Intro To Computers 1st Quarter Test 2015

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Keith Tobin
K
Keith Tobin
Community Contributor
Quizzes Created: 13 | Total Attempts: 2,930
Questions: 64 | Attempts: 99

SettingsSettingsSettings
Intro To Computers 1st Quarter Test 2015 - Quiz

You can do it!


Questions and Answers
  • 1. 

    Used to safeguard a computer from malware, including viruses, computer worms, and Trojan horses and may also remove or prevent spyware and adware, along with other forms of malicious programs.

    • A.

      Meta-Search Engine

    • B.

      Firewall

    • C.

      Antivirus Software

    • D.

      Identity Theft

    Correct Answer
    C. Antivirus Software
    Explanation
    Antivirus software is designed to protect a computer from various types of malware such as viruses, worms, and Trojan horses. It can also detect and remove spyware, adware, and other malicious programs. By running regular scans and real-time protection, antivirus software helps safeguard the computer and prevent any potential damage or unauthorized access. It acts as a defense mechanism, constantly monitoring and blocking any suspicious activities or files that may pose a threat to the system's security.

    Rate this question:

  • 2. 

    A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

    • A.

      Meta-Search Engine

    • B.

      Firewall

    • C.

      Antivirus Software

    • D.

      Identity Theft

    Correct Answer
    B. Firewall
    Explanation
    A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting outward communication. It acts as a barrier between a trusted internal network and an untrusted external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. By doing so, it helps to protect the network from potential threats and unauthorized access attempts, ensuring the security and integrity of the system.

    Rate this question:

  • 3. 

    Command + Q, referred to as Quit on Mac computers.  This will end the current program you are running.

    • A.

      End

    • B.

      Cut

    • C.

      Copy

    • D.

      Close

    Correct Answer
    D. Close
    Explanation
    The correct answer is "Close" because the command "Command + Q" on Mac computers is used to close or quit the current program that is running. It is a shortcut to quickly end the program and close its window.

    Rate this question:

  • 4. 

    Command + C, duplicates the current selection.

    • A.

      Close

    • B.

      Copy

    • C.

      Cut

    • D.

      Dupicator

    Correct Answer
    B. Copy
    Explanation
    Command + C is the keyboard shortcut used to copy the current selection. This means that when you have something selected, such as text or an image, pressing Command + C will create a duplicate of that selection and store it in the clipboard. This allows you to then paste the copied selection elsewhere using the Command + V shortcut. Therefore, the correct answer is "Copy" because Command + C is used to copy the current selection.

    Rate this question:

  • 5. 

    Command + X, takes a selection from one area with the intent of placing it somewhere else in that document or into a different document.

    • A.

      Close

    • B.

      Copy

    • C.

      Cut

    • D.

      Dupicator

    Correct Answer
    C. Cut
    Explanation
    The correct answer is "Cut" because the command + X function allows the user to remove a selected portion of text or an object from one location and move it to another location within the same document or into a different document. This action is commonly used for transferring content or rearranging elements within a document or between documents.

    Rate this question:

  • 6. 

    The introductory page of a website, typically serving as a table of contents for the site.

    • A.

      Meta-Search Enginge

    • B.

      History

    • C.

      Firewall

    • D.

      Home Page

    Correct Answer
    D. Home Page
    Explanation
    The correct answer is "Home Page" because the introductory page of a website is commonly referred to as the home page. It serves as a table of contents for the site, providing users with an overview and navigation options to access different sections or pages within the website.

    Rate this question:

  • 7. 

    Refers to the list of web pages a user has visited recently—and associated data such as page title and time of visit.

    • A.

      Meta-Search Enginge

    • B.

      History

    • C.

      Firewall

    • D.

      Home Page

    Correct Answer
    B. History
    Explanation
    The correct answer is "History." History refers to the list of web pages a user has visited recently, along with associated data such as page title and time of visit. It is a feature commonly found in web browsers that allows users to track and revisit previously visited websites.

    Rate this question:

  • 8. 

    The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.

    • A.

      Meta-Search Enginge

    • B.

      Search Engine

    • C.

      Identity Theft

    • D.

      Home Page

    Correct Answer
    C. Identity Theft
    Explanation
    Identity theft refers to the fraudulent acquisition and use of a person's private identifying information, typically for financial gain. This can involve stealing personal information such as social security numbers, credit card details, or bank account information. The thief then uses this stolen information to impersonate the victim, often for financial purposes like making unauthorized purchases or accessing the victim's bank accounts. Identity theft can have severe consequences for the victim, including financial loss, damage to their credit score, and the need to spend significant time and effort resolving the issue.

