1.
What is backup?
Correct Answer
B. Protecting data by copying it from the original source to a different destination
Explanation
Backup refers to the process of protecting data by creating a copy of it from the original source and storing it in a different location. This is done to ensure that in case of any data loss or damage to the original source, the backup copy can be used to restore the data. It acts as a safeguard against accidental deletion, hardware failure, natural disasters, or any other potential risks that may result in data loss. By making a duplicate copy of the data, backup helps to ensure data availability and reliability.
2.
The legal right to use software based on specific restrictions is granted via a
Correct Answer
B. Software license
Explanation
A software license is a legal agreement between the software developer and the end user that grants the user the right to use the software under specific terms and conditions. This agreement outlines the restrictions on how the software can be used, distributed, and modified. By obtaining a software license, the user gains the legal right to use the software while adhering to the specified restrictions. A software privacy policy, software password manager, and software log are not directly related to granting the right to use software.
3.
What is an e-mail attachment?
Correct Answer
B. A separate document from another program sent along with an e-mail
Explanation
An e-mail attachment refers to a separate document from another program that is sent along with an e-mail. This document can be a file, such as a Word document, PDF, image, or any other type of file that is attached to the e-mail message. It allows the sender to share additional information or files with the recipient that are relevant to the content of the e-mail.
4.
Which of the following is the type of software that controls the internal operations in the computer and controls how the computer works with all its parts?
Correct Answer
D. Operating system software
Explanation
Operating system software is the correct answer because it is the type of software that controls the internal operations in the computer and manages how the computer works with all its parts. It provides a platform for other software applications to run on the computer and manages system resources such as memory, storage, and input/output devices. It also provides a user interface for users to interact with the computer and coordinates the execution of various tasks and processes.
5.
When data changes in multiple lists and all lists are not updated, this causes
Correct Answer
E. Data inconsistency
Explanation
When data changes in multiple lists and all lists are not updated, it leads to data inconsistency. This means that the data in different lists or databases becomes different or contradictory, causing confusion and inaccuracies. Data inconsistency can result in incorrect analysis, decision-making, and overall inefficiency in data management.
6.
What is the main folder on a storage device called?
Correct Answer
A. Root directory
Explanation
The main folder on a storage device is called the root directory. This directory is the top-level directory that contains all other files and folders on the storage device. It serves as the starting point for navigating and organizing the files and folders within the storage device.
7.
To view information on the Web you must have a
Correct Answer
B. Web browser
Explanation
A web browser is the software application that allows users to access and view information on the web. It is the interface between the user and the internet, enabling them to navigate websites, view web pages, and interact with online content. Without a web browser, users would not be able to access or view any information on the web. A cable modem, domain name server, and hypertext viewer are all components that facilitate internet connectivity and web browsing, but none of them alone can fulfill the requirement of accessing and viewing information on the web.
8.
A file is often referred to as a
Correct Answer
B. Document
Explanation
A file is often referred to as a document because it is a collection of data or information that is stored and organized in a specific format. Just like a document, a file can contain text, images, tables, and other types of content. Additionally, files are typically used for recording and storing information in a digital format, similar to how a document is used to record and store information on paper. Therefore, referring to a file as a document is an appropriate and commonly used term.
9.
To protect yourself from computer hacker intrusions you should instal a
Correct Answer
A. Firewall
Explanation
A firewall is a security measure that helps protect computer systems from unauthorized access and intrusions by monitoring and controlling incoming and outgoing network traffic. It acts as a barrier between a trusted internal network and an untrusted external network, filtering out potentially harmful or malicious data packets. By installing a firewall, users can prevent hackers from gaining unauthorized access to their systems and reduce the risk of data breaches and cyber attacks. It is an essential component of a comprehensive cybersecurity strategy.
10.
What type of computers are client. computers (most of the time) in a client-server system?
