1.
A set of rules applied by the owner/manager of a network, website or large computer system that restrict the ways in which the network site or system may be used is a (n)
Correct Answer
B. Acceptable use policy
Explanation
An acceptable use policy refers to a set of rules implemented by the owner or manager of a network, website, or large computer system. This policy outlines the acceptable ways in which the network, site, or system can be utilized. It serves as a guideline for users, specifying what activities are permitted and what actions are prohibited. By having an acceptable use policy in place, the owner/manager can ensure that the network, site, or system is being used responsibly and in accordance with their intended purpose.
2.
Which of the following is an example of an input device?
Correct Answer
C. Keyboard
Explanation
A keyboard is an example of an input device because it allows users to input data or commands into a computer system. It consists of a set of keys, each representing a different character or function. When a key is pressed, it sends a signal to the computer, which interprets it and performs the corresponding action. Keyboards are commonly used for typing text, entering commands, and navigating through software applications. They are essential for user interaction with computers and are one of the primary ways to input information into a system.
3.
Word-wrap allows you to type text that continuously flows to the next line without having to press this:
Correct Answer
A. Enter/Return Key
Explanation
Word-wrap allows text to automatically wrap to the next line when it reaches the end of a line, without the need to manually press the Enter/Return key. This feature is particularly useful when typing long paragraphs or sentences, as it ensures that the text remains visually organized and easy to read. Pressing the Enter/Return key is necessary only when intentionally starting a new paragraph or creating line breaks within the text.
4.
A computer virus is:
Correct Answer
B. A program written to disrupt computer operations
Explanation
A computer virus is a program written to disrupt computer operations. Unlike a germ or a worm, it is not a physical entity that can physically enter a computer or crawl inside a processor. Instead, it is a malicious software code that is designed to replicate itself and spread from one computer to another, causing various types of damage such as data loss, system crashes, and unauthorized access. Its main purpose is to disrupt the normal functioning of a computer system and potentially steal or manipulate sensitive information.
5.
A personal website or web page on which an individual records opinions, links to other sites, etc. on a regular basis is referred to as what?
Correct Answer
C. Blog
Explanation
A personal website or web page on which an individual records opinions, links to other sites, etc. on a regular basis is referred to as a blog.
6.
The activity of defrauding an online account holder of financial information by posing as a legitimate company is known as?
Correct Answer
D. Phishing
Explanation
Phishing is the correct answer because it refers to the activity of defrauding an online account holder by posing as a legitimate company. It involves sending fraudulent emails or messages that appear to be from a trusted source, tricking the recipient into providing sensitive information such as passwords, credit card details, or social security numbers. This type of scam is commonly used to gain unauthorized access to personal or financial information for malicious purposes.
7.
Which of the following information is safe to share in a public chatroom or blog?
Correct Answer
A. Your screen name
Explanation
Sharing your screen name in a public chatroom or blog is safe because it does not reveal your personal information such as your real name, address, school, or age. A screen name is a chosen username that you use to identify yourself online, and it does not provide any direct personal details. By sharing only your screen name, you can maintain your privacy and protect yourself from potential risks associated with sharing personal information online.
8.
What is the correct term for the text on a Web page that takes you to another Web page when you click it?
Correct Answer
A. Hyperlink
Explanation
A hyperlink is the correct term for the text on a web page that takes you to another web page when you click it. Hyperlinks are used to connect different web pages together and allow users to navigate through websites by clicking on the linked text. They are an essential feature of the internet and enable easy access to various resources and information on the web.
9.
Software that allows parents, teachers, and others to block access to certain materials on the internet is called:
Correct Answer
D. Filtering software
Explanation
Filtering software is the correct answer because it refers to software that enables parents, teachers, and others to restrict or block access to specific content on the internet. This software allows users to filter out inappropriate or unwanted material, ensuring a safer online environment for children and controlling access to certain websites or types of content. It is commonly used to prevent access to explicit or harmful content and to enforce internet usage policies.
10.
What is LAN?