    Rate this question:

  • 9. 

    A program that seeks for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web.

    • A.

      Meta-Search Enginge

    • B.

      Identity Theft

    • C.

      Home Page

    • D.

      Search Engine

    Correct Answer
    D. Search Engine
    Explanation
    A search engine is a program that searches and identifies items in a database based on keywords or characters specified by the user. It is commonly used to find specific websites on the World Wide Web. Search engines like Google, Bing, and Yahoo! are examples of popular search engines that help users find relevant information by indexing web pages and displaying search results based on the user's query.

    Rate this question:

  • 10. 

    An online tool that sends user requests to several other search engines and/or databases and aggregates the results into a single list or displays them according to their source.

    • A.

      Meta-Search Enginge

    • B.

      Identity Theft

    • C.

      Home Page

    • D.

      Search Engine

    Correct Answer
    A. Meta-Search Enginge
    Explanation
    A meta-search engine is an online tool that gathers search results from multiple search engines or databases and presents them in a single list or categorizes them based on their source. This allows users to save time and effort by accessing a variety of search results in one place.

    Rate this question:

  • 11. 

    Software that is intended to damage or disable computers and computer systems

    • A.

      Malware

    • B.

      Spyware

    • C.

      Antivirus Software

    • D.

      Identity Theft

    Correct Answer
    A. Malware
    Explanation
    Malware refers to software that is designed to harm or disrupt computers and computer systems. It includes various types of malicious programs such as viruses, worms, trojans, ransomware, and adware. Malware can cause damage by corrupting files, stealing sensitive information, or disabling the system altogether. It is often spread through infected websites, email attachments, or malicious downloads. To protect against malware, users are advised to use antivirus software and regularly update their operating systems and applications.

    Rate this question:

  • 12. 

    Sending a window/program out of sight to hide in the dock

    • A.

      Maximize

    • B.

      Firewall

    • C.

      Minimize

    • D.

      Plug & Play

    Correct Answer
    C. Minimize
    Explanation
    Minimize is the correct answer because it refers to the action of sending a window or program out of sight to the dock or taskbar, making it smaller and taking up less space on the screen. This allows users to focus on other open windows or programs without closing or quitting the minimized one.

    Rate this question:

  • 13. 

    Sending a window/program out of sight to hide in the dock

    • A.

      Command + V

    • B.

      Command + C

    • C.

      Command + M

    • D.

      Command + X

    Correct Answer
    C. Command + M
    Explanation
    Pressing Command + M is the correct answer because this keyboard shortcut is commonly used to minimize a window or program and send it out of sight to the dock. This allows the user to quickly hide a window or program that they are not currently using, freeing up space on the screen and reducing clutter.

    Rate this question:

  • 14. 

    Etiquette on the Internet.

    • A.

      Webiquette

    • B.

      Cyberquette

    • C.

      Letiquette

    • D.

      Netiquette

    Correct Answer
    D. Netiquette
    Explanation
    Netiquette refers to the proper etiquette or behavior that should be followed when interacting with others on the internet. It includes guidelines on how to communicate respectfully, avoid offensive language, and maintain online privacy. Netiquette is essential for creating a positive and inclusive online environment. The term is a combination of "net" (short for internet) and "etiquette," emphasizing the need for polite and respectful behavior in online interactions.

    Rate this question:

  • 15. 

    Command + V

    • A.

      Paste

    • B.

      Print

    • C.

      Varily

    • D.

      Cut

    Correct Answer
    A. Paste
    Explanation
    The correct answer is "Paste". In computing, the command "Command + V" is used to paste copied or cut content into a document or field. It is a common keyboard shortcut used to transfer data from the clipboard to the desired location.

    Rate this question:

  • 16. 

    A command that allows you to insert data from the clipboard into an application. ​

    • A.

      Cut

    • B.

      Print

    • C.

      Varily

    • D.

      Paste

    Correct Answer
    D. Paste
    Explanation
    The correct answer is "Paste". The paste command is used to insert data from the clipboard into an application. It allows users to easily transfer text, images, or other content from one location to another within the same application or across different applications. This command is commonly used in word processors, image editors, and other software programs to quickly insert copied or cut content.

    Rate this question:

  • 17. 

