1.
Where is the Spotlight on your iMac located?
Correct Answer
D. On the menu bar of your desktop
Explanation
The Spotlight on your iMac is located on the menu bar of your desktop. The menu bar is the horizontal bar at the top of the screen that displays various options and functions. The Spotlight feature allows you to quickly search for files, apps, and other content on your iMac. By clicking on the Spotlight icon on the menu bar or using the keyboard shortcut, you can access the search function and easily find what you're looking for.
2.
What is one way to open a new Finder window?
Correct Answer
A. Click on the blue smiley face on your dock
Explanation
Clicking on the blue smiley face on the dock is one way to open a new Finder window. The blue smiley face is the icon for the Finder application, and clicking on it will launch a new Finder window.
3.
Is it easier and shorter to access your u-drive through a Finder window or from the file folder on your dock?
Correct Answer
B. Dock
Explanation
The correct answer is "Dock" because accessing the u-drive from the file folder on the dock is quicker and more convenient. The dock provides easy access to frequently used applications and folders, including the file folder where the u-drive is located. This allows for a shorter and more direct route to access the u-drive compared to opening a Finder window and navigating through the file system.
4.
The Pages application is most similar to what Microsoft application?
Correct Answer
B. Word
Explanation
The Pages application is most similar to Microsoft Word because both are word processing applications used for creating and editing documents. They both have similar features such as text formatting, spell check, and the ability to insert images and tables. Additionally, both Pages and Word allow users to save documents in various file formats, making them compatible with other word processing software.
5.
When looking at the login screen of your iMac, it is possible to see a red. What does this red dot tell you? Be sure to choose the BEST possible answer.
Correct Answer
D. Your computer is not connected to the network
Explanation
The red dot on the login screen of the iMac indicates that the computer is not connected to the network. This means that the computer is unable to access the internet or connect to other devices on the network. It does not necessarily mean that the computer is broken or that it will not let you log in, but rather that there is an issue with the network connection.
6.
The iWorks application, Keynote, is most similar to what Microsoft application?
Correct Answer
B. Power Point
Explanation
Keynote is a presentation software application developed by Apple as part of the iWorks suite. It allows users to create and deliver visually appealing slideshows. Similarly, Microsoft PowerPoint is a presentation program that enables users to create slideshows with various multimedia elements. Both Keynote and PowerPoint are designed for creating and delivering presentations, making PowerPoint the most similar Microsoft application to Keynote.
7.
The iWorks application, Numbers, is most similar to what Microsoft application?
Correct Answer
A. Excel
Explanation
Numbers is a spreadsheet application in the iWorks suite, similar to Microsoft Excel. Both applications allow users to create and manipulate spreadsheets, perform calculations, and analyze data. They have similar features such as formulas, charts, and tables, making them suitable for tasks involving numerical data and analysis. Therefore, the correct answer is Excel.
8.
The iLife application, GarageBand, would be primarily used to create which of the following? You need to choose two answers.
Correct Answer(s)
B. Music
D. Podcasts
Explanation
GarageBand is a popular iLife application that is primarily used for creating music and podcasts. It provides users with a wide range of tools and features to compose, record, edit, and mix music tracks. Additionally, GarageBand offers podcasting capabilities, allowing users to create and edit podcasts with ease. Therefore, the correct answers for this question are Music and Podcasts.
9.
The iLife application, iMovie, would be used to create which of the following?
Correct Answer
A. Movies
Explanation
iMovie is a part of the iLife application suite and is specifically designed for creating and editing movies. It provides various features and tools to import, edit, and enhance videos, add effects and transitions, and create professional-looking movies. Therefore, iMovie would be the correct application to use for creating movies.
10.
The iLife application, iTunes can be used for many different things. However, most people use it for one purpose. What is this most common purpose?
Correct Answer
A. To store music
Explanation
The most common purpose for using the iTunes application is to store music. iTunes allows users to organize and manage their music library, including purchasing and downloading songs, creating playlists, and syncing music to other devices. It is a popular platform for music lovers to store and access their favorite songs conveniently.
11.
What is the easiest way to access my Handouts Folder?
