1.
Used to safeguard a computer from malware, including viruses, computer worms, and Trojan horses and may also remove or prevent spyware and adware, along with other forms of malicious programs.
Correct Answer
C. Antivirus Software
Explanation
Antivirus software is designed to protect a computer from various types of malware such as viruses, worms, and Trojan horses. It can also detect and remove spyware, adware, and other malicious programs. By running regular scans and real-time protection, antivirus software helps safeguard the computer and prevent any potential damage or unauthorized access. It acts as a defense mechanism, constantly monitoring and blocking any suspicious activities or files that may pose a threat to the system's security.
2.
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
Correct Answer
B. Firewall
Explanation
A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting outward communication. It acts as a barrier between a trusted internal network and an untrusted external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. By doing so, it helps to protect the network from potential threats and unauthorized access attempts, ensuring the security and integrity of the system.
3.
Command + Q, referred to as Quit on Mac computers. This will end the current program you are running.
Correct Answer
D. Close
Explanation
The correct answer is "Close" because the command "Command + Q" on Mac computers is used to close or quit the current program that is running. It is a shortcut to quickly end the program and close its window.
4.
Command + C, duplicates the current selection.
Correct Answer
B. Copy
Explanation
Command + C is the keyboard shortcut used to copy the current selection. This means that when you have something selected, such as text or an image, pressing Command + C will create a duplicate of that selection and store it in the clipboard. This allows you to then paste the copied selection elsewhere using the Command + V shortcut. Therefore, the correct answer is "Copy" because Command + C is used to copy the current selection.
5.
Command + X, takes a selection from one area with the intent of placing it somewhere else in that document or into a different document.
Correct Answer
C. Cut
Explanation
The correct answer is "Cut" because the command + X function allows the user to remove a selected portion of text or an object from one location and move it to another location within the same document or into a different document. This action is commonly used for transferring content or rearranging elements within a document or between documents.
6.
The introductory page of a website, typically serving as a table of contents for the site.
Correct Answer
D. Home Page
Explanation
The correct answer is "Home Page" because the introductory page of a website is commonly referred to as the home page. It serves as a table of contents for the site, providing users with an overview and navigation options to access different sections or pages within the website.
7.
Refers to the list of web pages a user has visited recently—and associated data such as page title and time of visit.
Correct Answer
B. History
Explanation
The correct answer is "History." History refers to the list of web pages a user has visited recently, along with associated data such as page title and time of visit. It is a feature commonly found in web browsers that allows users to track and revisit previously visited websites.
8.
The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
Correct Answer
C. Identity Theft
Explanation
Identity theft refers to the fraudulent acquisition and use of a person's private identifying information, typically for financial gain. This can involve stealing personal information such as social security numbers, credit card details, or bank account information. The thief then uses this stolen information to impersonate the victim, often for financial purposes like making unauthorized purchases or accessing the victim's bank accounts. Identity theft can have severe consequences for the victim, including financial loss, damage to their credit score, and the need to spend significant time and effort resolving the issue.
9.
A program that seeks for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web.
Correct Answer
D. Search Engine
Explanation
A search engine is a program that searches and identifies items in a database based on keywords or characters specified by the user. It is commonly used to find specific websites on the World Wide Web. Search engines like Google, Bing, and Yahoo! are examples of popular search engines that help users find relevant information by indexing web pages and displaying search results based on the user's query.
10.
An online tool that sends user requests to several other search engines and/or databases and aggregates the results into a single list or displays them according to their source.
Correct Answer
A. Meta-Search Enginge
Explanation
A meta-search engine is an online tool that gathers search results from multiple search engines or databases and presents them in a single list or categorizes them based on their source. This allows users to save time and effort by accessing a variety of search results in one place.
11.
Software that is intended to damage or disable computers and computer systems
Correct Answer
A. Malware
Explanation
Malware refers to software that is designed to harm or disrupt computers and computer systems. It includes various types of malicious programs such as viruses, worms, trojans, ransomware, and adware. Malware can cause damage by corrupting files, stealing sensitive information, or disabling the system altogether. It is often spread through infected websites, email attachments, or malicious downloads. To protect against malware, users are advised to use antivirus software and regularly update their operating systems and applications.
