The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Which of the following is not in the Microsoft Office suite.
A.
AutoCad
B.
Words
C.
Publisher
D.
Powerpoint
Correct Answer
A. AutoCad
Explanation AutoCad is not in the Microsoft Office suite. Microsoft Office suite includes applications like Word, Publisher, and PowerPoint, which are commonly used for word processing, desktop publishing, and creating presentations. However, AutoCad is a separate software application developed by Autodesk, used for computer-aided design (CAD) and drafting purposes. While Microsoft Office suite is widely used for general office tasks, AutoCad is specifically designed for engineering and architectural design.
Rate this question:
2.
In many programs short-cuts use the same settings, the short-cut CTRL - Vwill.
A.
Print the document
B.
Cut the document
C.
Paste the text
D.
Copy the document
Correct Answer
C. Paste the text
Explanation The correct answer is "Paste the text." In many programs, the shortcut CTRL-V is used to paste text. This means that when you have copied something and want to insert it into another location, you can use this shortcut instead of going through the menu options. It is a convenient and efficient way to quickly transfer information.
Rate this question:
3.
To log-on onto a secure network a user must have a
A.
Username
B.
Password
C.
Username & password
D.
User Pin code
Correct Answer
C. Username & password
Explanation To log onto a secure network, a user must have both a username and a password. The username is used to identify the user, while the password is used to verify their identity and grant access to the network. This two-factor authentication method ensures that only authorized users can access the network, as both pieces of information are required to log in successfully. Using just a username or password alone would not provide sufficient security.
Rate this question:
4.
If a file is accidentally deleted it maybe possible to restore it from the
A.
WINDOWS folder
B.
Recycle bin
C.
Drive C:
D.
Trash can
Correct Answer
B. Recycle bin
Explanation When a file is accidentally deleted, it is typically moved to the Recycle bin. The Recycle bin acts as a temporary storage location for deleted files, allowing users to easily restore them if needed. This feature is available in the Windows operating system and provides a safety net for users who may have mistakenly deleted a file. By accessing the Recycle bin, users can locate and restore their deleted files back to their original location.
Rate this question:
5.
If you want to close a program you can (in Windows)
A.
Click on the red box with a X at the top left of the screen
B.
Click on the red box with a X at the top right of the screen
C.
Click on the start at the bottom of the screen and chose shut down
D.
Hold in the power button on the system box
Correct Answer
B. Click on the red box with a X at the top right of the screen
Explanation To close a program in Windows, you can click on the red box with an X at the top right of the screen. This is a common convention in Windows operating systems, where the X button is typically located at the top right corner of a window. Clicking on this button will close the program and remove it from the screen.
Rate this question:
6.
Computer hardware is made up of three types of hardware, which of the following listedbelow is a piece of computer hardware?
A.
Norton antivirus
B.
Microsoft Office
C.
Software
D.
Dual Inline Memory Module
Correct Answer
D. Dual Inline Memory Module
Explanation A Dual Inline Memory Module (DIMM) is a type of computer hardware that is used for storing and accessing data in a computer's memory. It is a physical component that can be inserted into a computer's motherboard to increase its memory capacity. Norton antivirus and Microsoft Office are software programs, not hardware components. While software is an essential part of a computer system, it is not considered computer hardware.
Rate this question:
7.
A monitor can also be called a
A.
TV
B.
VDU
C.
Display Board
D.
Screen
Correct Answer
B. VDU
Explanation A monitor can also be called a VDU, which stands for Visual Display Unit. This term is commonly used to refer to the device that displays visual output from a computer. VDU accurately describes the function of a monitor, as it is responsible for visually displaying information and graphics. The other options, such as TV, Display Board, and Screen, may also refer to devices that display visual content, but VDU is the most specific and commonly used term for a computer monitor.
Rate this question:
8.
At bed time one must always____________ to the computer system.
A.
Lock the computer
B.
Shut-down the computer
C.
Log-in to the computer
D.
Log-off the comptuer
Correct Answer
B. Shut-down the computer
Explanation At bedtime, it is important to shut down the computer to ensure that it is properly turned off and not consuming unnecessary power. This helps to conserve energy, prevent overheating, and prolong the lifespan of the computer. Shutting down the computer also allows for any updates or maintenance tasks to be performed, ensuring that the system remains in good working condition. Additionally, shutting down the computer can help protect it from potential security risks or unauthorized access.
