1.
What is the primary function of RAM in a computer?
Correct Answer
D. Temporary data storage
Explanation
RAM, or Random Access Memory, serves as temporary data storage in computers, allowing the system to access data quickly. It stores data and machine code that is currently being used or processed by the CPU. This temporary storage is volatile, meaning it only retains data while the device is powered on, which enables faster access than reading from permanent storage like a hard disk. The speed at which RAM operates significantly affects the overall performance of a computer, as it directly influences the efficiency of executing programs and processing tasks.
2.
Which device is used primarily for data input into a computer?
Correct Answer
C. Keyboard
Explanation
The keyboard is a primary input device used to enter data into a computer. It allows users to input text and commands, serving as the main interface for typing and navigating within software applications. Keyboards translate physical keystrokes into digital signals that the computer can understand, enabling interaction with the operating system and other installed programs. This essential tool is fundamental for most computing tasks, from writing documents to coding software.
3.
What does 'HTTP' stand for?
Correct Answer
A. HyperText Transfer Protocol
Explanation
HTTP stands for HyperText Transfer Protocol. It is the foundation of data communication for the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions web servers and browsers should take in response to various commands. For example, when a URL is entered in a browser, an HTTP command is sent to the web server directing it to fetch and transmit the requested web page. The protocol is a crucial element of the internet infrastructure, facilitating the retrieval and display of web pages and other online content.
4.
In networking, what does LAN stand for?
Correct Answer
B. Local Area Network
Explanation
LAN stands for Local Area Network. It is a network that connects computers and other devices within a limited area such as a residence, school, laboratory, or office building. The network enables devices connected within this confined space to share information and resources such as printers and file servers quickly and securely. LAN setups are commonly used because they facilitate easy and efficient communication and resource sharing within localized environments, supporting multiple devices through various connectivity methods like Ethernet or Wi-Fi.
5.
What type of software is Microsoft Excel?
Correct Answer
C. Spreadsheet software
Explanation
Microsoft Excel is classified as spreadsheet software, which is used to organize, format, and calculate data with formulas using a system of rows and columns. Excel allows users to perform a wide range of tasks such as financial modeling, data analysis, and accounting. It is equipped with tools for graphing and analyzing quantitative data, making it an essential application for businesses, researchers, and anyone who needs to manage significant amounts of data efficiently.
6.
Which protocol is used to send emails?
Correct Answer
C. SMTP
Explanation
SMTP stands for Simple Mail Transfer Protocol. It is the standard protocol used for sending emails across the Internet. SMTP facilitates the transfer of email messages from a sender's mail server to the recipient's mail server, ensuring that emails are correctly routed between servers until they reach the intended inbox. This protocol is fundamental for email communication, operating behind the scenes to connect different email networks and ensure messages are delivered promptly and accurately.
7.
What does the term 'phishing' refer to in computer security?
Correct Answer
C. A method of fraud
Explanation
Phishing is a method of fraud where attackers impersonate legitimate organizations via email, text messages, or other communication forms to steal sensitive information. This type of cyberattack tricks individuals into providing personal data, such as passwords and credit card numbers, by convincing them they are responding to a request from a trustworthy source. Phishing is a significant threat in cybersecurity, targeting unsuspecting users with sophisticated scams that can lead to identity theft and financial loss.
8.
What is the function of a firewall in a computer network?
Correct Answer
B. Preventing unauthorized access
Explanation
A firewall in a computer network is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Its primary function is to prevent unauthorized access to or from a private network. Firewalls can be implemented as hardware, software, or a combination of both, and are critical to securing network infrastructure by blocking malicious traffic, preventing cyberattacks, and managing data flow to and from the network.
9.
Which file extension is typically used for image files?
Correct Answer
B. .jpg
Explanation
The file extension .jpg (or JPEG) is typically used for image files, particularly for digital photos and other images compressed for storage. JPEG stands for Joint Photographic Experts Group, the name of the committee that created the standard. This format is widely used because it efficiently balances file size and image quality by using lossy compression, making it ideal for sharing photographs and graphics on the internet and storing them in digital devices.
10.
What tool in Microsoft Word could you use to check synonyms and definitions?
Correct Answer
C. Thesaurus
Explanation
The Thesaurus tool in Microsoft Word is used to check synonyms and definitions, enhancing vocabulary and improving content variety. This feature helps users find alternative words with similar meanings, thereby refining their writing style and clarity. The Thesaurus is a valuable tool for editing documents, enabling writers to avoid repetitive language and express ideas more effectively.