12.
Sending a window/program out of sight to hide in the dock
Correct Answer
C. Minimize
Explanation
Minimize is the correct answer because it refers to the action of sending a window or program out of sight to the dock or taskbar, making it smaller and taking up less space on the screen. This allows users to focus on other open windows or programs without closing or quitting the minimized one.
13.
Sending a window/program out of sight to hide in the dock
Correct Answer
C. Command + M
Explanation
Pressing Command + M is the correct answer because this keyboard shortcut is commonly used to minimize a window or program and send it out of sight to the dock. This allows the user to quickly hide a window or program that they are not currently using, freeing up space on the screen and reducing clutter.
14.
Etiquette on the Internet.
Correct Answer
D. Netiquette
Explanation
Netiquette refers to the proper etiquette or behavior that should be followed when interacting with others on the internet. It includes guidelines on how to communicate respectfully, avoid offensive language, and maintain online privacy. Netiquette is essential for creating a positive and inclusive online environment. The term is a combination of "net" (short for internet) and "etiquette," emphasizing the need for polite and respectful behavior in online interactions.
15.
Command + V
Correct Answer
A. Paste
Explanation
The correct answer is "Paste". In computing, the command "Command + V" is used to paste copied or cut content into a document or field. It is a common keyboard shortcut used to transfer data from the clipboard to the desired location.
16.
A command that allows you to insert data from the clipboard into an application. ​
Correct Answer
D. Paste
Explanation
The correct answer is "Paste". The paste command is used to insert data from the clipboard into an application. It allows users to easily transfer text, images, or other content from one location to another within the same application or across different applications. This command is commonly used in word processors, image editors, and other software programs to quickly insert copied or cut content.
17.
Used to describe devices that work with a computer system as soon as they are connected.
Correct Answer
D. Plug & Play
Explanation
Plug & Play is the correct answer because it accurately describes devices that can be connected to a computer system and immediately start working without the need for additional configuration or installation. This term is commonly used to refer to hardware devices such as USB drives, printers, or keyboards that are designed to be easily connected and used with a computer system. The "plug" refers to the act of physically connecting the device, while "play" indicates that the device is ready to be used without any further setup or intervention.
18.
HTTPS & SSL are examples of this
Correct Answer
B. Secure Websites
Explanation
HTTPS (Hypertext Transfer Protocol Secure) and SSL (Secure Sockets Layer) are both examples of secure websites. HTTPS is a secure version of HTTP that encrypts the data being transmitted between a website and a user's browser, ensuring that it cannot be intercepted or tampered with by attackers. SSL is a cryptographic protocol that provides secure communication over the internet by encrypting the data exchanged between a website and a user. Together, HTTPS and SSL help to establish a secure and trusted connection between users and websites, protecting sensitive information and ensuring privacy.
19.
Refers to the list of web pages a user has visited recently—and associated data such as page title and time of visit.
Correct Answer
B. History
Explanation
The correct answer is "History." History refers to the list of web pages a user has visited recently and associated data such as page title and time of visit. This feature is commonly found in web browsers and allows users to easily access previously visited websites. It can be useful for quickly revisiting a webpage or tracking browsing habits.
20.
Can secretly capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information.
Correct Answer
C. Spyware
Explanation
Spyware is a type of malicious software that can secretly capture information like web browsing habits, e-mail messages, usernames and passwords, and credit card information. It is designed to collect data without the user's knowledge or consent and can be used for various malicious purposes, such as identity theft or unauthorized access to sensitive information. Spyware often operates in the background, making it difficult for users to detect its presence on their devices. Therefore, it is important to have security measures in place to protect against spyware attacks.
21.
Is a computer file sent along with an email message.
Correct Answer
B. Attatchment
Explanation
An attachment is a computer file sent along with an email message. It can be any type of file, such as a document, photo, or video. Attachments allow users to share files with others through email, making it convenient for sending and receiving important documents or media. However, it is important to be cautious with attachments, as they can also be used to distribute malware or viruses. Users should always exercise caution when opening attachments from unknown or suspicious sources to avoid any potential security risks.
