Do You Know About Computers?

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Thames
T
Thames
Community Contributor
Quizzes Created: 2572 | Total Attempts: 9,338,474
Questions: 15 | Attempts: 318

SettingsSettingsSettings
Do You Know About Computers? - Quiz

How well do you know about computers? Please play this quiz and prove yourself!


Questions and Answers
  • 1. 

    April Fools' Day 2009 saw concern on the internet around which new worm?

    • A.

      CrackIt

    • B.

      Kasparov

    • C.

      Conficker

    • D.

      Klez

    Correct Answer
    C. Conficker
    Explanation
    In April Fools' Day 2009, there was widespread concern on the internet regarding the Conficker worm. This worm was a malicious software that targeted Microsoft Windows operating systems. It spread primarily through network vulnerabilities and infected millions of computers worldwide. The Conficker worm had the ability to disable security features, steal personal information, and create a botnet for further attacks. Its widespread presence and potential for damage caused significant concern and prompted increased security measures during that time.

    Rate this question:

  • 2. 

    What is the name for the part of the wireless signal which synchronizes traffic?

    • A.

      Prequel

    • B.

      Prologue

    • C.

      Preamble

    • D.

      Prima Donna

    Correct Answer
    C. Preamble
    Explanation
    The correct answer is "Preamble". In wireless communication, the preamble is a part of the signal that is used to synchronize the transmission and reception of data. It contains a specific pattern of bits that allows the receiving device to detect the start of a transmission and establish the necessary timing and synchronization for proper data transfer. The preamble is essential for ensuring reliable and accurate communication between devices in a wireless network.

    Rate this question:

  • 3. 

    What term applies to a group of computers infected with code allowing external control?

    • A.

      Dark Side

    • B.

      Evil Horde

    • C.

      Black Box

    • D.

      Botnet

    Correct Answer
    D. Botnet
    Explanation
    A botnet is a term used to describe a group of computers that have been infected with malicious code, allowing them to be controlled externally. This network of compromised computers can be used by cybercriminals to carry out various activities, such as launching coordinated attacks, distributing spam emails, or stealing sensitive information. The term "botnet" is derived from the words "robot" and "network," illustrating the automated nature of these infected machines working together under the control of a central command.

    Rate this question:

  • 4. 

    What type of cyber-attack involves attaching other activities to an innocent-seeming link?

    • A.

      Cyberstalking

    • B.

      Clickjacking

    • C.

      Web Boosting

    • D.

      Window Dressing

    Correct Answer
    B. Clickjacking
    Explanation
    Clickjacking is a type of cyber-attack that involves attaching other activities to an innocent-seeming link. In clickjacking, the attacker tricks the user into clicking on a link or button that appears harmless but actually performs a different action, such as downloading malware or granting unauthorized access. This technique allows the attacker to deceive the user and carry out malicious activities without their knowledge or consent.

    Rate this question:

  • 5. 

    A drop in VoIP quality when using many other programs on a PC can be attributed to what?

    • A.

      Buffer Overflow

    • B.

      Processor Drain

    • C.

      Bitmap Collisions

    • D.

      Gremlins

    Correct Answer
    B. Processor Drain
    Explanation
    A drop in VoIP quality when using many other programs on a PC can be attributed to Processor Drain. When a PC is running multiple programs simultaneously, it puts a heavy load on the processor, causing it to slow down and struggle to handle the tasks efficiently. This can result in a decrease in the performance of VoIP applications, leading to a drop in quality.

    Rate this question:

  • 6. 

    What general-purpose Internet encryption protocol, published in 1999, derived from SSL?

    • A.

      AIM

    • B.

      TSA

    • C.

      NSA

    • D.

      TLS

    Correct Answer
    D. TLS
    Explanation
    TLS (Transport Layer Security) is the correct answer because it is a general-purpose Internet encryption protocol that was published in 1999. TLS is derived from SSL (Secure Sockets Layer), which was the predecessor to TLS. TLS is widely used to provide secure communication over the internet, ensuring that data transmitted between a client and a server is encrypted and protected from eavesdropping or tampering.

    Rate this question:

  • 7. 

    What designation is given to the part of the radio spectrum used for wireless networking?

    • A.

      Wi-Fi Control Band

    • B.

      FNS Band

    • C.

      ISM Band

    • D.

      Free Space

    Correct Answer
    C. ISM Band
    Explanation
    The designation given to the part of the radio spectrum used for wireless networking is the ISM Band. ISM stands for Industrial, Scientific, and Medical, and this band is reserved for non-licensed use. It allows for the transmission of signals for various purposes, including wireless networking, without the need for obtaining specific licenses. This band is commonly used for Wi-Fi communication, Bluetooth devices, and other wireless technologies.

    Rate this question:

  • 8. 

    What term refers to using a mouse to initiate a voice communication?

    • A.

      Web Chatter

    • B.

      Click To Call

    • C.

      Instant Voice

    • D.

