1.
What does a computer allow you to do?
Correct Answer
D. All of the above
Explanation
A computer allows you to type documents and send emails, browse the internet, and store and retrieve data. This means that you can use it for various tasks such as creating and editing documents, communicating through emails, accessing information and resources on the internet, and saving and retrieving files and data for future use. Having all these capabilities in one device makes a computer a versatile tool for personal and professional purposes.
2.
The most popular operating system for personal computers is ________.
Correct Answer
C. Microsoft Windows
Explanation
Microsoft Windows is the most popular operating system for personal computers because it has been widely used and established in the market for a long time. It is compatible with a wide range of software and hardware, making it convenient for users. Windows also offers a user-friendly interface and regular updates to enhance security and performance. Additionally, many software developers prioritize creating applications for Windows, further contributing to its popularity among users.
3.
Applications can be downloaded from the Internet.
Correct Answer
A. True
Explanation
Applications can indeed be downloaded from the Internet. With the advancement of technology and the widespread use of smartphones, tablets, and computers, users can easily access various platforms and websites to download applications. These applications can range from productivity tools, entertainment apps, social media platforms, and many more. The Internet serves as a vast marketplace where users can explore and download applications based on their needs and preferences. Therefore, the statement "Applications can be downloaded from the Internet" is true.
4.
The cloud allows you to ________.
Correct Answer
D. All of the above
Explanation
The cloud allows you to access your email with any computer with an Internet connection, automatically back-up your data, and easily bring your files with you. This means that you can access your emails, store and back-up your important data, and have the flexibility to access your files from any device with an internet connection.
5.
Instead of a mouse, many laptops use a(n) ________.
Correct Answer
B. Touchpad
Explanation
Many laptops use a touchpad instead of a mouse because it provides a convenient and compact way to navigate the screen. A touchpad is a built-in pointing device that allows users to move the cursor by sliding their finger across its surface. It eliminates the need for an external mouse, making laptops more portable and user-friendly. Additionally, touchpads often have additional features like multi-touch gestures, making them versatile and efficient for various tasks.
6.
A mouse can connect to the computer with a ________ connection.
Correct Answer
D. All of the above
Explanation
A mouse can connect to a computer using a USB connection, a PS/2 connection, or a Bluetooth connection. USB is the most common and widely used connection for mice, allowing for easy plug-and-play functionality. PS/2 connections are less common nowadays but can still be found on some older computers. Bluetooth connections offer wireless connectivity, allowing the mouse to connect to the computer without the need for any physical cables. Therefore, all of the mentioned options are valid ways for a mouse to connect to a computer.
7.
To navigate through different folders in Windows, you'll use ________.
Correct Answer
C. Windows Explorer
Explanation
To navigate through different folders in Windows, you'll use Windows Explorer. This is the default file management tool in Windows operating systems, allowing users to browse and access files and folders on their computer. Windows Explorer provides a graphical interface that displays the directory structure and allows users to navigate through different folders, open files, copy, move, and delete files, and perform various other file management tasks. It is an essential tool for organizing and accessing files and folders on a Windows computer.
8.
To guard against malware, you will need to have ________.
Correct Answer
A. Antivirus software
Explanation
To guard against malware, having antivirus software is essential. Antivirus software is specifically designed to detect, prevent, and remove malicious software such as viruses, worms, Trojans, and spyware from a computer system. It constantly scans and monitors the system for any suspicious activities or files, providing real-time protection against potential threats. By regularly updating the virus definitions and running scans, antivirus software helps to ensure the security and integrity of the system, protecting it from various types of malware that can cause damage, steal sensitive information, or disrupt normal operations.
9.
If a Windows program has become unresponsive, which keys do you press to open the Task Manager?
Correct Answer
D. Control+Alt+Delete
Explanation
Pressing Control+Alt+Delete is the correct answer to open the Task Manager when a Windows program becomes unresponsive. This key combination brings up a menu that allows the user to access various options, including the Task Manager, which can be used to force close unresponsive programs or manage system processes.
