1.
It's a type of computer threat.
Correct Answer
A. Trojan horse
Explanation
A Trojan horse is a type of computer threat that disguises itself as a legitimate program or file, but once installed, it can carry out malicious activities without the user's knowledge. It can steal personal information, damage files, or allow unauthorized access to the computer. Unlike viruses or worms, Trojan horses do not replicate themselves, but they can be just as harmful. It is important to have proper security measures in place, such as antivirus software and regular updates, to protect against Trojan horse attacks.
2.
HTTP stands for:
Correct Answer
E. Hyper text transfer protocol
Explanation
HTTP stands for Hyper Text Transfer Protocol. It is a protocol used for transmitting hypertext over the internet. Hypertext refers to text that contains links to other texts, allowing users to navigate between different documents or web pages. The HTTP protocol defines how messages are formatted and transmitted, as well as how web browsers and servers should respond to various requests and commands. It is the foundation of data communication for the World Wide Web.
3.
Html stands for
Correct Answer
D. Hyper text markup language
Explanation
HTML stands for Hyper Text Markup Language. It is a standard markup language used for creating web pages and applications. HTML uses tags to structure the content and define the layout and appearance of the web page. It is the backbone of every web page and is responsible for defining the structure and elements of the page, such as headings, paragraphs, images, links, and more.
4.
What's the name of this hardware?
Correct Answer
C. Floppy disk
Explanation
The correct answer is "floppy disk" because a floppy disk is a type of hardware that was commonly used for data storage in the past. It is a portable, magnetic storage device that consists of a thin, flexible disk enclosed in a protective plastic casing. The floppy disk drive is the device used to read and write data onto the floppy disk.
5.
It´s a collection of information gathered in tables and forms:
Correct Answer
B. Database
Explanation
A database is a collection of information gathered in tables and forms. It is a structured way of organizing and storing data, allowing users to easily retrieve and manipulate the information. Unlike other options such as a group, groupwise, hard drive, or my documents, a database specifically refers to a system designed for efficient data management.
6.
It´s a type of compressed file:
Correct Answer
C. Zip
Explanation
A zip file is a type of compressed file that is commonly used to compress and package multiple files or folders into a single archive. This archive can then be easily transferred or stored, taking up less space. Zip files are widely supported and can be opened on various operating systems. They are often used for file compression and distribution purposes.
7.
Is a form of computer data storage. Today, it takes the form of integrated circuits that allow stored data to be accessed in any order (i.e., at random). "Random" refers to the idea that any piece of data can be returned in a constant time, regardless of its physical location and whether or not it is related to the previous piece of data.
Correct Answer
D. RAM
Explanation
RAM stands for Random Access Memory, which is a form of computer data storage. It is different from other forms of memory like ROM or DVDs because it allows stored data to be accessed in any order, hence the term "random". This means that any piece of data can be retrieved in a constant time, regardless of its physical location or its relation to previous data. RAM is commonly used in computers and other electronic devices as a temporary storage for data that is actively being used by the system or applications.
8.
He is a person who likes to spy in chat rooms
Correct Answer
E. Lurker
Explanation
A lurker is someone who observes or reads conversations in online chat rooms or forums without actively participating or engaging in the discussions. This person prefers to remain anonymous and simply "lurk" in the background, gathering information or observing others without actively contributing. This behavior is often associated with individuals who enjoy spying or monitoring online interactions without directly participating themselves.
9.
It´s a windows application that blocks access to unwanted programs and stablish privilegies to known programs.
Correct Answer
A. Firewall
Explanation
A firewall is a type of software or hardware that acts as a barrier between a computer network and the internet, monitoring and controlling incoming and outgoing network traffic. It blocks access to unwanted programs, preventing unauthorized access and potential security threats. It also allows the user to establish privileges for known programs, giving them specific access rights.
10.
It´s a known place or website that the user assigns in the favorites menu to have easy access to it later.