Rate this question:
9.
Which of the following is not a operating system
A.
MacOS Sierra
B.
Unix
C.
Acronis True Image
D.
Windows XP
Correct Answer
C. Acronis True Image
Explanation Acronis True Image is not an operating system. It is a software program developed by Acronis that provides data protection and backup services for operating systems such as Windows, macOS, and Linux. It allows users to create disk images, clone drives, and restore data. However, it is not an operating system itself. Operating systems like macOS Sierra, Unix, and Windows XP are software that manage computer hardware and software resources, providing services for computer programs and users.
Rate this question:
10.
What does RAM stands for.
A.
Red Alert Memory
B.
Read Always Memory
C.
Random Alert Memory
D.
Random Access Memory
Correct Answer
D. Random Access Memory
Explanation RAM stands for Random Access Memory. This type of memory allows data to be read from or written to in any order, making it "random" in nature. Unlike other types of memory, RAM provides fast and temporary storage for data that can be quickly accessed by the computer's processor. It is commonly used in computers and other electronic devices to store and retrieve data quickly, improving overall system performance.
Rate this question:
11.
Internal peripherals are devices that
A.
Attached to the outside of the system unit.
B.
Parts that make up the monitor
C.
The keys on your keyboard
D.
Attached to the inside of the system unit.
Correct Answer
D. Attached to the inside of the system unit.
Explanation Internal peripherals are devices that are attached to the inside of the system unit. This means that they are located within the computer case and are connected directly to the motherboard. Examples of internal peripherals include hard drives, optical drives, and expansion cards. These devices are essential for the proper functioning of the computer and are not visible from the outside.
Rate this question:
12.
When processing information with a computer there are four main actionsundertaken, which is the correct order
A.
Input, Output, Processing, Storage
B.
Output, Processing, Storage, Input
C.
Input, Storage, Output, Processing
D.
Input, Processing, Output, Storage
Correct Answer
D. Input, Processing, Output, Storage
Explanation When processing information with a computer, the first step is to input the data or information into the computer. After the input is received, the computer then processes the data by performing calculations, executing commands, or running algorithms. Once the processing is complete, the computer generates output, which can be in the form of text, images, sound, or any other type of media. Finally, the computer stores the processed data or information in its memory or storage devices for future use. Therefore, the correct order of actions when processing information with a computer is Input, Processing, Output, Storage.
Rate this question:
13.
By using short-cuts you can become more efficient. Which of the following isNOT a short-cut that can be used to store a file in more than one location
A.
Ctrl-C
B.
CTRL-V
C.
Left click - copy
Correct Answer
C. Left click - copy
Explanation The left click - copy option is not a shortcut that can be used to store a file in more than one location. Ctrl-C and Ctrl-V are keyboard shortcuts commonly used to copy and paste files or text, allowing for efficient duplication. However, the left click - copy option refers to manually selecting the copy option using the mouse, which does not offer the same level of efficiency as the keyboard shortcuts.
Rate this question:
14.
A form of storage NOT commonly used today is a
A.
Universal Serial Bus
B.
Digital Versatile Disc
C.
Floppy Disk
D.
Compact Disc-ReWritable
Correct Answer
C. Floppy Disk
Explanation A floppy disk is a form of storage that was commonly used in the past but is not commonly used today. It was a magnetic storage device that could store a small amount of data, typically 1.44 MB. Floppy disks were replaced by more advanced and higher-capacity storage options such as USB drives, DVDs, and CD-RWs.
Rate this question:
15.
During electrical storms all computer hardware must be
A.
Left running
B.
Shutdown and if possible disconnected from any power or communication
sources
C.
The system box turn off and all other hardware left on
D.
Just the monitor turned off
Correct Answer
B. Shutdown and if possible disconnected from any power or communication
sources
Explanation During electrical storms, it is recommended to shut down and disconnect all computer hardware from power and communication sources. This is because electrical storms can cause power surges or lightning strikes that can damage the hardware. By shutting down and disconnecting the hardware, the risk of damage is minimized.