    Used to describe devices that work with a computer system as soon as they are connected.

    • A.

      Malware

    • B.

      Cyberware

    • C.

      Spyware

    • D.

      Plug & Play

    Correct Answer
    D. Plug & Play
    Explanation
    Plug & Play is the correct answer because it accurately describes devices that can be connected to a computer system and immediately start working without the need for additional configuration or installation. This term is commonly used to refer to hardware devices such as USB drives, printers, or keyboards that are designed to be easily connected and used with a computer system. The "plug" refers to the act of physically connecting the device, while "play" indicates that the device is ready to be used without any further setup or intervention.

    Rate this question:

  • 18. 

    HTTPS & SSL are examples of this

    • A.

      Spyware

    • B.

      Secure Websites

    • C.

      Anti Spyware

    • D.

      Cyberware

    Correct Answer
    B. Secure Websites
    Explanation
    HTTPS (Hypertext Transfer Protocol Secure) and SSL (Secure Sockets Layer) are both examples of secure websites. HTTPS is a secure version of HTTP that encrypts the data being transmitted between a website and a user's browser, ensuring that it cannot be intercepted or tampered with by attackers. SSL is a cryptographic protocol that provides secure communication over the internet by encrypting the data exchanged between a website and a user. Together, HTTPS and SSL help to establish a secure and trusted connection between users and websites, protecting sensitive information and ensuring privacy.

    Rate this question:

  • 19. 

    Refers to the list of web pages a user has visited recently—and associated data such as page title and time of visit.

    • A.

      Meta-Search Enginge

    • B.

      History

    • C.

      Firewall

    • D.

      Home Page

    Correct Answer
    B. History
    Explanation
    The correct answer is "History." History refers to the list of web pages a user has visited recently and associated data such as page title and time of visit. This feature is commonly found in web browsers and allows users to easily access previously visited websites. It can be useful for quickly revisiting a webpage or tracking browsing habits.

    Rate this question:

  • 20. 

    Can secretly capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information.

    • A.

      Meta-ware

    • B.

      Paste

    • C.

      Spyware

    • D.

      Malware

    Correct Answer
    C. Spyware
    Explanation
    Spyware is a type of malicious software that can secretly capture information like web browsing habits, e-mail messages, usernames and passwords, and credit card information. It is designed to collect data without the user's knowledge or consent and can be used for various malicious purposes, such as identity theft or unauthorized access to sensitive information. Spyware often operates in the background, making it difficult for users to detect its presence on their devices. Therefore, it is important to have security measures in place to protect against spyware attacks.

    Rate this question:

  • 21. 

    Is a computer file sent along with an email message.

    • A.

      Cyberspac

    • B.

      Attatchment

    • C.

      Netiquette

    • D.

      Malware

    Correct Answer
    B. Attatchment
    Explanation
    An attachment is a computer file sent along with an email message. It can be any type of file, such as a document, photo, or video. Attachments allow users to share files with others through email, making it convenient for sending and receiving important documents or media. However, it is important to be cautious with attachments, as they can also be used to distribute malware or viruses. Users should always exercise caution when opening attachments from unknown or suspicious sources to avoid any potential security risks.

    Rate this question:

  • 22. 

    Used to describe the virtual world of computers.

    • A.

      Interweb

    • B.

      Cyberspace

    • C.

      Interspace

    • D.

      Cyberweb

    Correct Answer
    B. Cyberspace
    Explanation
    Cyberspace is the correct answer because it is commonly used to describe the virtual world of computers. It refers to the digital realm where online communication, interactions, and activities take place. The term "cyberspace" encompasses the internet, websites, social media platforms, online gaming, and other virtual environments. It is a concept that highlights the interconnectedness of computer systems and the ability to access and navigate digital information and resources.

    Rate this question:

  • 23. 

    Contains a group of computers that can be accessed and administered with a common set of rules

    • A.

      Domain

    • B.

      HTTP

    • C.

      FTP

    • D.

      WWW

    Correct Answer
    A. Domain
    Explanation
    A domain is a group of computers that can be accessed and administered with a common set of rules. It is a network of computers that are connected and share the same rules and settings. This allows for centralized administration and control over the computers within the domain. HTTP, FTP, and WWW are not related to the concept of a domain.

    Rate this question:

  • 24. 

    Refers to the process of receiving data over the Internet.

    • A.

      Interweb

    • B.

      Cyberspace

    • C.

      Download

    • D.

