1.
An email which has been subscribed to but is often unread for a long period of time possibly never is called?
Correct Answer
D. BACN
Explanation
BACN is the correct answer because it refers to emails that are subscribed to but often remain unread for a long time. BACN emails are typically not spam, but they are not high-priority either, often being newsletters, promotional emails, or notifications that are not immediately relevant or important to the recipient. The term "BACN" is a play on the word "bacon" and reflects the idea that these emails are not unwanted like spam, but they are also not actively sought out or consumed like a regular email.
2.
What does a screen shot do?
Correct Answer
D. Takes a picture of a computer screen to copy somewhere else
Explanation
A screen shot is the process of capturing an image of the current display on a computer screen. It allows users to take a picture of what is being shown on their screen at a specific moment and save it as an image file. This image can then be copied or shared with others, used for documentation purposes, or simply saved for personal reference. It is a useful feature for capturing important information or sharing specific content with others.
3.
What is a dashboard?
Correct Answer
B. a web-based technology page with information from various sources.
Explanation
A dashboard is a web-based technology page that displays information from various sources. It is a visual representation of data that allows users to monitor and analyze key metrics and performance indicators in real-time. Dashboards are commonly used in business and organizations to track progress, make data-driven decisions, and communicate information effectively.
4.
A laser is a _____________________.
Correct Answer
B. Beam of light used for pointing at things instead of using your finger
Explanation
A laser is a beam of light used for pointing at things instead of using your finger. Lasers emit a focused and coherent beam of light that can be used for various purposes such as in scientific research, medical procedures, and even in everyday activities like presentations and pointing out objects from a distance. The high intensity and precision of laser beams make them ideal for tasks that require accuracy and control.
5.
A game boy is
Correct Answer
A. A small portable gaming system.
Explanation
The correct answer is "a small portable gaming system." This is because a game boy refers to a handheld gaming device that allows users to play video games on the go. It is not a male child who likes to play video games, the first gaming system, or the name of an online video game. Therefore, the correct answer is a small portable gaming system.
6.
A geek is
Correct Answer
A. A person who is really into computers
Explanation
The correct answer is "a person who is really into computers." This is because a geek is commonly understood as someone who is highly interested and knowledgeable about computers, technology, and related subjects. They often spend a significant amount of time exploring, learning, and engaging with computer-related activities, such as programming, gaming, or troubleshooting.
7.
A small camera that is attached to a laptop or computer is called?
Correct Answer
E. A web cam
Explanation
A small camera that is attached to a laptop or computer is called a web cam. A web cam is used to capture video or images and transmit them in real-time over the internet. It is commonly used for video conferencing, live streaming, and online communication.
8.
A combination camera, phone, PDA, multimedia player, and wireless communication device made by Apple Inc is called?
Correct Answer
C. IpHone
Explanation
The correct answer is "iphone". The question is asking for the name of a device that combines various functions such as a camera, phone, PDA, multimedia player, and wireless communication. The iPhone is a popular device made by Apple Inc that fits this description.
9.
When your software crashes, what is it called?
Correct Answer
D. An Abend
Explanation
When your software crashes, it is commonly referred to as an "Abend". The term "Abend" is derived from the German words "abnormal end" and is used in the field of computing to describe an abnormal termination or failure of a program or system. It is often used by programmers and IT professionals to identify and troubleshoot software crashes or errors.
10.
What is an E-Mail Bomb?
Correct Answer
B. Sending lots of unwanted e-mails to an address
Explanation
An email bomb refers to the act of sending a large number of unwanted emails to a specific email address. This can overwhelm the recipient's inbox and potentially cause their email server to crash or become unresponsive. It is a form of cyber attack and is considered a malicious activity.
11.
When you’re not working on the internet, what is this called?
Correct Answer
C. Offline
Explanation
When you are not working on the internet, it means that you are not connected to the internet and are not using any online services or applications. Therefore, the correct answer is "Offline".
12.
True or False. You lose ram memory when you turn off the CPU?
Correct Answer
A. True
Explanation
When the CPU is turned off, the RAM memory loses all the data stored in it. RAM is a volatile memory, meaning it requires power to retain data. Once the power is cut off, the stored data is lost, and the RAM is cleared. Therefore, it is true that you lose RAM memory when you turn off the CPU.
13.
True or False Hacking is when someone who breaks into your computer without your permission.
Correct Answer
A. True
Explanation
Hacking refers to the unauthorized access or intrusion into someone's computer system or network. It involves gaining entry without the owner's permission or knowledge. Therefore, the statement "Hacking is when someone who breaks into your computer without your permission" is true.
14.
What is an MP3 used for?