Correct Answer
B. Through your Dock
Explanation
The easiest way to access the Handouts Folder is through the Dock. The Dock is a convenient shortcut bar located at the bottom of the screen on a Mac computer. It allows quick access to frequently used applications, folders, and files. By placing the Handouts Folder in the Dock, it becomes easily accessible with just a single click, making it the most convenient method to access the folder.
12.
Which of the following is NOT necessarily needed to access your u-drive from home?
Correct Answer
B. The Windows OS
Explanation
The Windows OS is not necessarily needed to access the u-drive from home because there are alternative operating systems that can be used to access and manage files on the u-drive. As long as there is an internet connection and a computer, regardless of the operating system, the u-drive can be accessed remotely. Stoneware is not relevant to accessing the u-drive and is not necessary.
13.
On a normal day, when our school network is properly functioning, is it possible to see what files are inside my Dropbox?
Correct Answer
A. No
Explanation
On a normal day, when the school network is functioning properly, it is not possible to see what files are inside an individual's Dropbox account. Dropbox provides secure and private cloud storage, ensuring that only the account owner has access to their files unless they explicitly choose to share them with others. The school network does not have the capability to bypass Dropbox's security measures and view the contents of an individual's account. Therefore, the correct answer is "No."
14.
If you are not sure if you have turned in an assignment to my Dropbox, what is the BEST and fastest way for YOU to check?
Correct Answer
C. Drop the file into the Dropbox. If you have previously turned it in, you will get a message asking you to "replace" the file. Then you know that you have turned it in.
Explanation
The best and fastest way to check if you have turned in an assignment to the Dropbox is by dropping the file into the Dropbox. If you have previously turned it in, you will receive a message asking you to "replace" the file. This indicates that you have already turned it in.
15.
What is the keyboard shortcut for a partial screen, Screen Capture?
Correct Answer
A. Cmd, Shift, 4
Explanation
The correct answer is Cmd, Shift, 4. This keyboard shortcut is used to capture a partial screen screenshot on a Mac. By pressing Cmd, Shift, and 4 simultaneously, the cursor will turn into a crosshair. You can then click and drag to select the desired area of the screen to capture. Once the selection is made, releasing the mouse button will save the screenshot as a file on the desktop.
16.
What is the keyboard shortcut for a full screen, Screen Capture?
Correct Answer
B. Cmd, Shift, 3
Explanation
The keyboard shortcut "Cmd, Shift, 3" is used for a full screen screen capture. This means that when you press the Command, Shift, and 3 keys simultaneously on your keyboard, it will capture a screenshot of your entire screen.
17.
Is it important to close all open application before trying to log out on a Mac?
Correct Answer
A. Yes
Explanation
It is important to close all open applications before trying to log out on a Mac because it ensures that all processes and tasks are properly terminated. This helps in preventing any data loss or corruption and ensures a smooth and safe log out process. Leaving applications open may cause conflicts or errors during the log out process and can also slow down the system. Therefore, closing all open applications before logging out is recommended for optimal performance and system stability.
18.
Which way is NOT a way to close an open application on a Mac?
Correct Answer
D. Type the name of the application in Spotlight and then click Quit
Explanation
The given answer suggests that typing the name of the application in Spotlight and then clicking Quit is NOT a way to close an open application on a Mac. This is because Spotlight is a search tool used to find files, documents, and applications on a Mac, but it does not have the capability to directly close an open application. Therefore, this method is not a valid way to close an open application on a Mac.
19.
Which operating system was created in order to update and replace Vista?
Correct Answer
B. Windows 7
Explanation
Windows 7 was created as an operating system to update and replace Vista.
20.
How many bits are in a byte?
Correct Answer
D. 8
Explanation
A byte is a unit of digital information that consists of 8 bits. Each bit can represent either a 0 or a 1, and when combined, they form a byte. Therefore, the correct answer is 8, as there are 8 bits in a byte.
21.
How many bytes are approximately in one Megabyte?
Correct Answer
A. 1 million
Explanation
One Megabyte is equal to approximately 1 million bytes. This is because the prefix "mega-" denotes a factor of one million in the International System of Units (SI). Therefore, when referring to data storage or transfer, one Megabyte is typically understood to be equivalent to 1 million bytes.
22.
How many bytes are approximately in one Gigabyte?