      Cyberweb

    Correct Answer
    C. Download
    Explanation
    The term "download" refers to the process of receiving data over the Internet. It involves retrieving information or files from a remote server and saving them onto a local device. This can include downloading documents, images, videos, software, or any other type of digital content. The act of downloading allows users to access and use data that is stored on the Internet, making it an essential part of online activities such as file sharing, streaming, or accessing online resources.

    Rate this question:

  • 25. 

    Part of the standard TCP/IP set of protocols.

    • A.

      E-Mail

    • B.

      HTTP

    • C.

      FTP

    • D.

      URL

    Correct Answer
    A. E-Mail
    Explanation
    E-Mail is part of the standard TCP/IP set of protocols. TCP/IP is the foundational protocol suite for the internet, and it provides a set of rules and procedures for communication between devices on a network. E-Mail, which stands for Electronic Mail, is a widely used communication method that allows users to send and receive messages over the internet. It relies on TCP/IP protocols to ensure the reliable delivery of messages across different networks. Therefore, it is correct to say that E-Mail is part of the standard TCP/IP set of protocols.

    Rate this question:

  • 26. 

    Text that links to other information

    • A.

      ISP

    • B.

      URL

    • C.

      Hypertext

    • D.

      E-mail

    Correct Answer
    C. Hypertext
    Explanation
    Hypertext is the correct answer because it is a term that refers to text that contains links to other information. It allows users to navigate through different pieces of information by clicking on these links. In the context of the given options, ISP refers to Internet Service Provider, which is a company that provides internet access to users. URL stands for Uniform Resource Locator, which is the address used to access resources on the internet. E-mail is a system for sending and receiving electronic messages. Therefore, the term that best fits the given options is Hypertext.

    Rate this question:

  • 27. 

    This is the language that Web pages are written in.

    • A.

      HTML

    • B.

      HTTP

    • C.

      Hypertext

    • D.

      FTP

    Correct Answer
    A. HTML
    Explanation
    HTML stands for Hypertext Markup Language. It is the standard language used for creating web pages and structuring their content. HTML is responsible for defining the structure, layout, and presentation of web documents. It uses tags to mark elements such as headings, paragraphs, images, links, and more. By using HTML, web developers can create interactive and dynamic web pages that can be viewed and accessed through web browsers.

    Rate this question:

  • 28. 

    HTML

    • A.

      HyperText Moveable Locator

    • B.

      HyperText Manageable Language

    • C.

      HyperText Markup Linguistics

    • D.

      HyperText Markup Language

    Correct Answer
    D. HyperText Markup Language
    Explanation
    HTML stands for HyperText Markup Language. It is the standard markup language used for creating web pages and applications. HTML uses tags to structure the content and define the layout of a web page. It allows for the inclusion of text, images, links, and other media, and provides a way to specify how these elements should be displayed in a browser. HTML is the backbone of the World Wide Web and is essential for creating and designing web pages.

    Rate this question:

  • 29. 

    The address of a specific Web site or file on the Internet.

    • A.

      URL

    • B.

      HTTP

    • C.

      HTML

    • D.

      WWW

    Correct Answer
    A. URL
    Explanation
    A URL (Uniform Resource Locator) is a specific address that identifies the location of a website or file on the internet. It provides a way for users to access specific resources such as web pages, images, or documents. The URL consists of various components, including the protocol (HTTP), the domain name (www), and the specific path or file name (HTML). By entering a URL into a web browser, users can navigate to the desired webpage or retrieve the specific file they are looking for.

    Rate this question:

  • 30. 

    URL

    • A.

      Unified Reload Launcher

    • B.

      Uniform Resource Locator

    • C.

      United Relocator Language

    • D.

      Uniformity Residual Language

    Correct Answer
    B. Uniform Resource Locator
    Explanation
    The correct answer is "Uniform Resource Locator". A URL is a specific type of uniform resource identifier (URI) that provides the address for a resource on the internet. It is commonly used to locate web pages, files, images, and other resources. The other options provided, such as Unified Reload Launcher, United Relocator Language, and Uniformity Residual Language, do not accurately describe the term "URL" and are not commonly used or recognized in the context of internet addressing.

    Rate this question:

  • 31. 

    HTTP

    • A.

      Hyper-Text Text-Proxy

    • B.

      Hyper-Text Transfer Protocol

    • C.

      Hyper-Text Total Protocol

    • D.

