1.
What internal computer component requires a heatsink and fan to prevent it from overheating
Correct Answer
A. CPU
Explanation
The CPU (Central Processing Unit) is the internal computer component that requires a heatsink and fan to prevent it from overheating. The CPU generates a significant amount of heat during operation, and the heatsink and fan combination helps to dissipate this heat and maintain the CPU's temperature within safe limits. Without proper cooling, the CPU can overheat, leading to performance issues, system instability, and potential damage to the component.
2.
1 Gigabyte is the equivilent of how many Megabytes?
Correct Answer
D. 1024
Explanation
The correct answer is 1024 because 1 gigabyte is equal to 1024 megabytes. This is because computers use binary system for data storage, where each unit is a power of 2. Therefore, 1 gigabyte is equal to 2^10 megabytes, which equals 1024.
3.
What does ROM Stand for?
Correct Answer
E. Read Only Memory
Explanation
ROM stands for Read Only Memory. This type of memory is non-volatile, meaning it retains its data even when the power is turned off. It contains permanent instructions that the computer uses during startup. The data stored in ROM cannot be modified or erased, hence the term "Read Only." ROM is commonly used to store firmware, such as the BIOS in a computer, which provides the basic instructions for the hardware to function correctly.
4.
Which slot on the motherboard would you place an up to date graphics card?
Correct Answer
B. PCI - E Slot
Explanation
The correct answer is PCI-E Slot. This is because the PCI-E (Peripheral Component Interconnect Express) slot is specifically designed to accommodate high-performance graphics cards. It provides faster data transfer rates and more bandwidth compared to other slots like PCI or AGP. Therefore, to ensure optimal performance and compatibility, an up-to-date graphics card should be placed in the PCI-E slot on the motherboard.
5.
Which of the following is NOT a form of malware?
Correct Answer
C. Beetle
Explanation
The given options are all types of malware except for "Beetle". A virus is a malicious program that can replicate and spread to other computers. A worm is a self-replicating program that can spread across networks. A Trojan horse is a program that appears harmless but actually contains malicious code. A rogue dialler is a type of malware that dials premium-rate phone numbers without the user's knowledge. However, "Beetle" is not a recognized form of malware.
6.
Which of the following is NOT a brand of antivirus software?
Correct Answer
D. ZAP!
Explanation
ZAP! is not a brand of antivirus software. The other options, Norton, McAfee, Kaspersky, and AVG, are well-known brands in the antivirus software industry. ZAP! does not have a presence in the antivirus software market and is not recognized as a reputable brand for providing antivirus protection.
7.
A "keylogger" is what type of malware
Correct Answer
A. Spyware
Explanation
A keylogger is a type of malware that secretly records keystrokes on a computer or mobile device. It is often used by hackers to steal sensitive information such as passwords, credit card numbers, and personal messages. Unlike adware, which displays unwanted advertisements, or viruses, worms, and Trojan horses, which can cause damage to a computer system, a keylogger primarily focuses on capturing keystrokes without the user's knowledge. Therefore, the correct answer is spyware.
8.
What is the only LEGAL form of Malware?
Correct Answer
D. Adware
Explanation
Adware is considered the only legal form of malware because it is a type of software that displays advertisements on a user's device. While it can be annoying and intrusive, it is not inherently malicious. Adware is often bundled with other software and installed without the user's knowledge, leading to its classification as malware. However, it is legal as long as it follows certain guidelines and obtains the user's consent for displaying advertisements.
9.
What is SPAM?
Correct Answer
B. An unwanted email
Explanation
SPAM refers to unsolicited or unwanted emails sent in bulk to a large number of recipients. These emails are typically promotional or advertising in nature and are often sent without the consent of the recipients. SPAM emails can be annoying, time-consuming, and potentially harmful as they may contain phishing attempts or malicious links. Therefore, the correct answer is "An unwanted email."
10.
Which of the following should NOT arouse suspicion that an email may be phish?
Correct Answer
E. There is a link taking you to a site starting https://
Explanation
The use of HTTPS (Hypertext Transfer Protocol Secure) in a link indicates that the website is secure and encrypted, which helps protect sensitive information. Therefore, a link starting with HTTPS should not arouse suspicion that an email may be a phishing attempt. Phishing emails typically try to trick users into clicking on malicious links or providing personal information, so the presence of a secure link does not align with typical phishing tactics.
11.