Correct Answer
A. Mainframe
Explanation
Client computers in a client-server system are not typically mainframe computers, mini-computers, or PDAs. Instead, they are usually microcomputers. Microcomputers, also known as personal computers, are the most common type of client computers used in a client-server system. They are smaller, less powerful computers that are designed for individual use and are connected to a larger server to access resources and services.
11.
What happens when you boot up a PC?
Correct Answer
A. Portions of the operating system are copied from disk into memory
Explanation
When you boot up a PC, portions of the operating system are copied from the disk into the computer's memory. This is necessary because the operating system needs to be loaded into memory in order to function properly. By copying the operating system into memory, the PC can access and execute the necessary instructions and data to start up and run various software applications.
12.
Linux is an example of
Correct Answer
B. Open source software
Explanation
Linux is an example of open source software because it is a free and open operating system that allows users to view, modify, and distribute its source code. Being open source means that anyone can access and modify the code, which promotes collaboration and innovation within the Linux community. This distinguishes it from freeware, which is software that is available for free but does not necessarily allow users to modify or distribute its source code. Shareware refers to software that is initially provided for free but requires payment for continued use, while complimentary simply means something given for free.
13.
Which of the following software applications would be the most appropriate for performing numerical and statistical calculations?
Correct Answer
D. Spreadsheet
Explanation
A spreadsheet would be the most appropriate software application for performing numerical and statistical calculations. Spreadsheets are designed specifically for organizing and manipulating numerical data, making them ideal for performing calculations, creating formulas, and generating statistical analysis. They provide a grid-like structure that allows for easy input and manipulation of data, as well as the ability to perform complex mathematical functions and generate charts and graphs. Additionally, spreadsheets offer features like sorting, filtering, and data validation, which are essential for working with numerical and statistical data effectively.
14.
A is used to' read handwritten or printed text to make a digital image that is stored in memory.
Correct Answer
C. Scanner
Explanation
A scanner is used to read handwritten or printed text to make a digital image that is stored in memory. It is a device that uses optical technology to capture an image of a document or photo and convert it into a digital format. This digital image can then be stored, edited, or shared electronically. Scanners are commonly used in offices, libraries, and homes for tasks such as scanning documents, creating digital copies of photos, or converting physical documents into editable text through optical character recognition (OCR) technology.
15.
You organise files by storing them in
Correct Answer
D. Folders
Explanation
Files are commonly organized and stored in folders. Folders act as containers that hold related files together, making it easier to locate and manage them. By grouping files into folders, users can create a hierarchical structure, allowing for better organization and efficient retrieval of files when needed. This method of organizing files is widely used in computer systems to maintain order and accessibility.
16.
A is a pre-designed document that already has coordinating fonts, a layout, and a background.
Correct Answer
D. Template
Explanation
A template is a pre-designed document that already has coordinating fonts, a layout, and a background. It serves as a starting point for creating new documents, as it provides a consistent design and format. Templates are commonly used in various applications, such as word processors, graphic design software, and website builders, to save time and ensure consistency in the appearance of documents or designs.
17.
What is the default file extension for all Word documents?
Correct Answer
C. DOC
Explanation
The default file extension for all Word documents is DOC. This file extension is used by Microsoft Word to save and identify its documents.
18.
Removing and replacing devices without turning off your computer is referred to as
Correct Answer
B. Plug-n-Play
Explanation
Removing and replacing devices without turning off the computer is referred to as Plug-n-Play. This feature allows devices to be connected or disconnected while the computer is still running, without the need for manual configuration or restarting the system. Plug-n-Play technology enables easy installation and use of various peripherals, such as USB devices, printers, and external hard drives, by automatically detecting and configuring them. It simplifies the process of adding or removing hardware components, making it convenient for users to expand or upgrade their computer systems.
19.
Specialised programs that assist users' in locating information on the Web are called
Correct Answer
E. Search engines
Explanation
Search engines are specialized programs that assist users in locating information on the web. They use algorithms to search and index web pages, making it easier for users to find relevant information by entering keywords or phrases. Unlike web browsers, which are software applications used to access and view websites, search engines specifically focus on retrieving and organizing information from the internet. Resource locators and information engines are not commonly used terms to refer to search engines, making them incorrect options.
