Introduction To Computers Exam 2a

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Hsahnoun
H
Hsahnoun
Community Contributor
Quizzes Created: 1 | Total Attempts: 725
Questions: 25 | Attempts: 725

SettingsSettingsSettings
Introduction To Computers Exam 2a - Quiz

.


Questions and Answers
  • 1. 

    A network can be very small, but it must consist of at least ______

    • A.

      One computer

    • B.

      Two computers

    • C.

      Three computers

    • D.

      Three computers

    Correct Answer
    B. Two computers
    Explanation
    A network can be very small, but it must consist of at least two computers. This is because a network is a collection of interconnected devices that can communicate with each other and share resources. In order for communication and resource sharing to occur, there must be at least two devices present. Therefore, having only one computer would not meet the minimum requirement for a network.

    Rate this question:

  • 2. 

    What type of network is formed when computers are connected with one server computer sharing its resources with multiple computers?

    • A.

      Client/server

    • B.

      Compatible/portable

    • C.

      Internet/e-mail

    • D.

      Server/Internet

    Correct Answer
    A. Client/server
    Explanation
    When computers are connected with one server computer sharing its resources with multiple computers, a client/server network is formed. In this type of network, the server computer provides services and resources to the client computers. The clients request and access these resources from the server. This type of network allows for centralized control and management of resources, making it efficient and scalable for organizations.

    Rate this question:

  • 3. 

    Who were the main users of the first edition of the Internet?

    • A.

      The general public

    • B.

      The military and defence contractors

    • C.

      Major banks and retailers

    • D.

      Programmers at Microsoft

    Correct Answer
    B. The military and defence contractors
    Explanation
    During its early stages, the first edition of the Internet was primarily used by the military and defense contractors. It was initially developed as a means of communication and data sharing among military organizations and research institutions. The Internet's infrastructure and technology were mainly funded and utilized by these entities for strategic and security purposes. It wasn't until later that the Internet expanded its user base to include the general public, major banks, retailers, and programmers at companies like Microsoft.

    Rate this question:

  • 4. 

    Which statement is true about the Internet?

    • A.

      It uses the TCP/IP protocol

    • B.

      If any part of it fails, the rest of it fails.

    • C.

      It is owned and governed by the Department of Defense

    • D.

      Its technical standards and quality of content are the responsibility of Microsoft Corporation.

    Correct Answer
    A. It uses the TCP/IP protocol
    Explanation
    The statement that is true about the Internet is that it uses the TCP/IP protocol. TCP/IP (Transmission Control Protocol/Internet Protocol) is the set of protocols that enables communication between devices on the Internet. It provides a reliable and standardized method for data transmission and ensures that data packets are correctly delivered from the source to the destination. TCP/IP is the foundation of the Internet and is used for various applications such as email, web browsing, file transfer, and more.

    Rate this question:

  • 5. 

    Which type of modem provides an Internet connection through the telephone network without interrupting telephone connectivity?

    • A.

      Dial-up modem

    • B.

      Cable modem

    • C.

      DSL modem

    • D.

      Satellite modem

    Correct Answer
    B. Cable modem
    Explanation
    A cable modem provides an Internet connection through the television cable network, allowing users to access the Internet without interrupting their telephone connectivity. This type of modem uses the existing cable infrastructure to transmit data, providing high-speed Internet access. Unlike dial-up modems, which require a telephone line and can interrupt telephone service, cable modems operate independently, allowing users to use both the Internet and telephone simultaneously. DSL modems also provide Internet connectivity through the telephone network, but they can interrupt telephone service. Satellite modems, on the other hand, use satellite signals for Internet access and do not rely on the telephone network.

    Rate this question:

  • 6. 

    What are the two most used services on the Internet?

    • A.

      FTP and the Web

    • B.

      E-mail and FTP

    • C.

      The Web and E-mail

    • D.

      Usenet and E-mail

    Correct Answer
    C. The Web and E-mail
    Explanation
    The Web and E-mail are the two most used services on the Internet because they are widely accessible and commonly used by individuals and businesses. The Web allows users to access and share information through websites, while E-mail allows for communication and exchange of messages electronically. These services are integral to the functioning of the Internet and are utilized by a large number of people on a daily basis.

    Rate this question:

  • 7. 

    How do you start a particular Web browser in Windows 10?

    • A.