10.
Right mouse clicking will give you _____________.
Correct Answer
C. More advanced options
Explanation
Right mouse clicking typically opens up a context menu, which provides access to a range of additional options and features that are not readily available through other means. These options can vary depending on the specific software or operating system being used, but they generally offer more advanced functionalities and customization settings. By right mouse clicking, users can access and utilize these more advanced options to enhance their overall computing experience.
11.
A cursor is a small image on the screen indicating where you are pointing; the mouse controls the movement of the cursor. The cursor can appear in different forms, including:
Correct Answer
E. All of the above
Explanation
The explanation for the given correct answer is that all of the mentioned options are forms in which the cursor can appear on the screen. The arrow indicates the current position on the screen, the I-beam marks the place where text can be entered, the pointing hand indicates hovering over a link, and the hourglass indicates that the computer is busy with a task. Therefore, all of the mentioned options are correct forms in which the cursor can appear.
12.
The term Desktop can be described as:
Correct Answer
E. Both A & D
Explanation
The correct answer is Both A & D. The term "Desktop" refers to the graphical user interface that appears on the computer screen after it is turned on. It includes a number of icons or images that can be clicked on to launch programs. Additionally, the desktop is the place where the computer is typically placed physically. Therefore, both options A and D accurately describe the term "Desktop".
13.
Software, such as Microsoft Internet Explorer, used to find information on the Web is called a
Correct Answer
B. Browser
Explanation
A browser is a software, such as Microsoft Internet Explorer, used to find information on the Web. It allows users to access websites, view webpages, and interact with web content. Browsers interpret and display HTML files, allowing users to navigate through different websites, search for information, and access various online resources. Google, Trojan, and Filter are not accurate options for software used to find information on the Web.
14.
In the workplace, is best practice to ______________ your computer when stepping away from your desk.
Correct Answer
A. Log off
Explanation
In the workplace, it is best practice to log off your computer when stepping away from your desk. Logging off ensures that your computer is secure and protected from unauthorized access. It also helps to prevent any accidental or unauthorized use of your computer and protects your personal and work-related information.
15.
Drag and drop is a mouse gesture in which the user selects a virtual object by "grabbing" it and "dragging" it to a different location or onto another virtual object.
Correct Answer
A. True
Explanation
Drag and drop is indeed a mouse gesture where the user can select a virtual object by grabbing it and dragging it to a different location or onto another virtual object. This action allows for easy rearrangement or manipulation of objects within a digital environment.
16.
Web pages are stored on a __________.
Correct Answer
C. Server
Explanation
Web pages are stored on a server. A server is a computer or system that stores and manages data, files, and resources, and makes them accessible to clients over a network, such as the internet. When a user requests a web page, the server retrieves the page from its storage and sends it back to the client's device for display. Servers are specifically designed to handle multiple requests and deliver web pages efficiently to clients.
17.
Telephone service over the internet is known as __________.
Correct Answer
B. VoIP (Voice Over Internet Protocol)
Explanation
Telephone service over the internet is known as VoIP (Voice Over Internet Protocol). This technology allows users to make phone calls using an internet connection instead of traditional telephone lines. VoIP converts voice signals into digital data packets that are transmitted over the internet, enabling users to communicate with others using voice calls, video calls, and even conference calls. This technology has become increasingly popular due to its cost-effectiveness and flexibility, allowing users to make calls from anywhere in the world as long as they have an internet connection.
18.
What type of media downloads while it's playing?
Correct Answer
A. Streaming
Explanation
Streaming is the correct answer because it refers to the process of downloading and playing media simultaneously. When media is streamed, it is downloaded in small chunks and played as it downloads, allowing for a continuous playback experience. This is different from downloading media in its entirety before playing, which would not be possible while it is still downloading.
19.
The speed of an internet connection is known as its _________.