Correct Answer
C. 1 billion
Explanation
One Gigabyte is approximately equal to 1 billion bytes. This is because in the binary system, 1 Gigabyte is equal to 2^30 bytes, which is approximately 1.073 billion bytes. However, for simplicity, it is often rounded down to 1 billion bytes.
23.
What type of expansion card is in the picture?
Correct Answer
A. Network card
Explanation
The correct answer is "Network card". From the given options, a network card is a type of expansion card that is used to connect a computer to a network, enabling it to communicate with other devices and access the internet. It is responsible for transmitting and receiving data over a network, allowing the computer to send and receive information.
24.
What type of expansion card is in the picture?
Correct Answer
C. Sound card
Explanation
The correct answer is sound card. The picture likely shows a sound card because sound cards are expansion cards that are commonly used to enhance the audio capabilities of a computer. They are responsible for processing and generating sound signals, allowing users to listen to audio through speakers or headphones.
25.
What type of expansion card is in the picture?
Correct Answer
D. Video card
Explanation
The correct answer is Video card. The picture is most likely showing a video card because it is a component that is responsible for generating and outputting visual images to a display device, such as a monitor. It is an expansion card that can be inserted into a computer's motherboard to enhance its graphics capabilities. Network cards, sound cards, and internet cards are different types of expansion cards that serve other functions and are not directly related to generating visual images.
26.
What is the name of this port?
Correct Answer
B. Universal Serial Bus
Explanation
Universal Serial Bus (USB) is the correct answer because it is a widely used port for connecting devices to a computer. It is used for various purposes such as transferring data, charging devices, and connecting peripherals like keyboards, mice, and printers. Firewire, Ethernet, and Parallel are other types of ports, but they are not as commonly used as USB.
27.
What is the name of the port in the following picture?
Correct Answer
C. Firewire port
Explanation
The correct answer is Firewire port. This port is commonly used for high-speed data transfer between devices such as computers and external hard drives or digital cameras. It is distinguishable by its unique shape and the symbol of a stylized "Y" on the port itself. Firewire ports were popular in the early 2000s but have since been largely replaced by USB ports for most consumer devices.
28.
The piece of hardware in the picture is used for which of the following purposes?
Correct Answer
A. Cool the CPU
Explanation
The piece of hardware in the picture is used to cool the CPU. The CPU generates a lot of heat while it is running, and this cooling device helps to dissipate that heat and prevent the CPU from overheating. This is important because excessive heat can damage the CPU and affect its performance.
29.
What is the most appropriate name for the piece of hardware that is pictured below?
Correct Answer
A. CPU
Explanation
The correct answer is CPU because the picture shows a central processing unit (CPU), which is the main hardware component responsible for executing instructions and performing calculations in a computer system. The CPU is often referred to as the "brain" of the computer.
30.
What type of storage is contained within this piece of hardware?
Correct Answer
A. Secondary storage
Explanation
The given correct answer is secondary storage. Secondary storage refers to the type of storage that is used for long-term data storage. It is non-volatile, meaning it retains data even when the power is turned off. Examples of secondary storage include hard disk drives (HDDs), solid-state drives (SSDs), and optical discs. This type of storage is different from primary storage (such as RAM) which is used for temporary data storage while the computer is running.
31.
Which piece of information is NOT necessarily needed to create a student account in Active Directory?
Correct Answer
B. School name
Explanation
To create a student account in Active Directory, the information that is NOT necessarily needed is the school name. While the password, graduation year, and last name are essential for creating an account, the school name may not be required as it can be inferred from other details such as the student's email domain or organizational unit.
32.
A student in your class is not able to access the Internet while everyone else in the class can. You have checked the Ethernet cable and it is plugged in at both ends. You then have that student log out and you log in. You are able to access the internet on the other students computer. What is most likely the cause of this problem?
Correct Answer
D. The student has had their Internet permissions group removed from their account in Active Directory
Explanation
The most likely cause of the problem is that the student's Internet permissions group has been removed from their account in Active Directory. This means that their account does not have the necessary permissions to access the Internet. Since logging in with your own account allows you to access the Internet on the student's computer, it suggests that the issue is specific to the student's account rather than a problem with the school network or wireless Internet.
33.
The best way to add a network printer on a Mac is to use the printer's IP address. How would you go about adding this printer?