      You have to configure it as your preferred Web browser in Control Panel

    • B.

      You double-click its icon on the desktop or find it in the Start menu

    • C.

      You click the Internet icon on your desktop and select the particular Web browser from a drop-down menu that is displayed.

    • D.

      You have to first open Microsoft Edge, which is the default Windows 10 Web browser, and then search for the particular Web browser on the Internet

    Correct Answer
    B. You double-click its icon on the desktop or find it in the Start menu
    Explanation
    To start a particular web browser in Windows 10, you can either double-click its icon on the desktop or find it in the Start menu. This action will open the web browser and allow you to begin browsing the internet.

    Rate this question:

  • 8. 

    A Web page address is generally referred to as a _________

    • A.

      Uniform Signal Locator

    • B.

      Uniform Address Locator

    • C.

      Uniform Domain Locator

    • D.

      Uniform Resource Locator

    Correct Answer
    D. Uniform Resource Locator
    Explanation
    A Web page address is generally referred to as a Uniform Resource Locator (URL). A URL is a specific character string that provides the location of a resource on the internet. It includes the protocol used to access the resource (such as HTTP or HTTPS), the domain name or IP address of the server hosting the resource, and the specific path or location of the resource on the server. URLs are used to navigate and access web pages, files, images, videos, and other resources on the internet.

    Rate this question:

  • 9. 

    How do you use a URL to browse the Web?

    • A.

      Enter the URL in the Google or Yahoo search box.

    • B.

      Enter the URL in the address box of the Web browser.

    • C.

      Double-click a link on a Web page and confirm its URL by clicking OK

    • D.

      Right-click a link on a Web page and enter the URL in the short-cut menu.

    Correct Answer
    B. Enter the URL in the address box of the Web browser.
    Explanation
    To browse the web using a URL, you need to enter the URL in the address box of the web browser. The address box is where you type the website address or URL you want to visit. Once you enter the URL, the web browser will connect to the server hosting the website and display the requested webpage. This is the standard and most common method of accessing websites on the internet.

    Rate this question:

  • 10. 

    What are the three types of links you can find on Web pages?

    • A.

      Text links, image links and image map links.

    • B.

      Static links, dynamic links and hyperlinks

    • C.

      Local links, remote links and overseas links

    • D.

      Audio links, video links and multimedia links.

    Correct Answer
    A. Text links, image links and image map links.
    Explanation
    The correct answer is text links, image links, and image map links. These are the three types of links commonly found on web pages. Text links are hyperlinks that are embedded within text, allowing users to click on specific words or phrases to navigate to another page. Image links are clickable images that redirect users to another page when clicked. Image map links are specific areas within an image that act as clickable links, allowing users to navigate to different destinations based on where they click on the image.

    Rate this question:

  • 11. 

    How are website shortcuts organized in a Web browser?

    • A.

      By placing them in folders

    • B.

      By combining them into a single file

    • C.

      By sorting them by date and time

    • D.

      By having them all deleted when exiting a browsing session

    Correct Answer
    C. By sorting them by date and time
    Explanation
    Website shortcuts in a web browser are organized by sorting them by date and time. This means that the browser arranges the shortcuts based on when they were added or accessed, with the most recent ones appearing at the top. This helps users easily find and access their frequently visited websites, as the shortcuts are presented in a chronological order.

    Rate this question:

  • 12. 

    An Internet search tool such as Google, Bing or Yahoo! is referred to as ________

    • A.

      A search engine

    • B.

      An explorer

    • C.

      A finder

    • D.

      A finder

    Correct Answer
    A. A search engine
    Explanation
    An Internet search tool such as Google, Bing or Yahoo! is commonly referred to as a search engine. It is designed to help users find specific information on the internet by searching through a vast database of web pages and returning relevant results based on the user's query.

    Rate this question:

  • 13. 

    Which information is not true about search engines?

    • A.

      The results for your search is the same no matter which search engine you use (such as Google, Bing, or Yahoo)

    • B.

      When you type something in the search box, it actually searches a database and not the internet directly.

    • C.

      Search engine companies sometimes use web crawlers to gather information for their databases.

    • D.

      There are meta search engines that search using more than one search engine at a time.

    Correct Answer
    A. The results for your search is the same no matter which search engine you use (such as Google, Bing, or Yahoo)
    Explanation
    This statement is not true because different search engines use different algorithms and have different databases, which can lead to variations in search results.

