1.
HTTP is a markup language.
Correct Answer
B. False
Explanation
HTTP (Hypertext Transfer Protocol) is not a markup language. It is a protocol that allows communication between web servers and clients. Markup languages, on the other hand, are used to structure and present content on the web, such as HTML (Hypertext Markup Language) or XML (eXtensible Markup Language). Therefore, the correct answer is False.
2.
When you start a PC, which of the following does it test?
Correct Answer
D. Hardware Components
Explanation
When you start a PC, it tests the hardware components. This is because the computer's BIOS (Basic Input/Output System) performs a Power-On Self-Test (POST) to check if all the hardware components such as the processor, memory, hard drive, and other peripherals are functioning properly. If any issues are detected during the test, the computer may display error messages or fail to start up. Therefore, testing the hardware components is an essential step in the booting process of a PC.
3.
What wouldn't you do if you know your computer is suspect by malware?
Correct Answer
B. Keep shopping, banking, using every account about online activity.
Explanation
If you know your computer is suspect by malware, you should not continue doing any online activity that requires your username, password, and other personal information. This is because malware can steal your sensitive information and compromise your accounts. It is important to stop these activities to protect your personal and financial data from being accessed by hackers.
4.
Which menu allows you to ‘shut down’ your PC gracefully?
Correct Answer
A. Start
Explanation
The question asked which menu- this is the keyword, the others are 'options' from the menu.
5.
What happens when you see the black and white screen when you turn your computer on?
Correct Answer
C. System tests hardware components and loads the operating system
Explanation
When you see the black and white screen when you turn your computer on, it indicates that the system is performing a hardware check and loading the operating system. This process is known as the booting process. The black and white screen, also called the BIOS screen or the startup screen, allows the computer to test and initialize its hardware components to ensure they are functioning properly. Once this process is completed, the computer proceeds to load the operating system, allowing you to use the computer normally.
6.
Which option best describes Sleep mode?
Correct Answer
D. Hard drive switched off
Explanation
Sleep mode refers to a power-saving state in which a computer or device conserves energy by shutting down or reducing power to non-essential components. When a hard drive is switched off, it means that it is not actively running or being used, which aligns with the concept of sleep mode. In this state, the hard drive is not performing any tasks and is effectively "asleep" or inactive, allowing the device to save power.
7.
How can you restore the system from Sleep mode
Correct Answer
B. Tasks monitors external activity such as a key press
Explanation
In Sleep mode, the system is in a low power state where it conserves energy by shutting down most processes and peripherals. To restore the system from Sleep mode, tasks that monitor external activity, such as a key press, are necessary. These tasks detect any input from the user, such as pressing a key on the keyboard, and initiate the process of waking up the system from Sleep mode. Pressing the power button for 10 seconds or pressing the reset button are not the correct methods to restore the system from Sleep mode.
8.
Sleep mode increases the amount of electrical energy?
Correct Answer
B. False
Explanation
Sleep mode actually reduces the amount of electrical energy consumed by a device. When a device is in sleep mode, it enters a low-power state where it uses minimal energy to maintain basic functions. This helps to conserve battery life and reduce electricity consumption. Therefore, the statement that sleep mode increases the amount of electrical energy is false.
9.
Which of the following best describes Hibernate mode?
Correct Answer
B. Current applications running is saved to disk and the computer is turned off
Explanation
Hibernate mode is a power-saving state in which the current applications running on the computer are saved to the disk and the computer is turned off. This allows the user to resume their work from where they left off when they turn on the computer again. It is different from sleep mode, where the computer remains on but enters a low-power state. Hibernate mode is useful when the user wants to save their work and shut down the computer for an extended period of time without losing any data or progress.
10.
Does hibernation mode cause drainage on the battery?
Correct Answer
B. No
Explanation
Hibernation mode does not cause drainage on the battery. When a computer is put into hibernation mode, it saves the current state to the hard drive and then shuts down completely. This means that the computer is not using any power from the battery while in hibernation mode. Therefore, hibernation mode does not cause drainage on the battery.
11.
Why would someone ‘lock’ their computer?
Correct Answer
A. Stop someone else using your computer while you are away
Explanation
Locking a computer is a security measure taken to prevent unauthorized access when the user is away. By locking the computer, the user ensures that no one else can use or access their files, applications, or personal information. This helps protect sensitive data and maintain privacy. Locking the computer also prevents any unwanted changes or actions from being performed on the system. Therefore, the correct answer is to stop someone else from using the computer while the user is away.