Correct Answer
D. Bookmark
Explanation
A bookmark is a known place or website that a user saves in their favorites menu for easy access later. It allows the user to quickly navigate to their preferred websites without having to search for them again. The term "bookmark" is commonly used to refer to this feature in web browsers.
11.
It´s a type of ISP (Internet Service Provider)
Correct Answer
A. DSL
Explanation
DSL stands for Digital Subscriber Line, which is a type of Internet Service Provider. DSL uses existing telephone lines to provide high-speed internet access to users. It works by transmitting digital data over the copper wires of a telephone line, allowing users to access the internet while still being able to use their telephone for voice calls. DSL is a popular choice for residential and small business users who require a reliable and fast internet connection.
12.
It's a type of computer threat where a fake page takes the identity of another pushing the user to provide his password and username in order to send it to another computer.
Correct Answer
E. pHishing
Explanation
Phishing is a type of computer threat where a fake page is created to mimic a legitimate website or service. The intention is to deceive the user into providing their personal information, such as passwords and usernames, which are then sent to the attacker's computer. This is a form of social engineering attack where the user is tricked into thinking they are interacting with a trusted entity. It is important to be cautious and verify the legitimacy of websites before entering sensitive information to protect against phishing attacks.
13.
It's a system consisting on "0" and "1" only
Correct Answer
B. Binary
Explanation
The given system consisting of "0" and "1" only is commonly known as the binary system. In this system, numbers are represented using only two digits, 0 and 1. Each digit in a binary number represents a power of 2. This system is widely used in computer science and digital electronics because it aligns well with the binary nature of electronic circuits, where 0 represents off state and 1 represents on state.
14.
It's a type of software that allows you to transfer printed text to a text editor
Correct Answer
D. Ocr
Explanation
OCR stands for Optical Character Recognition, which is a technology used to convert printed or handwritten text into editable digital text. It allows users to transfer printed text from documents, images, or scanned copies into a text editor or word processing software. OCR software uses algorithms to analyze the shapes and patterns of characters, recognizing and converting them into text that can be edited, searched, or stored digitally. This technology is commonly used in various applications like document scanning, data entry, and text extraction from images.
15.
It´s a relationship between two files through a word you can click on:
Correct Answer
A. Hyperlink
Explanation
A hyperlink is a word or phrase that can be clicked on in a document or webpage to navigate to another location or file. It establishes a relationship between two files by allowing the user to easily access related information. This feature is commonly used in HTML documents and web browsers to create a connected network of webpages.
16.
It's a common error that appears when a page has not been found.
Correct Answer
D. 404
Explanation
The correct answer is 404. This error code is commonly displayed when a webpage cannot be found. It indicates that the requested page does not exist on the server. This can occur due to various reasons such as a broken link, incorrect URL, or the page being removed or relocated. The server responds with a 404 error to inform the user that the requested resource is not available.
17.
It is designed to search for information on the World Wide Web. The search results are usually presented in a list of results and are commonly called hits. The information may consist of web pages, images, information and other types of files
Correct Answer
D. Search engine
Explanation
A search engine is a tool or software program that is specifically created to search for information on the World Wide Web. It retrieves and presents search results in the form of a list of hits, which can include web pages, images, information, and other types of files. Unlike other options listed, such as a search page, search lab, finding site, or yellow pages, a search engine is specifically designed for web searches and is the most appropriate term to describe this function.
18.
What´s the name of the microsoft application to create databases?
Correct Answer
D. Access
Explanation
Access is the correct answer because it is a Microsoft application specifically designed for creating and managing databases. It allows users to store, organize, and retrieve large amounts of data efficiently. Publisher, OneNote, Picture Viewer, and Lotus are not database creation applications.
19.
What´s number 49 in binary?
Correct Answer
E. 110001
Explanation
The binary number system is a base-2 system, meaning it only uses two digits: 0 and 1. To convert decimal number 49 to binary, we divide it by 2 repeatedly and record the remainders. Starting from the right, the remainders are 1, 0, 0, 0, 1, 1. Reversing the order gives us the binary representation 110001. Therefore, the correct answer is 110001.