      Hyper-Text Translate Proxy

    Correct Answer
    B. Hyper-Text Transfer Protocol
    Explanation
    HTTP stands for Hyper-Text Transfer Protocol. It is the protocol used for transmitting hypertext over the internet. It is the foundation of data communication for the World Wide Web. HTTP allows clients (such as web browsers) to request resources from web servers and receive responses. It defines the format of the messages exchanged between client and server, including the request methods, status codes, and headers. The correct answer is Hyper-Text Transfer Protocol.

    Rate this question:

  • 32. 

    Consists of pages that can be accessed using a Web browser.

    • A.

      WWW

    • B.

      Internet

    • C.

      Interweb

    • D.

      On the Online

    Correct Answer
    A. WWW
    Explanation
    The correct answer is WWW because it refers to the World Wide Web, which is a system of interconnected hypertext documents accessed through the Internet. These documents, or web pages, can be accessed using a web browser, making WWW the most suitable option among the given choices.

    Rate this question:

  • 33. 

    This is the protocol used to transfer data over the World Wide Web

    • A.

      HTTP

    • B.

      HTML

    • C.

      URL

    • D.

      ISP

    Correct Answer
    A. HTTP
    Explanation
    HTTP stands for Hypertext Transfer Protocol, which is the protocol used to transfer data over the World Wide Web. It is the foundation of any data exchange on the Web and allows for the retrieval and display of web pages. HTTP defines how messages are formatted and transmitted, as well as how web servers and browsers should respond to various commands. It enables the communication between clients (such as web browsers) and servers, facilitating the transfer of hypertext documents, images, videos, and other resources.

    Rate this question:

  • 34. 

    WWW

    • A.

      Wide World Webinar

    • B.

      World Wide Web

    • C.

      Wild World of Warcraft

    • D.

      Where We Were

    Correct Answer
    B. World Wide Web
    Explanation
    The correct answer is "World Wide Web". This is because the term "WWW" is commonly used as an abbreviation for the World Wide Web, which is a system of interconnected documents and other resources, linked by hyperlinks and URLs. The other options listed are not commonly associated with the abbreviation "WWW".

    Rate this question:

  • 35. 

    In order to connect to the Internet, you need one of these.

    • A.

      FTP

    • B.

      ISP

    • C.

      HTTP

    • D.

      IFTP

    Correct Answer
    B. ISP
    Explanation
    To connect to the Internet, you need an ISP (Internet Service Provider). An ISP is a company that provides internet access to individuals or organizations. They offer various types of internet connections such as dial-up, DSL, cable, or fiber optic. Without an ISP, users would not have the necessary infrastructure and network connectivity to access the Internet. FTP (File Transfer Protocol), HTTP (Hypertext Transfer Protocol), and IFTP (Interactive File Transfer Protocol) are protocols used for specific purposes within the internet, but they are not essential for basic internet connectivity.

    Rate this question:

  • 36. 

    ISP

    • A.

      Internet Service Provider

    • B.

      Internet Service Protector

    • C.

      Internal Special Protocols

    • D.

      Internet Service Protractions

    Correct Answer
    A. Internet Service Provider
    Explanation
    An ISP, or Internet Service Provider, is a company that provides internet access to individuals and organizations. They offer various services such as internet connectivity, email services, web hosting, and more. ISPs connect their customers to the internet through different technologies like DSL, cable, fiber optics, or satellite. They act as a bridge between users and the internet, allowing them to access websites, send emails, stream videos, and perform various online activities. Therefore, the correct answer is Internet Service Provider.

    Rate this question:

  • 37. 

    A common method of transferring files via the Internet from one computer to another

    • A.

      FTP

    • B.

      E-mail

    • C.

      ISP

    • D.

      HTTP

    Correct Answer
    A. FTP
    Explanation
    FTP stands for File Transfer Protocol, which is a common method of transferring files via the Internet from one computer to another. It allows users to upload and download files between their local system and a remote server. FTP is widely used for website maintenance, software updates, and sharing large files. It provides a secure and efficient way to transfer files over a network.

    Rate this question:

  • 38. 

    FTP

    • A.

      Final Transfer Protocol

    • B.

      File Telecom Protocol

    • C.

      File Transfer Protocol

    • D.

      Final Telecom Protocol

    Correct Answer
    C. File Transfer Protocol
    Explanation
    FTP stands for File Transfer Protocol. It is a standard network protocol used for transferring files between a client and a server on a computer network. FTP is commonly used to upload and download files from a server, making it an essential tool for file management and sharing. The other options, Final Transfer Protocol, File Telecom Protocol, and Final Telecom Protocol, are not valid terms and do not accurately describe the purpose and function of FTP.