Correct Answer
C. Bandwidth
Explanation
Bandwidth refers to the speed at which data can be transmitted over a network connection. It measures the amount of data that can be transferred in a given amount of time. A higher bandwidth means a faster internet connection, allowing for quicker downloads, smoother streaming, and faster web browsing. ISP (Internet Service Provider) is the company that provides internet access to customers. A wireless access point is a device that allows devices to connect to a wireless network. Lightning, in this context, does not relate to internet speed.
20.
A URL is usually typed in a browser's __________.
Correct Answer
C. Address Bar
Explanation
The correct answer is "Address Bar" because a URL (Uniform Resource Locator) is typically entered or typed into the address bar of a web browser. The address bar allows users to input the specific web address (URL) they want to visit and navigate to that particular website or web page.
21.
What is tabbed browsing used for?
Correct Answer
C. To keep multiple web pages open in the same window
Explanation
Tabbed browsing is a feature that allows users to have multiple web pages open within the same browser window. Instead of opening multiple windows, users can open new tabs and switch between them easily. This helps to organize and streamline the browsing experience, allowing users to quickly switch between different websites without cluttering their desktop or taskbar with multiple windows.
22.
The words you type into a search bar are known as __________.
Correct Answer
C. Search terms
Explanation
The words you type into a search bar are known as search terms. This is because when you enter specific words or phrases into a search bar, the search engine uses these terms to find and retrieve relevant information from its database. The search terms help narrow down the search and provide more accurate results based on the user's query.
23.
___________ appear while you're typing to help you improve your search.
Correct Answer
D. Search suggestions
Explanation
Search suggestions appear while you're typing to help you improve your search. They provide relevant and popular search terms or phrases based on what you have already typed. This feature assists users in finding the information they are looking for more quickly and accurately.
24.
Check all that apply.
The Internet is:
Correct Answer(s)
A. A vast, international collection of computer networks that transfer information
B. A combination of the world's international network
C. Websites and email are part of the Internet
Explanation
The Internet is a vast, international collection of computer networks that transfer information. It is also a combination of the world's international network. Additionally, websites and email are part of the Internet.
25.
A location on the World Wide Web (and Internet) that contains information about a specific topic, that usually contains multiple pages with different types of information about the topic is known as a:
Correct Answer
D. Website
Explanation
A website is a location on the World Wide Web that contains information about a specific topic. It usually consists of multiple pages with different types of information about the topic. Websites are accessible through URLs and can be created by individuals, organizations, or businesses to provide information, promote products or services, or engage with users.
26.
A ________________ is the first thing you see when you come to a website, or the opening page of a website. It provides information about the site and directs you to other pages on the site.
Correct Answer
B. Home Page
Explanation
A home page is the first thing you see when you come to a website, or the opening page of a website. It provides information about the site and directs you to other pages on the site.
27.
A Menu is a list of options, or topics on a website that users can choose from.
Correct Answer
A. True
Explanation
A menu is indeed a list of options or topics on a website that users can choose from. It serves as a navigational tool to help users easily find and access different sections or pages of a website. By presenting a menu, users can select their desired option and be directed to the corresponding content, enhancing their browsing experience and allowing them to interact with the website in a more organized and efficient manner.
28.
To move through a website or through various websites is to ________________.
Correct Answer
D. Navigate
Explanation
To move through a website or through various websites is commonly referred to as navigating. This involves using various methods such as clicking on links, using menus, or scrolling to explore different pages or sections within a website. The term "navigate" accurately describes the action of moving through a website or multiple websites.
29.
Identify the correctly written email address below:
ExplanationThe correctly written email address is
[email protected] because it follows the standard format of having a username (jane) followed by the "@" symbol and the domain name (yahoo.com).
30.
In addition to email access, most webmail providers also include ______________.
Correct Answer
D. D. All of the above
Explanation
Most webmail providers offer more than just email access. They typically include additional features such as instant messaging, an online address book, and an online calendar. Therefore, the correct answer is D, All of the above.