22.
Used to describe the virtual world of computers.
Correct Answer
B. Cyberspace
Explanation
Cyberspace is the correct answer because it is commonly used to describe the virtual world of computers. It refers to the digital realm where online communication, interactions, and activities take place. The term "cyberspace" encompasses the internet, websites, social media platforms, online gaming, and other virtual environments. It is a concept that highlights the interconnectedness of computer systems and the ability to access and navigate digital information and resources.
23.
Contains a group of computers that can be accessed and administered with a common set of rules
Correct Answer
A. Domain
Explanation
A domain is a group of computers that can be accessed and administered with a common set of rules. It is a network of computers that are connected and share the same rules and settings. This allows for centralized administration and control over the computers within the domain. HTTP, FTP, and WWW are not related to the concept of a domain.
24.
Refers to the process of receiving data over the Internet.
Correct Answer
C. Download
Explanation
The term "download" refers to the process of receiving data over the Internet. It involves retrieving information or files from a remote server and saving them onto a local device. This can include downloading documents, images, videos, software, or any other type of digital content. The act of downloading allows users to access and use data that is stored on the Internet, making it an essential part of online activities such as file sharing, streaming, or accessing online resources.
25.
Part of the standard TCP/IP set of protocols.
Correct Answer
A. E-Mail
Explanation
E-Mail is part of the standard TCP/IP set of protocols. TCP/IP is the foundational protocol suite for the internet, and it provides a set of rules and procedures for communication between devices on a network. E-Mail, which stands for Electronic Mail, is a widely used communication method that allows users to send and receive messages over the internet. It relies on TCP/IP protocols to ensure the reliable delivery of messages across different networks. Therefore, it is correct to say that E-Mail is part of the standard TCP/IP set of protocols.
26.
Text that links to other information
Correct Answer
C. Hypertext
Explanation
Hypertext is the correct answer because it is a term that refers to text that contains links to other information. It allows users to navigate through different pieces of information by clicking on these links. In the context of the given options, ISP refers to Internet Service Provider, which is a company that provides internet access to users. URL stands for Uniform Resource Locator, which is the address used to access resources on the internet. E-mail is a system for sending and receiving electronic messages. Therefore, the term that best fits the given options is Hypertext.
27.
This is the language that Web pages are written in.
Correct Answer
A. HTML
Explanation
HTML stands for Hypertext Markup Language. It is the standard language used for creating web pages and structuring their content. HTML is responsible for defining the structure, layout, and presentation of web documents. It uses tags to mark elements such as headings, paragraphs, images, links, and more. By using HTML, web developers can create interactive and dynamic web pages that can be viewed and accessed through web browsers.
28.
HTML
Correct Answer
D. HyperText Markup Language
Explanation
HTML stands for HyperText Markup Language. It is the standard markup language used for creating web pages and applications. HTML uses tags to structure the content and define the layout of a web page. It allows for the inclusion of text, images, links, and other media, and provides a way to specify how these elements should be displayed in a browser. HTML is the backbone of the World Wide Web and is essential for creating and designing web pages.
29.
The address of a specific Web site or file on the Internet.
Correct Answer
A. URL
Explanation
A URL (Uniform Resource Locator) is a specific address that identifies the location of a website or file on the internet. It provides a way for users to access specific resources such as web pages, images, or documents. The URL consists of various components, including the protocol (HTTP), the domain name (www), and the specific path or file name (HTML). By entering a URL into a web browser, users can navigate to the desired webpage or retrieve the specific file they are looking for.
30.
URL
Correct Answer
B. Uniform Resource Locator
Explanation
The correct answer is "Uniform Resource Locator". A URL is a specific type of uniform resource identifier (URI) that provides the address for a resource on the internet. It is commonly used to locate web pages, files, images, and other resources. The other options provided, such as Unified Reload Launcher, United Relocator Language, and Uniformity Residual Language, do not accurately describe the term "URL" and are not commonly used or recognized in the context of internet addressing.
31.
