroups are read heavily because they are:
             a. email-based discussions like listservs
             b. censored across-the-board
             c. free-wheeling and carried on most Internet sites
             d. owned by Ted Turner, but being bought out by
                Rupert Murdock

  8. Using gopher client/server applications I can:
             a. access menus
             b. search files
             c. retrieve software, programs and documents
             d. download texts, pictures, audio clips & videos
             e. set up my own gopher host & serve the world
             f. all of the above

  9. FTP allows me to:
             a. retrieve files from public archives on the Net
                and access private files on remote computers where
                I have an id
             b. search a remote site's entire database of FTP files
             c. hide my true identity by logging in as 'anonymous'
             d. none of the above

  10. The World Wide Web allows me to:

             a. jump from document to document via hypertext
             b. hear audios and see videos
             c. search all of cyberspace via gopher, telnet, ftp,
                etc. without having to remember/use arcane commands
             d. create my own documents with my choice of audio,
                video and textual links
             e. all of the above

The last ten questions are TRUE and FALSE

11. T   F   Every Internet email address has three parts (1) a user

            name or userid (2) an "at" sign @, and (3) the address

            of the host machine where that user's email software



12. T   F   When I communicate with a listserv server, I am

            communicating with a machine, not a person, and should

            leave the subject line of my message blank.


13. T   F   When I communicate with other people on the Net, I

            should fill in the subject line of my message,

            because it is good "netiquette" to do so.


14. T   F   Veronica searches only titles in gopherspace while

            WAIS searches the full-texts of documents/databases

            and Archie, a file locator, searches for files in

            public ftp libraries.


15. T   F   The Internet was designed by the U.S. government in

            the 1950's to spy on individuals suspected of being



16. T   F   I know email messages are secure, so I can safely go

            ahead, let my hair down, and say anything I want.


17. T   F   All library OPACs on the Net are exactly alike.


18. T   F   To finger someone is to report them to the police.


19. T   F   VT100 is a healthy breakfast drink.


20. T   F   Yahoo is a "geek" from the countryside.


Hey, I just heard about BCK2SKOL and I want to retrieve the lessons. What do I do?

     a. Send a mail message to:


        and in the body of the message, type index bck2skol;

        the file I receive will list each lesson distributed to

        the BCK2SKOL list and I can retrieve lessons using the

        GET command (e.g., GET BCK2SKOL 97-00001 )

     b. FTP to host: vm.sc.edu

        login: anonymous

        path: cd to BCK2SKL.191 (note: there's no 'O' in BCK2SKL)

        The files are stores as BCK2SKOL LESSON1, etc.

     c. Use the Web to open the URL:


     d. Any or all of the above

EXTRA CREDIT SEARCH QUESTION (for folks with WWW access):

On what date did President Eisenhower deliver his "Atoms for Peace" speech at the United Nations?


* "BCK2SKOL" is a free electronic library classroom created by Ellen Chamberlain, Head Librarian, University of South Carolina Beaufort, and Miriam Mitchell, Sr. Systems Analyst, USC Columbia. Additional support is provided by the Division of Libraries & Information Systems, University of South Carolina Columbia.

Your feedback and support for BCK2SKOL are appreciated; please email link updates, suggestions and comments to: eechambe@gwm.sc.edu

Return to BCK2SKOL Index

Go to Next Lesson

Links checked 9 March 1998. See the BCK2SKOL homepage for course update details.
Copyright ©2000, the Board of Trustees of the University of South Carolina.
URL: http://www.sc.edu/bck2skol/fall/lesson29.html