What is the type of software is used to repel hackers?
Correct Answer
C. Firewall
Explanation
A firewall is a type of software that is used to repel hackers. It acts as a barrier between a trusted internal network and an untrusted external network, such as the internet. It monitors and controls incoming and outgoing network traffic based on predetermined security rules. By analyzing the data packets, a firewall can identify and block unauthorized access attempts, preventing hackers from gaining access to the network and compromising sensitive information.
12.
If you send confidential information down an unsecured network, what should you do first?
Correct Answer
C. Encrypt it
Explanation
When sending confidential information down an unsecured network, the first step should be to encrypt the data. Encryption converts the information into a coded form that can only be deciphered with the appropriate decryption key. This ensures that even if the data is intercepted, it will be unreadable and protected from unauthorized access. Encrypting the information adds an extra layer of security and helps to safeguard sensitive data during transmission.
13.
What should you clean internal components of a computer with?
Correct Answer
A. Air Duster
Explanation
Air duster is the correct answer because it is specifically designed to clean internal components of a computer. It uses compressed air to blow away dust and debris from hard-to-reach areas without causing any damage. Water, damp cloth, bleach, and metal polish are not suitable for cleaning internal computer components as they can cause corrosion, short circuits, and damage to delicate electronic parts.
14.
What is the purpose of Defragmenting your hard disk drive?
Correct Answer
C. To speed up your hard disk drive
Explanation
Defragmenting a hard disk drive is the process of reorganizing fragmented data on the drive, which can improve the overall speed and performance of the drive. Over time, as files are added, modified, and deleted, the data on the hard drive becomes fragmented and scattered across different locations. This fragmentation can slow down the read and write speeds of the drive, causing longer load times for files and applications. By defragmenting the drive, the data is rearranged and stored in contiguous blocks, allowing for faster access and improved performance.
15.
Which of the following is NOT a good safety measure on a public network?
Correct Answer
D. Allowing your screen to be within the view of others
Explanation
Allowing your screen to be within the view of others is not a good safety measure on a public network because it increases the risk of unauthorized individuals seeing sensitive information. This can lead to identity theft, unauthorized access to accounts, and other security breaches. It is important to keep your screen out of view to protect your personal and confidential information.
16.
Where can you disable programs on booting up?
Correct Answer
B. Msconfig
Explanation
Msconfig is the correct answer because it is a utility tool in Windows that allows users to manage the startup programs and services. By accessing the System Configuration window through the "msconfig" command, users can disable unnecessary programs from starting up during the boot process. This helps to improve the system's performance and reduce the time taken for the computer to start up. The other options mentioned, such as Control Panel, Boot menu, BIOS, and Registry, are not specifically designed for disabling programs on booting up.
17.
Which information does NOT appear on a blue screen of death?
Correct Answer
E. Sim code
Explanation
The information that does NOT appear on a blue screen of death is the "Sim code". A blue screen of death (BSOD) is a system error screen displayed on Windows operating systems when a critical error occurs. It typically includes information such as the file name, stop code, error code, and memory dump. However, the "Sim code" is not a relevant or commonly used term in the context of a BSOD, hence it does not appear on the screen.
18.
Which of the following CANNOT be done in Windows safe mode?
Correct Answer
E. Microsoft Word
Explanation
Microsoft Word cannot be used in Windows safe mode because safe mode is a diagnostic mode of Windows that loads only essential system files and drivers. It disables unnecessary programs and services, including Microsoft Office applications like Word. Safe mode is primarily used for troubleshooting and fixing system issues, so running applications like Word is not possible in this mode.
19.
What is the first option on the Windows Advanced Options Menu that should be used if you spot a problem with your computer?
Correct Answer
D. Last known good configuration
Explanation
The Last known good configuration option on the Windows Advanced Options Menu should be used if you spot a problem with your computer. This option allows you to start Windows using the most recent settings that worked correctly, which can be helpful in resolving issues caused by recent changes or updates. It essentially restores the computer to a previous state where it was functioning properly, without affecting any personal files or data.
20.
What information is required from a credit card to take money out, but not put it into your account?
Correct Answer
C. Card verification value (last 3 digits on back)
Explanation
To take money out from a credit card, the card verification value (last 3 digits on the back) is required. This value is used to verify the authenticity of the card during transactions. It is not necessary to have other information such as the credit card number, card issuer, issue number, or expiry month in order to withdraw money from the account.