Correct Answer
B. Local Area Network
Explanation
A Local Area Network (LAN) is a network that connects computers and devices within a limited area, such as a home, office, or building. It allows for the sharing of resources, such as files and printers, and enables communication between connected devices. LANs are typically faster and more secure than wide area networks (WANs) and are commonly used in homes and small businesses for local data sharing and internet access.
11.
In the e-mail address: [email protected], what is the domain name?
Correct Answer
C. Mistikids
Explanation
The domain name in the given e-mail address is "mistikids.com". The domain name is the part of an e-mail address that follows the "@" symbol and identifies the website or organization associated with the address. In this case, "mistikids.com" is the domain name.
12.
Google, Ask, MSN are all examples of:
Correct Answer
D. Search Engines
Explanation
Google, Ask, and MSN are all examples of search engines. Search engines are online tools that allow users to search for information on the internet by entering keywords or phrases. These search engines crawl the web, index the content, and provide relevant results to the users based on their search queries. Unlike electronic magazines or research websites, search engines are specifically designed to help users find information from a vast amount of web pages available on the internet.
13.
Symbols such as :) (smile), :( (frown), ; / (undecided), and ;) (wink) used to express feelings in an email or on social media are called:
Correct Answer
B. Emoticons
Explanation
Emoticons are symbols used to convey emotions in written communication. They are commonly used in emails and on social media platforms to add tone and express feelings that may be difficult to convey through text alone. Emoticons such as :) for a smile, :( for a frown, ;) for a wink, and ; / for undecided are examples of these symbols. They help to enhance the meaning and emotional context of the message being communicated.
14.
The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same is called?
Correct Answer
C. Copyright
Explanation
Copyright is the exclusive legal right granted to the originator or assignee of a literary, artistic, or musical work to print, publish, perform, film, or record the material. This right allows the creator to control how their work is used and to authorize others to use it. It protects the originality and expression of the work, preventing others from copying or reproducing it without permission.
15.
What is a database?
Correct Answer
C. It is a large, organized collection of information.
Explanation
The correct answer is "It is a large, organized collection of information." This is because a database is a structured collection of data that is organized and stored in a way that allows for efficient retrieval and manipulation. It is not just a collection of numbers or computer parts, but rather a system that stores and manages information in a structured manner.
16.
What Microsoft program is used for creating spreadsheets?
Correct Answer
Excel, excel, xl, XL
Explanation
Excel is a Microsoft program that is commonly used for creating spreadsheets. It allows users to organize data, perform calculations, and create charts and graphs. With its user-friendly interface and powerful features, Excel has become the go-to program for individuals and businesses alike when it comes to managing and analyzing numerical data. The variations of "excel" and "xl" in the answer options are different ways of referring to the program, all of which are correct.
17.
Name a common web browser.
Correct Answer
Mozilla Firefox, Google Chrome, Internet Explorer, safari,mozilla firefox, google chrome, internet explorer
Explanation
The correct answer is a list of common web browsers, including Mozilla Firefox, Google Chrome, Internet Explorer, and Safari. These browsers are widely used by internet users to access and browse websites.
18.
Name an output device.
Correct Answer
speakers, headphones, monitor, printer, speaker, headphone
Explanation
The question asks for an output device, which refers to a device that receives information from a computer or other electronic device and presents or displays the data. The given answer options include speakers, headphones, monitor, and printer, all of which are examples of output devices. These devices receive signals from a computer and produce sound (speakers, headphones) or display visual information (monitor, printer).
19.
What does RAM stand for?
Correct Answer
Random Access Memory, random, access memory
Explanation
The term RAM stands for Random Access Memory. It is a type of computer memory that allows data to be accessed randomly, meaning any byte of memory can be accessed without touching the preceding bytes. This makes RAM a fast and temporary storage for data that the computer is actively using. The terms "random" and "access memory" in the answer are additional descriptions of RAM, emphasizing its ability to access data in a non-sequential manner.
20.
The part of the computer that controls the flow of information is the:
Correct Answer
A. CPU or Processor
Explanation
The CPU or Processor is responsible for controlling the flow of information in a computer. It is often referred to as the "brain" of the computer as it performs all the necessary calculations and executes instructions. The CPU receives input from various sources, processes it, and sends output to the appropriate components. It manages tasks such as fetching instructions from memory, decoding them, and executing them. Therefore, the CPU or Processor is the correct answer as it controls the flow of information within the computer.