20.
What´s number 88 in binary?
Correct Answer
B. 1011000
Explanation
The given binary number 1011000 is equivalent to the decimal number 88. In binary, each digit represents a power of 2, starting from the rightmost digit as 2^0, then 2^1, 2^2, and so on. By adding up the decimal values of the digits that are 1, we get 64 + 16 + 8 = 88. Therefore, the binary number 1011000 is equivalent to the decimal number 88.
21.
What´s number 33 in binary?
Correct Answer
C. 100001
Explanation
The correct answer is 100001. This is the binary representation of the decimal number 33. In binary, each digit represents a power of 2, starting from the rightmost digit. So, reading from right to left, the first digit represents 2^0 (which is 1), the second digit represents 2^1 (which is 2), the third digit represents 2^2 (which is 4), and so on. Adding up the values of the digits in the binary representation of 100001, we get 1 + 0 + 0 + 0 + 0 + 32, which equals 33. Therefore, 100001 is the binary representation of 33.
22.
What is the name of the following cable?
Correct Answer
C. SATA
Explanation
The correct answer is SATA. SATA stands for Serial Advanced Technology Attachment and it is a type of cable used to connect storage devices such as hard drives and solid-state drives to a computer's motherboard. It replaced the older PATA (Parallel ATA) cable, offering faster data transfer speeds and improved performance. SATA cables are typically red in color, but the color alone is not a reliable indicator of the cable type.
23.
What´s the name of this cable?
Correct Answer
D. USB
Explanation
The correct answer is USB. USB stands for Universal Serial Bus, and it is a common cable used for connecting various devices to a computer. It is used for transferring data, charging devices, and connecting peripherals such as keyboards, mice, and printers. USB cables have become widely adopted due to their versatility and compatibility with a wide range of devices.
24.
Unwanted email is also called:
Correct Answer
D. Spam
Explanation
Unwanted email is commonly referred to as "spam". Spam emails are unsolicited messages sent in bulk to a large number of recipients, often for advertising purposes. These emails are typically sent without the consent of the recipients and can be annoying or potentially harmful. Therefore, "spam" is the correct term used to describe unwanted emails.
25.
Who created the first virus?
Correct Answer
D. Two brothers in Pakistan
Explanation
The correct answer is "Two brothers in Pakistan." This explanation suggests that the first virus was created by two brothers in Pakistan. It implies that the individuals responsible for creating the first virus were not affiliated with NASA, the Taliban, Bill Gates, or Steve Jobs.
26.
What is the name of the following device?
Correct Answer
E. CRT
Explanation
The correct answer is CRT. CRT stands for Cathode Ray Tube, which is a device used in older televisions and computer monitors to display images. It works by using an electron beam to illuminate phosphors on a screen, creating the images that we see. LCD, DSL, PLS, and UPS are not the names of this device and are unrelated to CRT technology.
27.
What's the name of the following port?
Correct Answer
A. Serial
Explanation
Serial is the correct answer because it is a type of port used for transferring data one bit at a time. It is commonly used for connecting devices such as modems, printers, and mice to a computer. Serial ports are characterized by their small size and use of a serial cable with multiple pins. This distinguishes it from parallel ports, USB ports, HDMI ports, and firewire ports, which have different functionalities and physical characteristics.
28.
What type of device is this?
Correct Answer
A. Output
Explanation
This device is an output device because it is used to display or provide information to the user.
29.
Which symbols must be used in this fields?
Correct Answer
A. " " and ;
Explanation
The correct answer is " " and ;. These symbols are commonly used in fields where multiple values or options need to be separated or indicated. The symbol " " (space) is used to separate words or values, while the symbol ; (semicolon) is used to separate multiple values or options within a field. These symbols help to organize and differentiate the information in the field, making it easier to read and understand.
30.
What type of device is this?
Correct Answer
A. Input
Explanation
This device is classified as an input device because it is used to input data or information into a computer or electronic system.