Correct Answer
A. By accessing System Preferences and then Printer settings
Explanation
To add a network printer on a Mac, you would access System Preferences and then Printer settings. This option allows you to configure and add printers to your Mac computer. By accessing the Printer settings, you can enter the printer's IP address, which will enable your Mac to connect to and communicate with the network printer effectively.
34.
By following the following steps, you could reset the PMU of which type of machine?1. unplug the power2. hold down the power button for 10 seconds3. plug the power back in4. push the power button 1 or 2 times
Correct Answer
A. Mac
Explanation
The given steps indicate the process to reset the PMU (Power Management Unit) of a Mac machine. By following these steps, one can unplug the power, hold down the power button for 10 seconds, plug the power back in, and then push the power button 1 or 2 times to reset the PMU. This process is specific to Mac machines, hence the correct answer is Mac.
35.
By following the following steps, you could reset the PMU of which type of machine?1. unplug the power from the back2. proceed to plug and unplug the power cord until you hear a buzz sound, kind of like a static electricity shock)
Correct Answer
B. PC
Explanation
By following the given steps of unplugging the power from the back and repeatedly plugging and unplugging the power cord until a buzz sound is heard, it is possible to reset the PMU (Power Management Unit) of a PC. The PMU is responsible for managing power-related functions in a computer, so resetting it can help resolve power-related issues or glitches. Therefore, the correct answer is PC.
36.
If a teacher says that her printer will not print. What is the first step you should take to try and solve the problem? Remember to think systematically to possibly save yourself time.
Correct Answer
D. Check to see if error or warning lights are on or blinking
Explanation
The first step to try and solve the problem of the teacher's printer not printing is to check if error or warning lights are on or blinking. This step is important because it can indicate any issues or errors with the printer that may be causing it to not print. By identifying and addressing these error or warning lights, the teacher may be able to resolve the problem and get the printer working again. Checking other factors such as network connectivity, paper availability, or printing a diagnostic page may be necessary, but checking for error or warning lights is the initial step to troubleshoot the issue.
37.
Which one of the following factors did NOT contribute to the increasing demand for technical support over the years?
Correct Answer
D. Cost of tech support
Explanation
The increasing demand for technical support over the years can be attributed to factors such as new computer users, problems with legacy systems, and the installation of new systems. However, the cost of tech support did not contribute to this increasing demand. This suggests that the cost of tech support did not act as a barrier or deterrent for individuals seeking technical assistance, and therefore did not play a role in driving up the demand for technical support services.
38.
In the 1970's companies began to realize that they had to distinguish between ____________ and support. Up until this point the same employees dealt with both.
Correct Answer
B. Development
Explanation
In the 1970's, companies started recognizing the need to differentiate between development and support. Previously, the same employees were responsible for both tasks. This realization marked a shift in understanding the importance of separating the processes of creating and improving products (development) from providing assistance and maintenance (support).
39.
In the 1970's _________________ centers were developed as a place within the company where employees could receive training and help using personal computers
Correct Answer
A. Information
Explanation
In the 1970's, information centers were developed as a place within the company where employees could receive training and help using personal computers. These centers were established to provide employees with access to information and resources related to computer usage, helping them to develop their skills and utilize the technology effectively. The focus of these centers was on providing information and support rather than on the development, design, or hardware aspects of personal computers.
40.
Which of the following is not a result of a Proactive Help Desk?
Correct Answer
D. Problems solved once they happen
Explanation
Proactive help desks aim to prevent problems from occurring in the first place by identifying and resolving potential issues before they escalate. Therefore, the statement "Problems solved once they happen" is not a result of a proactive help desk, as their main focus is on preventing problems rather than waiting for them to occur and then solving them.
41.
The components of a successful help desk include all of the following?PeopleProcessesTechnologyInformation
Correct Answer
A. True
Explanation
A successful help desk requires all of the mentioned components - people, processes, technology, and information. People are needed to provide support and assistance to users, processes ensure that tasks are carried out efficiently and consistently, technology enables the help desk to effectively manage and resolve issues, and information helps in understanding and addressing user needs. Therefore, the statement "The components of a successful help desk include all of the following: People, Processes, Technology, Information" is true.
42.
Does good customer service mean giving the customer everything they ask for?