12.
What is log on/logging in/signing in?
Correct Answer
B. Individual access to a computer system
Explanation
Logging in, also known as signing in or logging on, refers to the process of gaining individual access to a computer system. It involves providing the necessary credentials, such as a username and password, to authenticate and verify the user's identity. This allows the user to access their personal account and use the system's features and resources. Logging in is an essential security measure that ensures only authorized individuals can utilize the computer system while protecting sensitive information and resources from unauthorized access.
13.
Why do we use a password?
Correct Answer
B. Security
Explanation
We use a password for security purposes. A password acts as a barrier that prevents unauthorized access to our personal or sensitive information. It ensures that only authorized individuals can access our accounts, devices, or networks, protecting our data from potential threats or breaches. By requiring a password, we add an extra layer of security to our digital assets and maintain confidentiality.
14.
The ______ is the brains of the computer
Correct Answer
CPU
, Central Processing Unit
Explanation
The CPU, or Central Processing Unit, is often referred to as the "brains" of the computer because it is responsible for executing instructions and performing calculations. It is the component that carries out the actual processing of data and controls the other hardware devices in the computer system. The CPU is vital for the overall functioning and performance of the computer, making it an essential part of the system.
15.
The ______ allows you to see what you are doing on the computer
Correct Answer
Monitor
Explanation
A monitor is a device that displays visual output from a computer. It allows users to see what they are doing on the computer by presenting information, images, and videos in a visual format. The monitor acts as an interface between the user and the computer, providing a visual representation of the data being processed. Without a monitor, users would not be able to visually interact with the computer or view the output of their actions.
16.
The ______ moves the cursor around the screen
Correct Answer
Mouse
Explanation
The mouse is a peripheral device that allows users to move the cursor on the screen. By moving the physical mouse, the cursor on the screen also moves accordingly. This enables users to interact with graphical user interfaces, navigate through menus, click on icons, and perform various tasks on a computer. The mouse typically has buttons that can be clicked to select items or perform actions, making it an essential tool for navigating and controlling the computer interface.
17.
The ______ allows you to save information from the computer
Correct Answer
USB, Universal Serial Bus, Floppy Disk
Explanation
The USB (Universal Serial Bus) is a device that allows you to save information from the computer. It is a common and widely used technology for transferring data between devices. The Floppy Disk, on the other hand, was a storage medium used in the past to save information from the computer, but it is now obsolete and rarely used.
18.
The ______ lets you burn and save information from the computer
Correct Answer
CD, CD ROM, DVD
Explanation
CD, CD ROM, and DVD are all types of optical storage media that allow users to burn and save information from a computer. These discs have the ability to store large amounts of data, including music, videos, documents, and software. They are commonly used for creating backups, sharing files, and distributing media. The process of burning data onto these discs involves using a CD/DVD burner drive on a computer, which writes the information onto the disc using a laser. Once burned, the data can be accessed and read on compatible devices such as CD/DVD players or computer disc drives.
19.
Which is the correct order?
Correct Answer
C. Input - process - output
Explanation
The correct order is input - process - output. This order suggests that first, there is an input of data or information. Then, this input goes through a process or a series of actions. Finally, as a result of the process, there is an output or a final outcome. This order follows a logical flow of how information or data is typically handled or transformed in various systems or processes.
20.
Which of the following is not an input device?
Correct Answer
D. Printer
Explanation
The printer is not an input device because it is used to produce hard copies of documents or images. Input devices are used to input data or commands into a computer, while printers are output devices that produce physical copies of digital information. Therefore, the printer does not fit the definition of an input device.
21.
Which device is this?
Correct Answer
A. Input
Explanation
The given options are "Input", "Output", "Storage", and "All of the above". The correct answer is "Input". This suggests that the device being referred to is related to input functions, such as a keyboard or a mouse, which are used to provide data or commands to a computer system. The other options, "Output" and "Storage", refer to different functions and devices.
22.
What does this (mouse) input device do?
Correct Answer
A. Allows you to interact with the operating system and application software
Explanation
This mouse input device allows users to interact with the operating system and application software. It enables users to control the cursor on the screen, select and click on items, navigate through menus, and perform various actions within the software and operating system. Additionally, it can also be used to manipulate images and software by dragging, resizing, and editing elements on the screen. Therefore, the correct answer is "Allows you to interact with the operating system and application software."