    Rate this question:

  • 39. 

    a computer network limited to a small area such as an office building, university, or even a residential home.

    • A.

      LAN

    • B.

      Input Device

    • C.

      Data

    • D.

      Output Device

    • E.

      Formatting

    • F.

      Non-Impact Printer

    • G.

      Computer

    • H.

      Information

    • I.

      Users

    • J.

      Hardware

    Correct Answer
    A. LAN
    Explanation
    A LAN, or Local Area Network, is a computer network that is restricted to a small geographical area such as an office building, university, or residential home. It allows computers and other devices to connect and share resources within this limited area.

    Rate this question:

  • 40. 

    Local Area Network

    • A.

      LAN

    • B.

      Input Device

    • C.

      Data

    • D.

      Output Device

    • E.

      Formatting

    • F.

      Non-Impact Printer

    • G.

      Computer

    • H.

      Information

    • I.

      Users

    • J.

      Hardware

    Correct Answer
    A. LAN
    Explanation
    A LAN (Local Area Network) is a network that connects computers and devices within a limited area, such as a home, office, or school. It allows for the sharing of resources, such as printers and files, and enables communication between connected devices. LANs are typically faster and more secure than wide area networks (WANs) because they cover a smaller geographic area.

    Rate this question:

  • 41. 

    a piece of equipment that sends data or information into to a computer. (Keyboard, mouse, scanner, etc…)

    • A.

      LAN

    • B.

      Input Device

    • C.

      Data

    • D.

      Output Device

    • E.

      Formatting

    • F.

      Non-Impact Printer

    • G.

      Computer

    • H.

      Information

    • I.

      Users

    • J.

      Hardware

    Correct Answer
    B. Input Device
    Explanation
    An input device is a piece of equipment that sends data or information into a computer. This can include devices such as a keyboard, mouse, or scanner. These devices allow users to input data or commands into the computer for processing.

    Rate this question:

  • 42. 

    a piece of equipment that receives data or information from a computer.  (Speakers, printers, projectors, etc…)

    • A.

      LAN

    • B.

      Input Device

    • C.

      Data

    • D.

      Output Device

    • E.

      Formatting

    • F.

      Non-Impact Printer

    • G.

      Computer

    • H.

      Information

    • I.

      Users

    • J.

      Hardware

    Correct Answer
    D. Output Device
    Explanation
    An output device is a piece of equipment that receives data or information from a computer and displays or presents it in a readable or usable format. Examples of output devices include speakers, printers, projectors, etc. These devices take the processed data or information from the computer and present it to the user in a form that can be understood or utilized.

    Rate this question:

  • 43. 

    a process that prepares storage media to be recognized by your computer.

    • A.

      LAN

    • B.

      Input Device

    • C.

      Data

    • D.

      Output Device

    • E.

      Formatting

    • F.

      Non-Impact Printer

    • G.

      Computer

    • H.

      Information

    • I.

      Users

    • J.

      Hardware

    Correct Answer
    E. Formatting
    Explanation
    Formatting is the process of preparing storage media, such as a hard drive or a USB flash drive, to be recognized and used by a computer. It involves organizing the storage space, creating a file system, and clearing any existing data on the media. Formatting is necessary to ensure that the storage media is compatible with the computer's operating system and can be used to store and retrieve data efficiently.

    Rate this question:

  • 44. 

    a way to describe the page layout or style of text on a page.

    • A.

      LAN

    • B.

      Input Device

    • C.

      Data

    • D.

      Output Device

    • E.

      Formatting

    • F.

      Non-Impact Printer

    • G.

      Computer

    • H.

      Information

    • I.

      Users

    • J.

      Hardware

    Correct Answer
    E. Formatting
    Explanation
    Formatting refers to the way in which the page layout or style of text on a page is described. It involves organizing and arranging text, images, and other elements in a visually appealing and coherent manner. Formatting can include aspects such as font styles, font sizes, headings, paragraphs, margins, spacing, alignment, and the use of colors and graphics. It is an important aspect of document creation and design, as it helps to enhance readability and comprehension, and creates a professional and polished appearance.

    Rate this question:

  • 45. 

    prints without banging a ribbon onto paper. Laser, LED, inkjet, solid ink, thermal wax transfer and dye sublimation are examples of this.