Rate this question:
16.
To allow easy and efficient identification of files, you should apply some basicprinciples when saving. Which one listed is incorrect
A.
Store files in folders
B.
Accept the suggested file name the software gives you
C.
Name files appropriately
D.
Store files in sub-folders
Correct Answer
B. Accept the suggested file name the software gives you
Explanation Accepting the suggested file name given by the software is incorrect because it may not accurately describe the content of the file. It is important to name files appropriately so that they can be easily identified and organized. Storing files in folders and sub-folders also helps in efficient file management.
Rate this question:
17.
Data on a computer is stored is quantities called Bits and Bytes. Which is thelargest unit of measurement for computer data
A.
Megabyte (MB)
B.
Petabyte (PB)
C.
Terabyte (TB)
D.
Exabyte (EB)
Correct Answer
D. Exabyte (EB)
Explanation The largest unit of measurement for computer data is the Exabyte (EB). Bits and Bytes are smaller units of measurement, with a Byte being composed of 8 Bits. A Megabyte (MB) is equal to 1,000,000 Bytes, a Terabyte (TB) is equal to 1,000,000,000,000 Bytes, and a Petabyte (PB) is equal to 1,000,000,000,000,000 Bytes. The Exabyte (EB) is even larger, equal to 1,000,000,000,000,000,000 Bytes. Therefore, the Exabyte (EB) is the correct answer as it represents the largest unit of measurement for computer data.
Rate this question:
18.
Ports on a computer allow for external input and output devices to beattached to the motherboard of a computer. Which one of the following is anexternal input port
A.
Parallel (printer) port
B.
Power port
C.
PS/2 port
D.
Video card port
Correct Answer
B. Power port
Explanation The power port is an external input port on a computer. It is used to connect the power adapter or cord to the computer, providing the necessary electrical power for the computer to function. Without the power port, the computer would not be able to receive power and therefore would not be able to operate.
Rate this question:
19.
Which of the following has a higher transmission speed?
A.
ISDN Modem (Integrated Services Digital Network)
B.
NET Speed (dongles)
C.
DSL Modem (Digital subscriber line)
D.
T1 line
Correct Answer
C. DSL Modem (Digital subscriber line)
Explanation A DSL modem (Digital subscriber line) has a higher transmission speed compared to the other options listed. DSL technology allows for high-speed internet access over traditional copper telephone lines. It provides faster download and upload speeds compared to ISDN modems, NET Speed dongles, and T1 lines. ISDN modems use digital telephone lines but offer lower speeds. NET Speed dongles are typically used for mobile internet access and may have slower speeds. T1 lines are dedicated high-speed connections but typically have lower speeds compared to DSL modems.
Rate this question:
20.
_________ is a browser
A.
Hotmail
B.
Internet Explorer and Firefox
C.
Gmail
D.
Window Interface
Correct Answer
B. Internet Explorer and Firefox
Explanation The correct answer is Internet Explorer and Firefox. These are both web browsers commonly used to access the internet. Hotmail and Gmail are email services, while Window Interface is not a browser but rather a graphical user interface for the Windows operating system.
Rate this question:
21.
The device that is use to modulate and demodulate data that is transmitted via a communication channel is called a DSL.
A.
True
B.
False
Correct Answer
B. False
Explanation The device that is used to modulate and demodulate data transmitted via a communication channel is actually called a modem, not a DSL. DSL (Digital Subscriber Line) is a technology that uses modems to provide high-speed internet access over traditional telephone lines. So, the given statement is false.
Rate this question:
22.
The name given to the company responsible for providing users withthe gateway to the internet is called a ISP.
A.
True
B.
False
Correct Answer
A. True
Explanation The company responsible for providing users with the gateway to the internet is called an ISP, which stands for Internet Service Provider. ISPs are organizations that offer internet access to individuals and businesses. They provide various services such as internet connectivity, email services, web hosting, and more. Therefore, the statement "The name given to the company responsible for providing users with the gateway to the internet is called an ISP" is true.
Rate this question:
23.
The acronym URL stands for Universal Resource Locator
A.
True
B.