HTTP
Correct Answer
B. Hyper-Text Transfer Protocol
Explanation
HTTP stands for Hyper-Text Transfer Protocol. It is the protocol used for transmitting hypertext over the internet. It is the foundation of data communication for the World Wide Web. HTTP allows clients (such as web browsers) to request resources from web servers and receive responses. It defines the format of the messages exchanged between client and server, including the request methods, status codes, and headers. The correct answer is Hyper-Text Transfer Protocol.
32.
Consists of pages that can be accessed using a Web browser.
Correct Answer
A. WWW
Explanation
The correct answer is WWW because it refers to the World Wide Web, which is a system of interconnected hypertext documents accessed through the Internet. These documents, or web pages, can be accessed using a web browser, making WWW the most suitable option among the given choices.
33.
This is the protocol used to transfer data over the World Wide Web
Correct Answer
A. HTTP
Explanation
HTTP stands for Hypertext Transfer Protocol, which is the protocol used to transfer data over the World Wide Web. It is the foundation of any data exchange on the Web and allows for the retrieval and display of web pages. HTTP defines how messages are formatted and transmitted, as well as how web servers and browsers should respond to various commands. It enables the communication between clients (such as web browsers) and servers, facilitating the transfer of hypertext documents, images, videos, and other resources.
34.
WWW
Correct Answer
B. World Wide Web
Explanation
The correct answer is "World Wide Web". This is because the term "WWW" is commonly used as an abbreviation for the World Wide Web, which is a system of interconnected documents and other resources, linked by hyperlinks and URLs. The other options listed are not commonly associated with the abbreviation "WWW".
35.
In order to connect to the Internet, you need one of these.
Correct Answer
B. ISP
Explanation
To connect to the Internet, you need an ISP (Internet Service Provider). An ISP is a company that provides internet access to individuals or organizations. They offer various types of internet connections such as dial-up, DSL, cable, or fiber optic. Without an ISP, users would not have the necessary infrastructure and network connectivity to access the Internet. FTP (File Transfer Protocol), HTTP (Hypertext Transfer Protocol), and IFTP (Interactive File Transfer Protocol) are protocols used for specific purposes within the internet, but they are not essential for basic internet connectivity.
36.
ISP
Correct Answer
A. Internet Service Provider
Explanation
An ISP, or Internet Service Provider, is a company that provides internet access to individuals and organizations. They offer various services such as internet connectivity, email services, web hosting, and more. ISPs connect their customers to the internet through different technologies like DSL, cable, fiber optics, or satellite. They act as a bridge between users and the internet, allowing them to access websites, send emails, stream videos, and perform various online activities. Therefore, the correct answer is Internet Service Provider.
37.
A common method of transferring files via the Internet from one computer to another
Correct Answer
A. FTP
Explanation
FTP stands for File Transfer Protocol, which is a common method of transferring files via the Internet from one computer to another. It allows users to upload and download files between their local system and a remote server. FTP is widely used for website maintenance, software updates, and sharing large files. It provides a secure and efficient way to transfer files over a network.
38.
FTP
Correct Answer
C. File Transfer Protocol
Explanation
FTP stands for File Transfer Protocol. It is a standard network protocol used for transferring files between a client and a server on a computer network. FTP is commonly used to upload and download files from a server, making it an essential tool for file management and sharing. The other options, Final Transfer Protocol, File Telecom Protocol, and Final Telecom Protocol, are not valid terms and do not accurately describe the purpose and function of FTP.
39.
a computer network limited to a small area such as an office building, university, or even a residential home.
Correct Answer
A. LAN
Explanation
A LAN, or Local Area Network, is a computer network that is restricted to a small geographical area such as an office building, university, or residential home. It allows computers and other devices to connect and share resources within this limited area.
40.
Local Area Network
Correct Answer
A. LAN
Explanation
A LAN (Local Area Network) is a network that connects computers and devices within a limited area, such as a home, office, or school. It allows for the sharing of resources, such as printers and files, and enables communication between connected devices. LANs are typically faster and more secure than wide area networks (WANs) because they cover a smaller geographic area.