    • A.

      LAN

    • B.

      Input Device

    • C.

      Data

    • D.

      Output Device

    • E.

      Formatting

    • F.

      Non-Impact Printer

    • G.

      Computer

    • H.

      Information

    • I.

      Users

    • J.

      Hardware

    Correct Answer
    F. Non-Impact Printer
    Explanation
    A non-impact printer refers to a type of printer that does not use a ribbon to produce prints on paper. Instead, it uses various technologies such as laser, LED, inkjet, solid ink, thermal wax transfer, and dye sublimation to create images or text on the paper. These printers are generally faster, quieter, and produce higher-quality prints compared to impact printers. They are commonly used in homes, offices, and other settings where quiet operation and high print quality are desired.

    Rate this question:

  • 46. 

    a programmable machine that can execute a list of programmed instructions and respond to new instructions.

    • A.

      LAN

    • B.

      Input Device

    • C.

      Data

    • D.

      Output Device

    • E.

      Formatting

    • F.

      Non-Impact Printer

    • G.

      Computer

    • H.

      Information

    • I.

      Users

    • J.

      Hardware

    Correct Answer
    G. Computer
    Explanation
    A computer is a programmable machine that can execute a list of programmed instructions and respond to new instructions. It is a device that processes data, performs calculations, and generates output. It can be used for various purposes such as storing and retrieving information, communicating with others, and running software applications. Users interact with a computer through input devices, such as keyboards and mice, and receive information through output devices, such as monitors and printers. Overall, a computer is a versatile tool that can be customized to perform a wide range of tasks.

    Rate this question:

  • 47. 

    unprocessed and raw information that is stored by a computer.

    • A.

      LAN

    • B.

      Input Device

    • C.

      Data

    • D.

      Output Device

    • E.

      Formatting

    • F.

      Non-Impact Printer

    • G.

      Computer

    • H.

      Information

    • I.

      Users

    • J.

      Hardware

    Correct Answer
    C. Data
    Explanation
    Data refers to unprocessed and raw information that is stored by a computer. It can be in the form of text, numbers, images, or any other type of information that can be processed by a computer. Data is the foundation of any computer system and is used to perform various operations and tasks. It can be inputted into a computer through input devices, processed and manipulated by the computer, and then displayed or outputted through output devices. Data can also be formatted and organized to make it more meaningful and usable.

    Rate this question:

  • 48. 

    processed, organized bits of data.

    • A.

      LAN

    • B.

      Input Device

    • C.

      Data

    • D.

      Output Device

    • E.

      Formatting

    • F.

      Non-Impact Printer

    • G.

      Computer

    • H.

      Information

    • I.

      Users

    • J.

      Hardware

    Correct Answer
    H. Information
    Explanation
    Information refers to processed, organized bits of data. It is the result of data being analyzed, interpreted, and given context. While data is raw and unprocessed, information provides meaning and usefulness to users. In the context of the given options, information is the most appropriate term to describe processed and organized data.

    Rate this question:

  • 49. 

    person who uses a computer, network service, or other media services - usually identified by a username.

    • A.

      LAN

    • B.

      Input Device

    • C.

      Data

    • D.

      Output Device

    • E.

      Formatting

    • F.

      Non-Impact Printer

    • G.

      Computer

    • H.

      Information

    • I.

      Users

    • J.

      Hardware

    Correct Answer
    I. Users
    Explanation
    The term "users" refers to individuals who utilize a computer, network service, or other media services. They are typically identified by a username, which allows them to access and interact with various technologies. Users play a crucial role in operating and benefiting from the functionalities provided by hardware and software systems. They input data, receive output, and utilize information through their interactions with computers and other devices.

    Rate this question:

  • 50. 

    the physical parts of a computer and related devices.

    • A.

      LAN

    • B.

      Input Device

    • C.

      Data

    • D.

      Output Device

    • E.

      Formatting

    • F.

      Non-Impact Printer

    • G.

      Computer

    • H.

      Information

    • I.

      Users

    • J.

      Hardware

    Correct Answer
    J. Hardware
    Explanation
    Hardware refers to the physical components of a computer and related devices. It includes input devices, output devices, non-impact printers, and other tangible parts of a computer system. Hardware is essential for processing and storing data, and it is the physical infrastructure that enables users to interact with a computer and access information.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 15, 2015
    Quiz Created by
    Keith Tobin

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.