20.
Compiling creates a(n)
Correct Answer
E. Executable program
Explanation
Compiling is the process of converting human-readable code into machine-readable instructions. When a program is compiled, it is checked for syntax errors and other issues, and if there are no errors, an executable program is generated. An executable program is a file that can be directly run by the computer's operating system, allowing the program to be executed and perform its intended tasks. Therefore, the correct answer is "executable program".
21.
Expansion cards are inserted into
Correct Answer
A. Slots
Explanation
Expansion cards are inserted into slots. These slots are typically found on the motherboard of a computer. Expansion cards are used to add extra functionality to a computer system, such as graphics cards, sound cards, or network cards. By inserting these cards into the available slots, users can enhance the capabilities of their computer and customize it according to their specific needs.
22.
A device that connects to a network without the use of cable is said to be
Correct Answer
E. Wireless
Explanation
A device that connects to a network without the use of cable is said to be wireless. This means that it can communicate and transfer data over a network using radio waves or other wireless signals, eliminating the need for physical cables. Wireless devices are commonly used in modern technology, such as smartphones, laptops, and Wi-Fi routers, allowing for convenient and flexible connectivity.
23.
A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n)
Correct Answer
D. Integrated circuit
Explanation
An integrated circuit refers to a complete electronic circuit that is built on a small silicon chip and includes transistors and other electronic components. This technology allows for the miniaturization of electronic circuits, making them more efficient and compact. Integrated circuits are commonly used in various electronic devices, such as computers, smartphones, and other electronic systems, due to their small size and high functionality.
24.
Junk e-mail is also called
Correct Answer
E. Spam
Explanation
Junk e-mail is commonly referred to as "spam." This term originated from a Monty Python sketch where a group of Vikings repeatedly sang the word "spam," overpowering all other conversation. Similarly, spam emails flood our inboxes, overwhelming legitimate messages with unwanted and often unsolicited content. Hence, the correct answer is "spam."
25.
A program designed to destroy data on your computer which can travel to "infect" other computers is called a
Correct Answer
D. Virus
Explanation
A program designed to destroy data on your computer which can travel to "infect" other computers is called a virus. Viruses are malicious software that can replicate themselves and spread to other computers, causing damage to files, programs, and the overall system. They can be introduced through various means, such as email attachments, downloads from untrusted sources, or infected external devices. Once a virus infects a computer, it can execute its destructive actions, potentially leading to data loss, system crashes, and other harmful consequences.
26.
shows the files, folders, and drives on your computer, making it easy to navigate from one location to another within the file hierarchy.
Correct Answer
B. Windows Explorer
Explanation
Windows Explorer is a file management tool provided by Microsoft that allows users to navigate through the files, folders, and drives on their computer. It provides a graphical interface to easily access and manage files, making it convenient to move from one location to another within the file hierarchy. It is different from Internet Explorer, which is a web browser, and My Computer, which is a window that displays the available drives on the computer. Folders Manager and Windows Locator are not commonly used terms and do not accurately describe the functionality of Windows Explorer.
27.
The manual tells you how to use a software program.
Correct Answer
C. User
Explanation
The manual provides instructions on how to use a software program, making it a valuable resource for the end-user. It helps them understand the functionality and features of the program, allowing them to navigate and utilize it effectively. The manual may include step-by-step guides, troubleshooting tips, and other relevant information to enhance the user's experience and ensure they can make the most out of the software.
28.
A collection of interrelated records is called a
Correct Answer
C. Database
Explanation
A collection of interrelated records is called a database. A database is a structured set of data stored and organized in a way that allows for efficient retrieval, updating, and management of the information. It is designed to store and manage large amounts of data, allowing users to easily access and manipulate the data for various purposes.