    Rate this question:

  • 14. 

    How can you search the Web for an exact phrase in Google or Yahoo!?

    • A.

      Type the phrase in all uppercase font

    • B.

      Type the phrase in bold text

    • C.

      Place the phrase in quotation marks

    • D.

      Place the phrase in parenthesis.

    Correct Answer
    C. Place the pHrase in quotation marks
    Explanation
    To search for an exact phrase in Google or Yahoo!, you need to place the phrase in quotation marks. This ensures that the search engine looks for the exact phrase rather than individual words. By using quotation marks, the search results will only display pages that contain the exact phrase as it is typed, providing more accurate and relevant results.

    Rate this question:

  • 15. 

    Every valid e-mail address must contain _______ .

    • A.

      Your true first name and initial

    • B.

      Your real first and last name

    • C.

      The @ symbol

    • D.

      A domain name ending with .com

    Correct Answer
    C. The @ symbol
    Explanation
    Every valid e-mail address must contain the @ symbol. The @ symbol is a crucial component of an e-mail address as it separates the local part (before the @ symbol) from the domain part (after the @ symbol). Without the @ symbol, the e-mail address would not be recognized as valid.

    Rate this question:

  • 16. 

    When setting up an e-mail account in Gmail, how can you tell if the e-mail address you chose is available?

    • A.

      The setup program checks your chosen address automatically.

    • B.

      The setup program displays a list of all its existing e-mail addresses so you can choose one that will not be a duplicate.

    • C.

      You have to contact Google by phone to check availability.

    • D.

      You find out after the e-mail program is installed. If your chosen address is a duplicate, your e-mail won’t work.

    Correct Answer
    B. The setup program displays a list of all its existing e-mail addresses so you can choose one that will not be a duplicate.
    Explanation
    The correct answer is that the setup program displays a list of all existing email addresses in Gmail, allowing the user to choose an address that is not already taken. This feature helps to ensure that the chosen email address is unique and available for use.

    Rate this question:

  • 17. 

    Which statement about e-mail is true?

    • A.

      An e-mail message can be sent to multiple users at the same time.

    • B.

      E-mail is faster than faxing, although more difficult.

    • C.

      E-mail can be exchanged with everyone in the world, including those who don’t have an e-mail address.

    • D.

      E-mail typically reaches the recipient within a few hours or a few days if the recipient is in another country.

    Correct Answer
    A. An e-mail message can be sent to multiple users at the same time.
    Explanation
    One of the true statements about email is that it allows the sender to send a message to multiple users simultaneously. This is one of the key advantages of email as it allows for efficient communication with multiple recipients without the need for individual messages.

    Rate this question:

  • 18. 

    What happens when you send a blind carbon copy (bcc) of an e-mail message?

    • A.

      The recipient of the bcc receives a completely empty message.

    • B.

      The recipient of the bcc does not receive any attachments included with the e-mail message which are delivered to the main recipient.

    • C.

      The recipient of the bcc receives a copy of the e-mail message without any other recipients knowing.

    • D.

      The recipient of the bcc receives a copy of the e-mail message but doesn’t see who any of the other recipients (main, cc or other bcc) are

    Correct Answer
    C. The recipient of the bcc receives a copy of the e-mail message without any other recipients knowing.
    Explanation
    When you send a blind carbon copy (bcc) of an email message, the recipient of the bcc receives a copy of the email without any other recipients knowing. This means that the main recipient, as well as any other recipients in the cc or bcc fields, are unaware that the email has been sent to the bcc recipient. It allows for discreet communication or sending the same message to multiple recipients without revealing their identities to each other.

    Rate this question:

  • 19. 

    What does saving a draft do?

    • A.

      It saves an outgoing e-mail message without sending it so that you can get back to it later and revise it before sending it.

    • B.

      It saves a copy of an outgoing e-mail message you have just sent

    • C.

      It saves a copy of an incoming e-mail message you have received.

    • D.

      It saves your outgoing e-mail message without the attachments you made to it

    Correct Answer
    A. It saves an outgoing e-mail message without sending it so that you can get back to it later and revise it before sending it.
    Explanation
    Saving a draft allows the user to save an outgoing email message without sending it immediately. This feature is useful when the user wants to revisit and make revisions to the email before sending it. By saving the draft, the user can ensure that the email is not accidentally sent in an incomplete or incorrect state.

