Computer Quiz Questions Answers

1. Hackers ………………
(A) all have the same motive
(B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage
(D) break into other people's computers
See Answer:

2. Unauthorised copying of software to be used for personal gain instead of for personal backups is called ………………
(A) program thievery
(B) data snatching
(C) software piracy
(D) program looting
See Answer:

3. Junk e-mail is also called ………………
(A) spam
(B) spoof
(C) cookie crumbs
(D) sniffer script
See Answer:

4. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
See Answer:

5. What is MP3 ?
(A) A Mouse
(B) A Printer
(C) A Sound Format
(D) A Scanner
See Answer:

6. What is the most popular hardware for multimedia creations ?
(A) PCs
(B) Minicompiiters
(C) Mainframe Computers
(D) WANs
See Answer:

7. For sound recording, what is necessary ?
(A) Speaker
(B) Microphone
(C) Talker
(D) Mouse
See Answer:

8. The life-span of a CD-ROM is………………
(A) approximately one year
(B) approximately two years
(C) approximately five years
(D) approximately twenty-five years
See Answer:

9. The ……………… settings are automatic and standard.
(A) default
(B) CPU
(C) peripheral
(D) user frien9ly
See Answer:

10. What are the two parts of an E-mail address ?
(A) User name and street address
(B) Legal name and phone number
(C) User name and domain name
(D) Initials and password
See Answer:

11. Participants can see and hear each other in a/an ………………
(A) electronic mail system
(B) message system
(C) tele-conference
(D) bulletin board
See Answer:

12. Magnetic tape is not practical for applications where data must be quickly recalled because tape is ………………
(A) a random-access medium
(B) expensive
(C) a read-only medium
(D) a sequential-access medium
See Answer:

13. Why should you delete unknown e-mail attachments ?
(A) You could go to jail
(B) The person could track you down and hurt you
(C) It is bad manners
(D) It might contain a virus that could hurt your computer
See Answer:

14. How is it possible that both programs and data can be stored on the same floppy disk ?
(A) A floppy disk has two sides, one for data and one for programs
(B) A floppy disk has to be formatted for one or for the other
(C) Programs and data are both software, and both can be stored on any memory device
(D) Floppy disks can only store data, not programs
See Answer:

15. What is an embedded system ?
(A) A program that comes wrapped in a box
(B) A program that is permanently part of a computer
(C) A computer that is part of a larger computer
(D) A computer and software system that controls a machine or appliance
See Answer:

16. Which of the following will you require to hear music on your computer ?
(A) Video Card
(B) Tape Recorder
(C) Mouse
(D) Sound Card
See Answer:

17. The signal that a computer is waiting for a command from the user is ………………
(A) prompt
(B) event
(C) time slice
(D) interrupt
See Answer:

18. This software allows the user to move from page to page on the Web by clicking on or selecting a hyperlink, or by typing in the address of the destination page ………………
(A) Web browser
(B) Web search engine
(C) Web homepage
(D) Web service
See Answer:

19. For viewing video CDs, you would use………………
(A) CD Player
(B) Windows Media Player
(C) Windows Video Player
(D) Windows Movie Player
See Answer:

20. Executing more than one program concurrently by one user on one computer is known as ………………
(A) multi-programming
(B) multi-processing
(C) time-sharing
(D) multi-tasking
See Answer:

21. Which of the following controls the manner of interaction between the user and the operating system ?
(A) language translator
(B) platform
(C) user interface
(D) icon
See Answer:

22. You can keep your personal flies / folders in ………………
(A) My Folder
(B) My Documents
(C) My Files
(D) My Text
See Answer:

23. Three types of compact disks include CD-ROM, CD-R, and ………………
(A) CD-W
(B) CD-RAM
(C) CD-DVD
(D) CD-RW
See Answer:

24. All computers must have ………………
(A) Word processing software
(B) An operating system
(C) A printer attached
(D) A virus checking program
See Answer:

25. Collecting personal information and effectively posing as another individual is known as the crime of ………………
(A) spooling
(B) spoofing
(C) hacking
(D) identity theft
See Answer:
 

Popular Posts

 
eXTReMe Tracker
Web Site Hit Counters