Correct Answer
B. Playing Music
Explanation
An MP3 is used for playing music. It is a digital audio format that allows users to store and play music files on various devices such as smartphones, computers, and portable music players. MP3 files are compressed to reduce their size while maintaining good audio quality, making it easier to store and transfer music files. This format revolutionized the way people listen to music, as it allowed for the easy creation and sharing of digital music files.
15.
A long cable that can connect computers labs together is called?
Correct Answer
E. Back bone
Explanation
A long cable that can connect computer labs together is called a backbone. The backbone refers to the main cable that serves as the central pathway for data transmission between different network segments or nodes. It provides high-speed connectivity and acts as a central infrastructure for the network, allowing for efficient communication and data transfer between computers labs.
16.
What is a jolt?
Correct Answer
B. It freezes your computer
Explanation
A jolt refers to a sudden interruption or disruption in the normal functioning of a computer system, causing it to freeze or become unresponsive. This can occur due to various reasons such as a power surge, software malfunction, or hardware failure.
17.
How is a database is sorted?
Correct Answer
A. By a key
Explanation
A database is sorted by a key, which is a unique identifier for each record in the database. The key is used to arrange the records in a specific order, such as alphabetical or numerical. Sorting by a key allows for efficient searching and retrieval of data from the database.
18.
What's at the beginning or end of a data transmission?
Correct Answer
D. A tag
Explanation
A tag is typically used at the beginning or end of a data transmission to identify and organize the information being transmitted. It acts as a label or marker that helps in categorizing and processing the data.
19.
An example of a shortcut used in chats or emails is?
Correct Answer
B. LULU
Explanation
LULU is an example of a shortcut used in chats or emails. It is commonly used to express laughter or amusement, similar to "LOL" or "haha". This shortcut is often used to quickly convey a positive or humorous response in online conversations.
20.
When you want to make an icon or file disappear you would drag it to the _________________?
Correct Answer
E. Recycling bin
Explanation
When you want to make an icon or file disappear, you would drag it to the recycling bin. The recycling bin is a feature in computer operating systems that allows users to delete files or icons from their system. Once an item is dragged into the recycling bin, it is considered deleted but can still be recovered if needed.
21.
When a wave frequency exceeds 20,000 hertz it is called _______?
Correct Answer
E. A ultrasound
Explanation
When a wave frequency exceeds 20,000 hertz, it is called an ultrasound. Ultrasound refers to sound waves with frequencies higher than the upper audible limit of human hearing. It is commonly used in medical imaging to visualize internal body structures. The other options, such as "none of these," "a mega sound," "very loud," and "a sonic boom," do not accurately describe a wave frequency exceeding 20,000 hertz.
22.
What is a nano?
Correct Answer
E. None of these
Explanation
The correct answer is "none of these" because the options provided do not accurately define what a nano is. A nano is a prefix used in the metric system to denote one billionth of a unit. It can be used to describe various things such as nanometers (a billionth of a meter) or nanoseconds (a billionth of a second). Therefore, none of the given options correctly describe what a nano is.
23.
What is used to scan copies of pictures?
Correct Answer
D. A scanner
Explanation
A scanner is used to scan copies of pictures. It is a device that captures images or documents and converts them into digital format. Unlike a printer, keyboard, or mouse, which serve different functions, a scanner specifically allows for the reproduction of physical images or documents into digital files. Therefore, the correct answer is a scanner.
24.
A very high energy electromagnetic radiation such as X-rays are called_____________________.
Correct Answer
gamma rays, Gamma, Gamma Rays, gamma
Explanation
Gamma rays are a form of very high energy electromagnetic radiation, similar to X-rays. They have a shorter wavelength and higher frequency than X-rays, making them more energetic. Gamma rays are produced through various processes, such as nuclear reactions and radioactive decay. They are commonly used in medical imaging and cancer treatment due to their ability to penetrate through tissues.
25.
A cracker is someone who?
Correct Answer
D. Hacks into a computer
Explanation
A cracker is someone who hacks into a computer. This means that they gain unauthorized access to a computer system or network in order to exploit it for their own purposes. This can involve stealing sensitive information, causing damage to the system, or using it for illegal activities. It is important to differentiate between a cracker and a hacker, as hackers are generally seen as individuals who use their skills and knowledge to find vulnerabilities in systems for the purpose of improving security.
26.
A term to describe when an image has been displaying too long, resulting in a permanent "ghost" image being burned into the screen is called shadow burn.
Correct Answer
B. False
Explanation
The term used to describe when an image has been displaying too long, resulting in a permanent "ghost" image being burned into the screen is actually called "screen burn-in" or "image retention." It is not referred to as "shadow burn."