      Mouse To Meetup

    Correct Answer
    B. Click To Call
    Explanation
    Click To Call refers to using a mouse to initiate a voice communication. This term is commonly used in the context of online communication or customer service, where a user can click on a button or link on a website to directly initiate a phone call with a representative or contact. By clicking on the designated area, the user's call is instantly connected, allowing for immediate voice communication without the need for dialing or manually entering phone numbers.

    Rate this question:

  • 9. 

    What general term is used to describe a program that reports on one computer to another?

    • A.

      Agent

    • B.

      Spy

    • C.

      Debugger

    • D.

      Anti-Virus

    Correct Answer
    A. Agent
    Explanation
    An agent is a general term used to describe a program that reports on one computer to another. Agents are typically used in network management systems to monitor and report on the status and performance of various devices and systems. They can collect data, send it to a central server, and perform various tasks based on the instructions received from the server. Agents are often used in remote monitoring and management scenarios, where they provide real-time information and enable administrators to take appropriate actions.

    Rate this question:

  • 10. 

    What does "PGP" stand for in an early home encryption tool?

    • A.

      Protection Gone Personal

    • B.

      Peerless Grid Protection

    • C.

      Pretty Good Privacy

    • D.

      Personal Gear Privacy

    Correct Answer
    C. Pretty Good Privacy
    Explanation
    PGP stands for Pretty Good Privacy in an early home encryption tool. This encryption tool was developed in 1991 by Phil Zimmermann and was designed to provide secure communication and data encryption. PGP uses a combination of symmetric-key and public-key cryptography to ensure the privacy and integrity of data. It became widely popular as a means to protect sensitive information, such as emails, files, and documents, from unauthorized access and interception.

    Rate this question:

  • 11. 

    What term is used for PC software to emulate telephone functionality via VoIP?

    • A.

      Softphone

    • B.

      IPhone

    • C.

      Telesoft

    • D.

      Phone Substitution

    Correct Answer
    A. SoftpHone
    Explanation
    A softphone is a term used for PC software that emulates telephone functionality via VoIP (Voice over Internet Protocol). It allows users to make and receive phone calls over the internet using their computer instead of a traditional telephone. This software typically includes features such as call management, voicemail, and contact lists, providing a convenient and cost-effective solution for communication.

    Rate this question:

  • 12. 

    A pair of one-way encryption keys, one public and one private, is termed what?

    • A.

      Atypical

    • B.

      Irresolvable

    • C.

      Substandard

    • D.

      Asymmetric

    Correct Answer
    D. Asymmetric
    Explanation
    The correct answer is "Asymmetric." This term refers to a pair of one-way encryption keys, one public and one private, that are used in asymmetric encryption algorithms. In this type of encryption, the public key is used to encrypt data, while the private key is used to decrypt it. The public key can be freely shared, allowing anyone to encrypt messages that only the holder of the private key can decrypt. This provides a secure means of communication and is commonly used in various cryptographic systems.

    Rate this question:

  • 13. 

    In 2008, Dan Kaminsky found a major flaw in what critical networking service?

    • A.

      AIM

    • B.

      DNS

    • C.

      JavaScript

    • D.

      HTML

    Correct Answer
    B. DNS
    Explanation
    In 2008, Dan Kaminsky discovered a significant vulnerability in the DNS (Domain Name System) protocol. This flaw allowed attackers to exploit the way DNS resolves domain names into IP addresses, potentially leading to various malicious activities such as redirecting users to fake websites or intercepting sensitive information. The discovery of this flaw prompted a major effort to patch and secure DNS systems worldwide.

    Rate this question:

  • 14. 

    The revised USB 3.0 standard is expected to be up to how many times faster than USB 2.0?

    • A.

      10

    • B.

      100

    • C.

      3,142

    • D.

      500

    Correct Answer
    A. 10
    Explanation
    The revised USB 3.0 standard is expected to be up to 10 times faster than USB 2.0. This means that data transfer rates will be significantly improved, allowing for faster file transfers and quicker device syncing. USB 3.0 also offers higher power output, making it more efficient for charging devices. Overall, the upgrade to USB 3.0 provides a substantial improvement in speed and performance compared to the previous USB 2.0 standard.

    Rate this question:

  • 15. 

    Used in VoIP, "SIP" is an abbreviation for which protocol?

    • A.

      Server Incident Protocol

    • B.

      Serious Infraction Protocol

    • C.

      Session Initiation Protocol

    • D.

      Service Installation Protocol

    Correct Answer
    C. Session Initiation Protocol
    Explanation
    SIP stands for Session Initiation Protocol, which is a protocol used in VoIP (Voice over Internet Protocol) systems. It is responsible for initiating, modifying, and terminating communication sessions between two or more participants. It is widely used for voice and video calls, instant messaging, multimedia conferences, and other real-time communication applications.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 24, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 16, 2015
    Quiz Created by
    Thames
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.