1.
When learning a new computer language, what is often the first thing you try to print on the screen.
Correct Answer
C. Hello World
Explanation
In programming, "Hello World" is often the first thing beginners try to print on the screen when learning a new computer language. It is a simple and common introductory program that displays the phrase "Hello World" as output. This practice allows beginners to understand the basic syntax and structure of the language, as well as to verify that their program is working correctly.
2.
Which of the following are clones of Apple II computers?
Correct Answer(s)
A. Franklin Ace
B. Orangepeal
C. Peach Microcomputer
Explanation
The Franklin Ace, Orangepeal, and Peach Microcomputer are clones of Apple II computers.
3.
Which of these is not a computer language?
Correct Answer
D. Cocoa
Explanation
Cocoa is not a language, however it is a development environment....
4.
Who is considered the father of the supercomputer?
Correct Answer
A. Seymour Cray
Explanation
Seymour Cray is considered the father of the supercomputer because he was a pioneer in the field of supercomputing. He designed and built the first commercially successful supercomputer, the CDC 6600, in the 1960s. Cray's innovative designs and engineering expertise revolutionized the supercomputing industry, leading to the development of faster and more powerful machines. His contributions laid the foundation for modern supercomputers, making him a key figure in the advancement of high-performance computing.
5.
What was the first "Killer Application" for the personal computer?
Correct Answer
C. Visicalc
Explanation
Visicalc was the first "Killer Application" for the personal computer. Visicalc was a spreadsheet program developed for the Apple II computer in the late 1970s. It revolutionized the business world by providing a tool for financial analysis and planning that was previously only available on mainframe computers. Visicalc's success helped drive the adoption of personal computers in businesses and paved the way for the widespread use of spreadsheet software.
6.
This picture is of the first Computer Mouse.
Correct Answer
A. True
Explanation
The given picture is of the first computer mouse. This suggests that the statement "True" is correct. The first computer mouse was invented by Douglas Engelbart in the 1960s and it was a key input device for early computers. It consisted of a wooden shell with two metal wheels that could move in any direction, allowing users to control the cursor on the screen. The invention of the computer mouse revolutionized the way we interact with computers and is an important milestone in the history of technology.
7.
HP, Microsoft, and Apple have one very interesting thing in common.
Correct Answer
B. They were all started in a garage
Explanation
The correct answer is that HP, Microsoft, and Apple were all started in a garage. This refers to the fact that all three companies were founded in humble beginnings, with their founders starting their operations in small spaces like garages. This is a well-known aspect of their origin stories and is often highlighted as an example of their entrepreneurial spirit and success despite their modest beginnings.
8.
This is a screenshot of the best game of all time, what is it called?
Correct Answer
D. Asteroids
Explanation
The correct answer is "Asteroids" because it is a well-known and highly regarded game from the past. It involves controlling a spaceship and shooting asteroids that come towards the player. The game was released in 1979 and became very popular due to its addictive gameplay and simple graphics. It is often considered a classic in the arcade game genre and has had a significant impact on the gaming industry.
9.
An understanding of the binary system is important in the study of computer science, but not absolutely necessary. What is the conversion of the base-2 number, 00000111, into base-10?
Correct Answer
A. 7
Explanation
Starting from the right, if the value is 1, them add the columns value, 1, 2, 4, 8 etc. So for this, 1+2+4 = 7.
10.
The first IBM PC virus began infecting 5.2" floppy disks in 1986. As Securelist reports, it was the work of two brothers, Basit and Amjad Farooq Alvi, who ran a computer store in Pakistan. What was it called?
Correct Answer
D. Brain
Explanation
Shaun was the first person to identify this in Zimbabwe, tracing it back to how it arrived in the country and documented it for the Computer Society of Zimbabwe.
11.
Which of the following is not a method for encoding text characters on a computer?
Correct Answer
C. ANSI
Explanation
ANSI (American National Standards Institute) is not a method for encoding text characters on a computer. ASCII (American Standard Code for Information Interchange), EBCDIC (Extended Binary Coded Decimal Interchange Code), and SIXBIT are all encoding methods used to represent text characters on a computer. ANSI, on the other hand, is a standards organization that sets guidelines for various industries, but it is not specifically a method for encoding text characters.
12.
Every machine on the Internet has an IP address, where will you get to if you go to 127.0.0.1
Correct Answer
B. Nowhere, that is your local machine
Explanation
If you go to the IP address 127.0.0.1, you will be directed to your local machine. This IP address is known as the loopback address and it is used to access the network interface of the machine you are currently using. It is often referred to as "localhost" and is commonly used for testing and troubleshooting purposes. Therefore, choosing the answer "Nowhere, that is your local machine" is correct as it accurately describes the destination when accessing the IP address 127.0.0.1.
13.
Which of the following terms does not refer to a potentially harmful computer program?
Correct Answer
D. Hardware
Explanation
The term "Hardware" does not refer to a potentially harmful computer program. Hardware refers to the physical components of a computer system such as the processor, memory, and storage devices. Rootkit, spyware, and adware are all types of malicious software that can harm a computer system by gaining unauthorized access, collecting sensitive information, or displaying unwanted advertisements.
14.
The term 'GUI' stands for...
Correct Answer
D. GrapHical User Interface
Explanation
The term 'GUI' stands for Graphical User Interface. This refers to a visual interface that allows users to interact with electronic devices through graphical icons, menus, and buttons. It provides a user-friendly and intuitive way to navigate and operate software applications or computer systems.