31.
Generally, when you receive an email, it will appear in your _________.
Correct Answer
C. Inbox
Explanation
When you receive an email, it will appear in your inbox. The inbox is a folder in your email account where all incoming messages are stored. It serves as a central location for managing and organizing your emails.
32.
Recurring appointments allow you to ______________________.
Correct Answer
D. Create future appointments automatically
Explanation
Recurring appointments allow you to create future appointments automatically. This means that you can set up an appointment to repeat at regular intervals, such as daily, weekly, monthly, or yearly, without having to manually create each appointment individually. This feature is useful for scheduling regular meetings, reminders, or any other type of appointment that occurs on a recurring basis.
33.
You should always send attachments at their original file size.
Correct Answer
B. False
Explanation
Sending attachments at their original file size is not always recommended because large file sizes can cause issues such as slow email delivery, exceeded storage limits, and difficulties in downloading or opening the attachment. It is often advised to compress or resize the files before sending them to ensure smoother transmission and better user experience.
34.
It's best to ignore or delete __________ emails , also known as junk email.
Correct Answer
B. Spam
Explanation
Spam emails are unsolicited and often contain irrelevant or malicious content. Ignoring or deleting these emails is the best approach to avoid wasting time and potential security risks. Spam filters are designed to automatically detect and move these emails to a separate folder or directly to the trash. Archiving or keeping spam emails may clutter your inbox and make it harder to find important messages. Therefore, the correct answer is "spam".
35.
An email _______ consists of text and/or pictures that Outlook automatically adds to the bottom of outgoing email messages.
Correct Answer
D. Signature
Explanation
A signature in an email consists of text and/or pictures that Outlook automatically adds to the bottom of outgoing email messages. It is a personalized feature that allows the sender to include their name, contact information, and any other relevant details. This helps to provide a professional touch to the email and saves the sender from manually typing the same information in every email they send.
36.
What icon does Outlook insert next to email messages in your Inbox to signify that they have attachments?
Correct Answer
B. Paperclip
Explanation
Outlook inserts a paperclip icon next to email messages in your Inbox to signify that they have attachments. This is a common convention used in email clients to visually indicate the presence of attachments. The paperclip icon is widely recognized as a symbol for attachments, making it easy for users to identify emails with attachments at a glance.
37.
What email package do most companies utilize?
Correct Answer
C. Microsoft Outlook
Explanation
Most companies utilize Microsoft Outlook as their email package. Microsoft Outlook is widely used in the corporate world due to its robust features and integration with other Microsoft products such as Word, Excel, and Teams. It offers advanced email management tools, calendar scheduling, task management, and seamless integration with Exchange servers. Its popularity and widespread use make it the preferred choice for businesses and organizations of all sizes.
38.
Outlook allows you to forward email messages to multiple people.
Correct Answer
A. True
Explanation
Outlook allows you to forward email messages to multiple people. This means that you can select multiple recipients and send the same email to all of them at once. This feature is useful when you want to share information or communicate with a group of people simultaneously. By forwarding emails to multiple people, you can save time and effort by avoiding the need to individually send the same email to each recipient separately.
39.
To sign out of Gmail, you'll first need to click ________.
Correct Answer
C. Your Name
Explanation
To sign out of Gmail, you'll first need to click on "Your Name". This is because when you click on your name, a drop-down menu will appear with various options, including the option to sign out. By selecting this option, you will successfully log out of your Gmail account.
40.
To get to your Gmail settings, you'll first need to click ________.
Correct Answer
D. The gear icon
Explanation
To access Gmail settings, you need to click on the gear icon. The gear icon is typically located in the top right corner of the Gmail interface and represents the settings menu. By clicking on the gear icon, you can access various options and settings to customize your Gmail experience, such as managing your account, changing display settings, setting up filters, and more.
41.
Generally, an email that you compose should include ________.