21.
What does GB stand for?
Correct Answer
gigabyte, gigabite, gigabytes, gigabites, giga byte, giga bite, giga bites, giga bytes
Explanation
GB stands for gigabyte, which is a unit of digital information storage. It is commonly used to measure the amount of data in computer storage and transmission. The term can be spelled as gigabyte or gigabite, and it can be used in both singular and plural forms, such as gigabytes or gigabites. The variations giga byte, giga bite, giga bites, and giga bytes are also acceptable spellings for GB.
22.
A universal serial bus (USB) flash drive is a small, portable device that plugs into a computer's USB port and acts as memory or a storage device.
Correct Answer
A. True
Explanation
A USB flash drive is indeed a small, portable device that can be plugged into a computer's USB port. It is designed to act as a storage device or memory, allowing users to store and transfer data easily.
23.
What is wireless internet called?
Correct Answer
D. Wi-fi
Explanation
Wi-Fi is the correct answer because it is the commonly used term for wireless internet. It stands for "wireless fidelity" and refers to a technology that allows devices to connect to the internet without the need for physical cables. Wi-Fi is widely available in homes, offices, and public spaces, enabling users to access the internet wirelessly on their smartphones, laptops, and other devices.
24.
Which company developed Internet Explorer?
Correct Answer
Windows
Microsoft
windows
microsoft
micro soft
Explanation
The correct answer is Microsoft. Microsoft developed Internet Explorer, which was the default web browser for the Windows operating system.
25.
What is the most common OS used today?
Correct Answer
A. Windows
Explanation
Windows is the most common operating system used today because it is widely used by individuals and businesses around the world. It offers a user-friendly interface, compatibility with a wide range of software and hardware, and a large number of available applications. Additionally, Windows has a strong market presence and is constantly updated and supported by Microsoft, making it a popular choice for many users.
26.
A hard Drive is used to...
Correct Answer
B. Store data
Explanation
A hard drive is a storage device used to store data. It is a non-volatile memory device that stores and retrieves digital information. Unlike RAM, which is used for temporary storage, a hard drive provides long-term storage for files, documents, software, and other data. It allows users to save and access their data even when the computer is turned off. Therefore, the correct answer is "store data".
27.
Which of the following is unlikely to be a web address?
Correct Answer
C. Hzvw;/lookatmylovelywebsite.www
Explanation
The web address "hzvw;/lookatmylovelywebsite.www" is unlikely to be a valid web address because it does not follow the typical format of a web address. Web addresses usually start with "http://" or "https://", followed by the domain name (e.g., "www.example.com"). The given address contains random characters and does not have a valid domain name, making it unlikely to be a valid web address.
28.
To maximise your protection against computer viruses, what should you do?
Correct Answer
D. All of these
Explanation
To maximize your protection against computer viruses, it is important to perform multiple actions. First, you should check that your anti-virus software automatically checks for updates. This ensures that your software is up to date with the latest virus definitions and can effectively detect and remove any new threats. Second, you should delete suspicious email attachments as they can contain viruses or malware. Third, it is crucial to ensure that your anti-virus software regularly scans your computer to detect and eliminate any existing viruses. Lastly, having a firewall adds an extra layer of protection by monitoring and controlling incoming and outgoing network traffic. Therefore, all of these actions together maximize your protection against computer viruses.
29.
What does 'www' stand for?
Correct Answer
B. World Wide Web
Explanation
The acronym 'www' stands for World Wide Web. It is a system of interconnected documents and resources, accessed through the internet, that are identified by URLs and can be viewed using web browsers. The World Wide Web revolutionized the way information is shared and accessed globally, allowing users to navigate between different websites and access a vast amount of information and services.
30.
Which of these do you need to surf the web?
Correct Answer
D. All of these
Explanation
To surf the web, all of these are needed. An internet connection is required to connect to the internet and access websites. A web browser is necessary to navigate and view web pages. An internet service provider (ISP) is essential as they provide the connection to the internet. Therefore, to successfully surf the web, all of these components are necessary.