23.
What is the Processor?
Correct Answer
B. Information is saved on the computer
Explanation
The processor refers to the central processing unit (CPU) of a computer. It is responsible for executing instructions and performing calculations. While information can be stored in various forms on a computer, such as in memory or on storage devices, the statement "Information is saved on the computer" is the most accurate explanation for the role of the processor. The processor interacts with the computer's memory and storage to access and manipulate data, making it an essential component for saving and processing information on a computer.
24.
Which of the following activities is not the responsibility of the processor?
Correct Answer
C. Over look instructions
Explanation
The processor's responsibility is to perform mathematical operations, detect signals from input devices, and send messages to peripheral devices. However, "overlooking instructions" is not a valid responsibility of the processor. The processor's main function is to execute instructions and perform calculations, not to overlook or ignore any instructions.
25.
Which of the following is an output device?
Correct Answer
D. Speaker
Explanation
A speaker is considered an output device because it is used to produce sound or audio output from a computer or other electronic device. It takes the electrical signals from the device and converts them into audible sound waves that can be heard by the user. The other options listed, such as a mouse, scanner, and digital camera, are all input devices that are used to provide input or capture information into the computer or electronic device.
26.
Which of the following is not a storage device?
Correct Answer
A. USB Wire
Explanation
A USB wire is not a storage device. It is a cable used to connect storage devices, such as flash disks, CD ROMs, and DVDs, to a computer or other devices. While the USB wire facilitates the transfer of data between devices, it does not have any storage capacity of its own.
27.
Why is the Hard disk drive used?
Correct Answer
D. All of the above
Explanation
The hard disk drive is used to store various types of data, including the operating system software, application software, and user data. It provides a non-volatile storage solution that allows for easy access and retrieval of stored information. By having all of these components stored on the hard disk drive, it enables the computer system to function properly and efficiently.
28.
Why would someone use a flash memory device?
Correct Answer
A. Back up
Explanation
Someone would use a flash memory device for back up purposes. Flash memory devices are portable and have high storage capacity, making them convenient for storing and transferring important data. They can be used to create backups of files, documents, photos, and other valuable information, ensuring that data is protected and easily accessible in case of data loss or device failure. Additionally, flash memory devices are durable and reliable, providing a safe and secure way to store important data.
29.
Why would a company use CD's or DVD's?
Correct Answer
B. Distribute Software
Explanation
A company would use CDs or DVDs to distribute software because these physical mediums provide a convenient and tangible way to deliver software to customers or clients. CDs and DVDs can hold large amounts of data, making them suitable for distributing software applications that may be too large to download over the internet. Additionally, CDs and DVDs can be easily duplicated and distributed in bulk, allowing for efficient distribution to multiple users or locations.
30.
What is the job of the Operating system?
Correct Answer
A. Controls how the computer communicates with peripHeral devices
Explanation
The job of the operating system is to control how the computer communicates with peripheral devices. This means that the operating system manages the interaction between the computer and external devices such as printers, scanners, and keyboards. It ensures that data can be transferred between the computer and these devices effectively and efficiently. Additionally, the operating system also performs other important tasks such as managing memory, running applications, and providing a user interface.
31.
Give an example of application software? (The answer needs to be singular)
Correct Answer
Desktop Publishing, Word Processing, Spreadsheet, Database
Explanation
The given answer options are all examples of application software. Application software refers to computer programs that are designed to perform specific tasks for the user. Desktop publishing software is used for creating and formatting documents with advanced design elements. Word processing software is used for creating, editing, and formatting text documents. Spreadsheet software is used for organizing and manipulating numerical data. Database software is used for storing, managing, and retrieving large amounts of data.
32.
What is a Utility Program?
Correct Answer
B. Provides Support
Explanation
A utility program is a software that provides support to the user by performing various tasks to enhance the functionality and performance of a computer system. It helps in managing and optimizing system resources, maintaining security, troubleshooting issues, and performing routine maintenance tasks. Utility programs can provide support in various ways such as managing files, controlling hardware devices, monitoring system performance, and assisting in software installation and updates.
33.
Which of the following is not an example of a Utility Program?