Correct Answer
D. All of the above
Explanation
When composing an email, it is important to include all of the mentioned elements. Recipients are necessary to ensure that the email reaches the intended individuals. A subject helps to provide a brief summary or context for the email. The message in the body field is where the main content of the email is written. Therefore, including all of these elements is essential for a complete and effective email composition.
42.
If you want to reply to a group of people, you should use the ________ option.
Correct Answer
B. Reply to all
Explanation
When replying to a group of people, using the "Reply to all" option is the correct choice. This option allows the sender to respond to the original sender as well as all other recipients of the email. It ensures that everyone in the group receives the response and is kept in the loop of the conversation. The "Reply" option would only send the response to the original sender, while "Forward" would send the email to someone else entirely. The "Signature" option is unrelated to replying to a group of people.
43.
Viruses, worms, and Trojan horses are all examples of ______________.
Correct Answer
B. Malware
Explanation
Viruses, worms, and Trojan horses are all examples of malware. Malware refers to malicious software that is designed to disrupt, damage, or gain unauthorized access to computer systems or networks. Viruses are self-replicating programs that attach themselves to files and spread from one computer to another. Worms are standalone programs that can replicate themselves and spread across networks. Trojan horses are disguised as legitimate software but contain malicious code that can harm or exploit a system. Therefore, all three are different types of malware that pose a threat to computer security.
44.
When you respond to an email from your bank that asks you to verify your account information, you may become a victim of a ___________ scam.
Correct Answer
B. pHishing
Explanation
Phishing is a type of scam where the attacker impersonates a legitimate entity, such as a bank, and sends fraudulent emails or messages to trick victims into revealing sensitive information like account details, passwords, or credit card numbers. In this scenario, the email from the bank requesting verification of account information is likely a phishing attempt. By responding to the email and providing the requested information, the victim unknowingly gives their personal information to the scammer, putting themselves at risk of identity theft or financial fraud.
45.
__________ can be added to your computer to track your browsing activity and preferences.
Correct Answer
A. Cookies
Explanation
Cookies can be added to your computer to track your browsing activity and preferences. Cookies are small text files that are placed on your computer by websites you visit. They store information such as login credentials, website preferences, and browsing history. This allows websites to personalize your experience and remember your preferences. However, cookies can also be used by advertisers to track your online behavior and display targeted ads.
46.
Imagine you're searching the Internet for hotels in Chicago, Illinois. What should you search for in order to get the most relevant results?
Correct Answer
D. Hotel chicago
Explanation
Searching for "hotel chicago" would yield the most relevant results when looking for hotels in Chicago, Illinois. This search term includes both the location (Chicago) and the type of establishment (hotel), ensuring that the results are specific to hotels in Chicago. The other options either lack specificity or include unnecessary words that may not be relevant to the search.
47.
In Google, how should you phrase your search if you want to exclude a certain word from your results (for example, "chocolate")?
Correct Answer
B. Dessert -chocolate
Explanation
To exclude a certain word from your search results in Google, you should use the phrase "dessert -chocolate". The minus sign (-) before the word you want to exclude ensures that any search results containing that word will be excluded from the results.
48.
There is no difference between Google, Yahoo!, Bing, and other popular search engines. They all produce the same search results.
Correct Answer
B. False
Explanation
The statement is false because there are differences between Google, Yahoo!, Bing, and other popular search engines. While they all provide search results, each search engine has its own algorithms, ranking factors, and search index. These differences can result in variations in the search results produced by each search engine. Additionally, search engines may have different features, user interfaces, and advertising platforms, which further differentiate them from one another.
49.
When you store files "in the Cloud," you are __________.
Correct Answer
B. Storing them online
Explanation
When you store files "in the Cloud," you are storing them online. This means that the files are being saved on remote servers that can be accessed through the internet. Storing files in the Cloud allows for easy access from different devices and locations, as well as providing backup and security for the files.