False
Correct Answer
A. True
Explanation The acronym URL stands for Universal Resource Locator. This is true because a URL is a web address that is used to locate and identify resources on the internet. It provides the specific location of a webpage or file, allowing users to access it by typing the URL into a web browser. The term "Universal" indicates that URLs are used universally across the internet, and "Resource Locator" refers to the function of locating and accessing resources online.
Rate this question:
24.
Computers connected in a small geographical area is called a Wide Area Network
A.
True
B.
False
Correct Answer
B. False
Explanation A Wide Area Network (WAN) is actually a computer network that spans a large geographical area, such as multiple cities or even countries. It connects computers and other devices over long distances using various communication channels, such as telephone lines, fiber optic cables, or satellite links. On the other hand, a Local Area Network (LAN) is a network that covers a smaller area, typically within a single building or campus. Therefore, the statement that computers connected in a small geographical area is called a Wide Area Network is false.
Rate this question:
25.
Computers connected in a Large geographical area is called a Local Area Network
A.
True
B.
False
Correct Answer
B. False
Explanation The given statement is incorrect. Computers connected in a large geographical area are not called a Local Area Network (LAN). Instead, they are referred to as a Wide Area Network (WAN). A LAN typically covers a smaller area, such as a home, office, or building, while a WAN covers a larger area, such as multiple cities or countries. Therefore, the correct answer is False.
Rate this question:
26.
What does the acronym HTTP means __________________
Correct Answer Hypertext Transfer Protocol, Hyper Text Transfer Protocol
Explanation The acronym HTTP stands for Hypertext Transfer Protocol, which is a protocol used for transmitting hypermedia documents, such as HTML, over the internet. It is the foundation of data communication for the World Wide Web. The second option, "Hyper Text Transfer Protocol," is a repetition of the correct answer and does not provide any additional information.
Rate this question:
27.
What does the acronym FTP means _____________________
Correct Answer File Transfer Protocol
Explanation FTP stands for File Transfer Protocol. It is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet. FTP provides a simple and efficient way to upload, download, and manage files on a remote server. It allows users to authenticate themselves with a username and password, and then navigate through directories, list files, and transfer data securely. FTP is widely used in various applications, such as website development, file sharing, and remote server administration.
Rate this question:
28.
The Process of accessing and saving an attachment from the internet is known as __________________
Correct Answer Downloading, Download, Saving
Explanation The process of accessing and saving an attachment from the internet is known as downloading. When we download a file or attachment, we are retrieving it from a remote server and saving it to our local device for future use. Downloading allows us to transfer files such as documents, images, videos, or software from the internet to our own computer or device, enabling us to access and use them offline. Saving refers to the action of storing the downloaded file in a specific location on our device for easy retrieval and organization.
Rate this question:
29.
The Process of attaching a file is known as ________________________
Correct Answer Uploading, Upload, Attach
Explanation The process of attaching a file refers to the action of transferring a file from a local device to a remote server or platform. This can be done through various methods such as using a file transfer protocol (FTP), email attachments, or cloud storage services. The terms "uploading," "upload," and "attach" all describe this action of sending a file to be stored or shared digitally.
Rate this question:
30.
When Sending an email you will see Address, CC and subject. What does CC means __________________
Correct Answer Carbon Copy
Explanation CC stands for Carbon Copy. In email communication, CC is used to send a copy of the email to additional recipients. It allows the sender to include other people in the conversation without directly addressing them in the "To" field. The recipients in the CC field will receive a copy of the email, and their email addresses will be visible to all other recipients. This feature is commonly used when multiple people need to be kept informed or involved in a particular email thread.
Rate this question:
31.
Which of the following is a search engine?
A.
Google
B.
Mail.yahoo.com
C.
Hotmail
D.
Google Mail
Correct Answer
A. Google
Explanation Google is a search engine because it is a widely used platform that allows users to search for information on the internet. It indexes web pages and provides relevant search results based on user queries. Google's search engine algorithm analyzes various factors to determine the most relevant and reliable sources of information for users. It is known for its comprehensive search results and user-friendly interface, making it a popular choice for internet searches.
Rate this question:
32.
Internet refers to the
A.
Interconnectivty of computers limited to members or employees of an
organization or company
B.