41.
a piece of equipment that sends data or information into to a computer. (Keyboard, mouse, scanner, etc…)
Correct Answer
B. Input Device
Explanation
An input device is a piece of equipment that sends data or information into a computer. This can include devices such as a keyboard, mouse, or scanner. These devices allow users to input data or commands into the computer for processing.
42.
a piece of equipment that receives data or information from a computer. (Speakers, printers, projectors, etc…)
Correct Answer
D. Output Device
Explanation
An output device is a piece of equipment that receives data or information from a computer and displays or presents it in a readable or usable format. Examples of output devices include speakers, printers, projectors, etc. These devices take the processed data or information from the computer and present it to the user in a form that can be understood or utilized.
43.
a process that prepares storage media to be recognized by your computer.
Correct Answer
E. Formatting
Explanation
Formatting is the process of preparing storage media, such as a hard drive or a USB flash drive, to be recognized and used by a computer. It involves organizing the storage space, creating a file system, and clearing any existing data on the media. Formatting is necessary to ensure that the storage media is compatible with the computer's operating system and can be used to store and retrieve data efficiently.
44.
a way to describe the page layout or style of text on a page.
Correct Answer
E. Formatting
Explanation
Formatting refers to the way in which the page layout or style of text on a page is described. It involves organizing and arranging text, images, and other elements in a visually appealing and coherent manner. Formatting can include aspects such as font styles, font sizes, headings, paragraphs, margins, spacing, alignment, and the use of colors and graphics. It is an important aspect of document creation and design, as it helps to enhance readability and comprehension, and creates a professional and polished appearance.
45.
prints without banging a ribbon onto paper. Laser, LED, inkjet, solid ink, thermal wax transfer and dye sublimation are examples of this.
Correct Answer
F. Non-Impact Printer
Explanation
A non-impact printer refers to a type of printer that does not use a ribbon to produce prints on paper. Instead, it uses various technologies such as laser, LED, inkjet, solid ink, thermal wax transfer, and dye sublimation to create images or text on the paper. These printers are generally faster, quieter, and produce higher-quality prints compared to impact printers. They are commonly used in homes, offices, and other settings where quiet operation and high print quality are desired.
46.
a programmable machine that can execute a list of programmed instructions and respond to new instructions.
Correct Answer
G. Computer
Explanation
A computer is a programmable machine that can execute a list of programmed instructions and respond to new instructions. It is a device that processes data, performs calculations, and generates output. It can be used for various purposes such as storing and retrieving information, communicating with others, and running software applications. Users interact with a computer through input devices, such as keyboards and mice, and receive information through output devices, such as monitors and printers. Overall, a computer is a versatile tool that can be customized to perform a wide range of tasks.
47.
unprocessed and raw information that is stored by a computer.
Correct Answer
C. Data
Explanation
Data refers to unprocessed and raw information that is stored by a computer. It can be in the form of text, numbers, images, or any other type of information that can be processed by a computer. Data is the foundation of any computer system and is used to perform various operations and tasks. It can be inputted into a computer through input devices, processed and manipulated by the computer, and then displayed or outputted through output devices. Data can also be formatted and organized to make it more meaningful and usable.
48.
processed, organized bits of data.
Correct Answer
H. Information
Explanation
Information refers to processed, organized bits of data. It is the result of data being analyzed, interpreted, and given context. While data is raw and unprocessed, information provides meaning and usefulness to users. In the context of the given options, information is the most appropriate term to describe processed and organized data.
49.
person who uses a computer, network service, or other media services - usually identified by a username.
Correct Answer
I. Users
Explanation
The term "users" refers to individuals who utilize a computer, network service, or other media services. They are typically identified by a username, which allows them to access and interact with various technologies. Users play a crucial role in operating and benefiting from the functionalities provided by hardware and software systems. They input data, receive output, and utilize information through their interactions with computers and other devices.
50.
the physical parts of a computer and related devices.
Correct Answer
J. Hardware
Explanation
Hardware refers to the physical components of a computer and related devices. It includes input devices, output devices, non-impact printers, and other tangible parts of a computer system. Hardware is essential for processing and storing data, and it is the physical infrastructure that enables users to interact with a computer and access information.