    Rate this question:

  • 20. 

    How do folders work in Microsoft Outlook?

    • A.

      There is a standard set of folders under which no subfolders can be created

    • B.

      Additional folders can only be created at the same level as the default folders.

    • C.

      Managing Microsoft Outlook folders is similar to managing folders in File Explorer

    • D.

      Storage folder hold e-mail messages that are stored both on the e-mail server and the local computer.

    Correct Answer
    C. Managing Microsoft Outlook folders is similar to managing folders in File Explorer
  • 21. 

    Gmail system labels cannot be ________ .

    • A.

      Deleted

    • B.

      Hidden

    • C.

      Populated with additional labels under them

    • D.

      Renamed

    Correct Answer
    B. Hidden
    Explanation
    Gmail system labels cannot be hidden. This means that users are unable to hide or remove system labels such as "Inbox," "Sent," or "Trash" from their Gmail interface. While users can customize their labels by renaming, deleting, or adding additional labels under them, hiding system labels is not an option.

    Rate this question:

  • 22. 

    What should you do if you receive an e-mail message with an unsolicited file attached to it from somebody you don’t know?

    • A.

      Delete the e-mail without opening it.

    • B.

      Open the e-mail and delete the attached file

    • C.

      Run a virus check before opening the e-mail

    • D.

      Open the e-mail, but don’t run the attached file, instead save it.

    Correct Answer
    A. Delete the e-mail without opening it.
    Explanation
    If you receive an e-mail message with an unsolicited file attached to it from somebody you don't know, it is best to delete the e-mail without opening it. Opening or downloading files from unknown sources can potentially expose your computer to viruses, malware, or other security threats. It is important to exercise caution and prioritize your online safety by avoiding interactions with suspicious or untrusted emails.

    Rate this question:

  • 23. 

    Which type of malicious software does not attach itself to files, but runs in active memory and does not require human action to cause harm or replicate itself

    • A.

      Worm

    • B.

      Virus

    • C.

      Spyware

    • D.

      Trojan Horse

    Correct Answer
    D. Trojan Horse
    Explanation
    A Trojan Horse is a type of malicious software that does not attach itself to files, but instead runs in active memory. It does not require human action to cause harm or replicate itself. Unlike viruses, which attach themselves to files and require human action to spread, Trojan Horses can enter a system undetected and perform malicious actions without the user's knowledge. They often disguise themselves as legitimate programs or files, tricking users into downloading or installing them. Once inside a system, Trojan Horses can steal sensitive information, modify or delete files, or even give remote control of the infected system to the attacker.

    Rate this question:

  • 24. 

    Which method would be the most useful if you end up with unwanted or unknown software on your computer through downloading and installing programs?

    • A.

      Run a cleanup program to remove the unwanted software

    • B.

      Run an uninstaller program

    • C.

      Run a specialize malware software to find and quarantine the files

    • D.

      Run your antivirus program to isolate the problem program

    Correct Answer
    B. Run an uninstaller program
    Explanation
    Running an uninstaller program would be the most useful method if you end up with unwanted or unknown software on your computer through downloading and installing programs. Uninstaller programs are specifically designed to remove software from a computer system completely. By running an uninstaller program, you can effectively remove the unwanted or unknown software, ensuring that all associated files, folders, and registry entries are deleted from your computer. This helps to free up disk space and eliminate any potential issues or conflicts caused by the unwanted software.

    Rate this question:

  • 25. 

    What action on your part will guarantee that your computer will never be infected with any malware?

    • A.

      Simple common sense

    • B.

      The installation of anti-virus software

    • C.

      Refusing to install any software obtained from other people

    • D.

      There is no practical way to guarantee that your computer will never be infected unless you don’t use it at all.

    Correct Answer
    D. There is no practical way to guarantee that your computer will never be infected unless you don’t use it at all.
    Explanation
    The correct answer states that there is no practical way to guarantee that your computer will never be infected unless you don't use it at all. This means that no matter what actions you take, there is always a possibility of your computer getting infected with malware. While simple common sense, the installation of anti-virus software, and refusing to install software obtained from other people can reduce the risk of infection, they cannot completely eliminate it. Therefore, the only way to guarantee no infection is to not use the computer at all.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 23, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 20, 2020
    Quiz Created by
    Hsahnoun
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.