Correct Answer
A. No
Explanation
Good customer service does not necessarily mean giving the customer everything they ask for. While it is important to meet customer needs and provide satisfactory solutions, it is also essential to balance those requests with the company's policies, resources, and overall business objectives. Good customer service involves understanding the customer's needs, effectively communicating and empathizing with them, and finding appropriate solutions that align with the company's capabilities and values. It is about providing excellent support, guidance, and assistance to the customer while maintaining a fair and reasonable approach.
43.
The ________________supports the processor by controlling many motherboard activities.
Correct Answer
C. Chipset
Explanation
The chipset supports the processor by controlling many motherboard activities. It acts as the communication hub between the processor, memory, and other components. It manages data flow, handles input/output operations, and provides interfaces for connecting peripherals. Without a chipset, the processor would not be able to efficiently communicate with other components, leading to system instability and poor performance.
44.
Which of the following words is NOT associated with primary storage?
Correct Answer
A. ROM
Explanation
ROM stands for Read-Only Memory, which is a type of non-volatile memory that is used to store permanent data that cannot be modified or erased. It is not considered primary storage because it is not directly accessible by the CPU for executing instructions or storing data during program execution. Primary storage, on the other hand, refers to the main memory of a computer system, such as RAM (Random Access Memory), where data and instructions are temporarily stored for immediate access by the CPU. Therefore, ROM is not associated with primary storage.
45.
Which of the following is an example of secondary storage?
Correct Answer
B. CD
Explanation
CD is an example of secondary storage because it is a type of optical disc that can store large amounts of data. Unlike RAM, which is volatile and loses data when power is turned off, CDs retain data even when power is not supplied. CDs are commonly used for storing music, videos, software, and other files, making them a popular choice for secondary storage. DIMM and SIMM are types of memory modules used in computers, but they are not considered secondary storage devices.
46.
_______________are circuits or paths that enable data, instructions, and power to move from component to component on the board.
Correct Answer
D. Traces
Explanation
Traces are circuits or paths that enable data, instructions, and power to move from component to component on the board. They are the physical connections on a printed circuit board (PCB) that allow for the flow of electrical signals. Traces are typically made of copper and are etched onto the surface of the PCB. They act as conductive pathways, connecting different components and allowing them to communicate and transfer power efficiently.
47.
The main bus on the motherboard that communicates with the CPU, memory, and the chipset goes by several names. Which of the following is not one of those names?
Correct Answer
A. Internal bus
Explanation
The given question asks for the name that is not associated with the main bus on the motherboard. The options provided are Internal bus, Host bus, System bus, and Front side bus. The correct answer is Internal bus because all the other options (Host bus, System bus, and Front side bus) are names that refer to the main bus on the motherboard that communicates with the CPU, memory, and the chipset. Therefore, Internal bus is not one of the names for the main bus on the motherboard.
48.
The ______________________ is dedicated to timing the activities of the motherboard. A crystal on the motherboard generates the oscillation that produces the continuous pulses that are needed.
Correct Answer
C. System clock
Explanation
The system clock is responsible for timing the activities of the motherboard. It uses a crystal on the motherboard to generate continuous pulses that are needed for the proper functioning of the system. The system clock ensures that all operations and processes within the motherboard are synchronized and occur at the correct time.
49.
Although we often refer to the speed of the CPU and the motherboard bus, talking about the frequency of these devices is more accurate.
Correct Answer
A. True
Explanation
The explanation for the given correct answer is that while it is common to use the term "speed" when referring to the CPU and motherboard bus, it is actually more accurate to talk about their frequency. This is because the frequency of these devices determines how many operations they can perform in a given amount of time, which is a more precise measure of their performance. So, it is true that referring to the frequency of the CPU and motherboard bus is more accurate than using the term "speed".
50.
The power supply does not actually generate electricity but converts and reduces it to a voltage that the computer can handle.
Correct Answer
B. True
Explanation
The statement is true because a power supply in a computer does not generate electricity from scratch. Instead, it takes in the electrical energy from an external source (such as a wall outlet) and converts it to the appropriate voltage levels that the computer components can safely handle. This conversion and reduction of voltage is necessary to ensure that the computer receives the correct amount of power without causing any damage or malfunction.