Correct Answer
D. Operating System
Explanation
The operating system is not considered a utility program because it is a fundamental software that manages computer hardware and software resources. Utility programs, on the other hand, are additional software tools that perform specific tasks to enhance the functionality and performance of the computer system. Disk checker, disk cleaner, and disk defragmenter are all examples of utility programs as they are designed to optimize and maintain the storage devices of the computer.
34.
What is LAN?
Correct Answer
A. Local Area Network
Explanation
LAN stands for Local Area Network. It is a network that connects computers and devices within a limited area such as a home, office building, or school. LANs are typically used for sharing resources like files, printers, and internet connections among connected devices. They are usually faster and more secure than wide area networks (WANs) because they cover a smaller geographical area. LANs can be wired or wireless, depending on the technology used for communication between devices.
35.
Which of the following is not an example of a LAN?
Correct Answer
D. Open University
Explanation
The Open University is not an example of a LAN because it is a distance learning institution that operates online, allowing students to access their courses and materials remotely. A LAN, or Local Area Network, refers to a network that is confined to a small geographic area, such as a school, university, or internet cafe, where computers and devices are connected to each other for sharing resources and information within that specific location.
36.
What is WAN?
Correct Answer
C. Wide Area Network
Explanation
A Wide Area Network (WAN) is a type of computer network that spans a large geographical area, such as multiple cities or even countries. It connects multiple local area networks (LANs) together, allowing computers and devices in different locations to communicate with each other. Unlike a local area network, which is limited to a small area like a home or office building, a WAN provides connectivity over long distances. The correct answer is "Wide Area Network."
37.
Why is WAN different to LAN?
Correct Answer
D. WANs are networks that are found where computers in different areas or countries need to communicate.
Explanation
WANs, or Wide Area Networks, are different from LANs, or Local Area Networks, because they are designed to connect computers in different areas or countries. LANs, on the other hand, are networks that connect computers in the same building. The distinction lies in the geographical scope of the network. WANs are used to facilitate communication over larger distances, often using public infrastructure such as telephone lines or satellite links. This allows for connectivity between computers located far apart, enabling organizations to establish a network that spans multiple locations.
38.
What is an advantage of using a network?
Correct Answer
A. Resources (hardware and software) can be shared
Explanation
An advantage of using a network is that resources such as hardware and software can be shared. This means that multiple users can access and utilize the same resources, which can lead to cost savings and increased efficiency. By sharing resources, organizations can avoid duplicating expensive equipment or software licenses, and can also easily collaborate and communicate with each other. Additionally, shared resources can be centrally managed and monitored, making it easier to maintain and update them.
39.
What is a disadvantage of using a network?
Correct Answer
B. Setup costs are too expensive
Explanation
A disadvantage of using a network is that the setup costs are too expensive. This means that the initial investment required to establish and configure the network infrastructure, including hardware, software, and network devices, is high. This can be a significant barrier for individuals or small businesses with limited financial resources. The expensive setup costs may deter them from implementing a network, limiting their ability to benefit from the advantages and functionalities offered by network connectivity.
40.
Which email provider do we use?
Correct Answer
D. Outlook
Explanation
Outlook is the email provider that is used.
41.
You cannot use Outlook for which of the following tasks?
Correct Answer
B. Video Conference
Explanation
Outlook is an email client and personal information manager developed by Microsoft. It is commonly used for sending and receiving emails, managing appointments, and organizing tasks. However, Outlook does not have built-in features for conducting video conferences. While it may support scheduling and sending invitations for video conferences, the actual video conferencing functionality would require a separate application or platform. Therefore, the correct answer is Video Conference.
42.
What is an ISP?
Correct Answer
D. Internet Service Provider
Explanation
An ISP stands for Internet Service Provider. ISPs are companies that provide internet access to individuals and organizations. They offer various types of internet connections, such as dial-up, DSL, cable, and fiber optic, allowing users to connect to the internet and access online services. ISPs also offer additional services like email accounts, web hosting, and virtual private networks (VPNs). They play a crucial role in connecting users to the internet and enabling communication and online activities.
43.
Which of the following is not an example of an ISP?
Correct Answer
C. Dishy
Explanation
Dishy is not an example of an ISP because it is a satellite internet service provider that focuses on providing internet access to rural areas. While AOL, Talk Talk, and Tiscali are all well-known ISPs that offer internet services to a wide range of customers, Dishy's primary focus is on providing internet access via satellite technology rather than traditional wired or wireless connections.