1.
What is Hardware?
Correct Answer
A. Something you can physically touch like a keyboard
Explanation
Hardware refers to the physical components of a computer system that can be touched and interacted with. This includes devices like keyboards, monitors, and printers. In contrast, programs like Word are software, which are intangible instructions that run on the hardware. Therefore, the correct answer is "Something you can physically touch like a keyboard."
2.
The six main parts of a computer are:
Monitor,
Keyboard,
CPU,
Main Memory,
Internal Storage,
Power Supply,
Correct Answer
A. True
Explanation
The given statement is true. The six main parts of a computer are the monitor, keyboard, CPU (Central Processing Unit), main memory, internal storage, and power supply. The monitor is the display screen that allows the user to view the output of the computer. The keyboard is an input device used to enter data and commands. The CPU is the brain of the computer, responsible for executing instructions and performing calculations. Main memory, also known as RAM (Random Access Memory), stores data and instructions that the CPU needs to access quickly. Internal storage, such as a hard drive or SSD (Solid State Drive), is used for long-term storage of data and programs. The power supply provides electrical power to the computer components.
3.
What is the function of the CPU?
Correct Answer(s)
B. Allows to operate software
C. Enables you to play against the computer
Explanation
The CPU, or Central Processing Unit, is the main component of a computer that performs most of the processing inside the computer. It is responsible for executing instructions and carrying out calculations, which enables the computer to operate software and perform tasks. Additionally, the CPU also enables users to play against the computer by processing the game instructions and providing the necessary computing power for gameplay.
4.
What does alphanumeric mean?
Correct Answer
B. A-Z, 0-9
Explanation
Alphanumeric refers to a combination of alphabetic letters (A-Z) and numeric digits (0-9). This means that alphanumeric characters can include any letter from A to Z and any number from 0 to 9. The correct answer, "A-Z, 0-9," accurately describes the range of characters that are considered alphanumeric.
5.
A Desktop is Portable?
Correct Answer
B. False
Explanation
The statement "A Desktop is Portable" is false. A desktop computer is not designed to be easily moved or carried around. It is typically larger and heavier than a laptop or a mobile device, making it less portable. Desktop computers are meant to be set up in a fixed location and are not intended for frequent transportation.
6.
There are _ Microsoft office programs
Correct Answer
11
Explanation
The given statement states that there are 11 Microsoft Office programs. This means that there are a total of 11 different software applications included in the Microsoft Office suite. These programs may include popular applications such as Word, Excel, PowerPoint, Outlook, Access, and others. Overall, there are 11 programs available in Microsoft Office.
7.
Whats the purpose of Microsoft Access?
8.
What Does a Keyboard do?
Correct Answer
A. Inputs information
Explanation
A keyboard is an input device that allows users to enter data and commands into a computer. It is used to input information by typing text, numbers, and symbols. The keys on the keyboard are designed to represent different characters and functions, and when pressed, they send signals to the computer, which then processes and displays the input accordingly. Therefore, the statement "Inputs information" accurately describes the primary function of a keyboard.
9.
Whats a Memo?
10.
In the context of network security, what is the primary purpose of a firewall?
Correct Answer
C. To manage network traffic and prevent unauthorized access
Explanation
A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. Its primary purpose is to establish a barrier between a trusted internal network and untrusted external networks, such as the internet, thereby preventing unauthorized access to the network.