Interconnectivty of computers limited to members of an organisation or
company with the exception of temporary connection for a person from a
another company with a special password access.
C.
Interconnectivity of computers over the globe.
Correct Answer
C. Interconnectivity of computers over the globe.
Explanation The correct answer is "Interconnectivity of computers over the globe." This option best describes the concept of the internet, which is the global network of interconnected computers that allows communication and sharing of information worldwide. The other options mention limitations or restrictions on the interconnectivity, while the correct answer emphasizes the global nature of the internet.
Rate this question:
33.
Intranet refers to the
A.
Interconnectivty of computers limited to members or employees of an
organization or company
B.
Interconnectivty of computers limited to memberrs of an organisation or
company with the exception of temporary connection for a person from a
another company with a special password access.
C.
Interconnectivity of computers over the globe.
Correct Answer
A. Interconnectivty of computers limited to members or employees of an
organization or company
Explanation The correct answer is "Interconnectivity of computers limited to members or employees of an organization or company." This is because an intranet is a private network that can only be accessed by authorized individuals within a specific organization or company. It is used to share information, resources, and collaboration tools among employees, while keeping it secure from external access.
Rate this question:
34.
If a user has to shutdown his/her computer without reading anemail, what is the best thing the user can do to the the email?
A.
Mark as UNREAD
B.
Mark as READ
C.
Flag for Follow UP
Correct Answer
A. Mark as UNREAD
Explanation The best thing the user can do to the email if they have to shutdown their computer without reading it is to mark it as unread. This way, when they turn on their computer again, they will be able to easily identify and prioritize the unread email, ensuring that they do not miss any important information or tasks.
Rate this question:
35.
Why is cheating innapropriate?
A.
It will not give a true assessment on the student's learning
progress
B.
I do not think it is wrong if I help my neighbour with one or two questions
C.
I do not think it is wrong if my neighbour help me with one or two
questions
Correct Answer
A. It will not give a true assessment on the student's learning
progress
Explanation Cheating is inappropriate because it does not provide an accurate reflection of a student's learning progress. When a student cheats, they are not demonstrating their own understanding and knowledge of the material. Instead, they are relying on dishonest means to achieve a desired outcome. This undermines the purpose of assessments, which is to evaluate a student's individual growth and comprehension. Cheating not only deceives others, but it also hinders personal development and the opportunity for genuine learning.
Rate this question:
36.
What does CPU means?
Correct Answer central processing unit
Explanation CPU stands for Central Processing Unit. It is the primary component of a computer system that performs most of the processing inside a computer. The CPU is responsible for executing instructions, performing calculations, and managing data flow between different components of the computer. It acts as the brain of the computer, coordinating and controlling all other hardware and software components.
Rate this question:
37.
What does ROM means?
Correct Answer Read Only Memory
Explanation ROM stands for Read Only Memory. It is a type of computer memory that stores data permanently and cannot be modified or erased. The data stored in ROM is non-volatile, meaning it remains intact even when the computer is turned off. ROM is used to store essential instructions and data that are required for the computer to boot up and start functioning. It is called "Read Only" because the data can only be read from it and not written to it. ROM is commonly found in devices such as game consoles, smartphones, and embedded systems.
Rate this question:
38.
What does DIMM means?
Correct Answer Dual inline memory module, Dual in line memory module, Dual in-line memory module
Explanation DIMM stands for Dual Inline Memory Module. This type of memory module is used in computers to provide additional RAM (Random Access Memory). It is called "dual" because it has two sets of electrical contacts on each side of the module, allowing for increased data transfer rates. The term "inline" refers to the fact that the memory chips are aligned in a row on the module. DIMMs are a common form factor for memory modules and are widely used in desktop and server computers.
Rate this question:
39.
The computer only understand two states that are known as Binary, select the to state from the list below.
A.
1
B.
2
C.
3
D.
4
E.
5
F.
6
G.
7
H.
8
I.
9
J.
0
Correct Answer(s)
A. 1 J. 0
Explanation Computers understand and process information in binary form, which consists of only two states: 0 and 1. These states represent the absence or presence of an electrical signal, respectively. Therefore, the correct answer is 1 and 0, as they are the binary states that computers can understand.
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.