Computer Technical Support Examination (Tse) Quiz

Reviewed by Godwin Iheuwa
Godwin Iheuwa, MS (Computer Science) |
Database Administrator
Review Board Member
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.
, MS (Computer Science)
By REVLacsamana
R
REVLacsamana
Community Contributor
Quizzes Created: 1 | Total Attempts: 18,733
| Attempts: 18,733 | Questions: 50
Please wait...
Question 1 / 50
0 %
0/100
Score 0/100
1.
What is the shortcut key to Paste?

Explanation

The shortcut key "CTRL + V" is used to paste content. When you copy or cut content using "CTRL + C" or "CTRL + X", the content is stored in the clipboard. By using "CTRL + V", you can paste the content from the clipboard into the desired location.

Submit
Please wait...
About This Quiz
Computer Technical Support Examination (Tse) Quiz - Quiz

Computer technical knowledge is an essential skill to upgrade your career. Take this "Computer Technical Support Examination (TSE) Quiz" to gauge your computer technical knowledge. The quiz contains questions ranging from easy, moderate, to high-level questions that will add to and improve your computer and networking knowledge. The quiz tests... see moreyour knowledge and makes you learn new things about the field. This quiz will help your career by adding to your technical support knowledge. If you like the quiz, share it with your friends and family. All the best!
see less

Tell us your name to personalize your report, certificate & get on the leaderboard!
2.
What button enables the number pad on the keyboard?

Explanation

The Num Lock button enables the number pad on the keyboard. When the Num Lock is turned on, the keys on the number pad function as numbers, allowing the user to input numerical data easily.

Submit
3.
What button enables all letters to be uppercase?

Explanation

The Caps Lock button enables all letters to be uppercase. When this button is pressed, it activates the Caps Lock function, causing all letters to be typed in uppercase until it is turned off. This is useful when typing in all capital letters or when needing to temporarily switch to uppercase for emphasis or specific formatting purposes.

Submit
4.
Which of the following could be an IP address?

Explanation

The given answer, 192.168.1.1, could be an IP address because it follows the standard format of an IP address which consists of four sets of numbers separated by periods. Each set can range from 0 to 255, making it a valid IP address. The other options, 192:168:1:1 and 192,168,1,1, do not follow the correct format for an IP address, so they cannot be valid IP addresses. Therefore, the correct answer is 192.168.1.1.

Submit
5.
Which of the following is not an example of an Operating System?

Explanation

Mozilla Firefox is a web browser, not an operating system. Operating systems, such as Windows Vista, Mac OSX, and Windows 7, are software that manage computer hardware and software resources and provide common services for computer programs.

Submit
6.
Which of the following could not be a valid email address?

Explanation

The email address "edward.cullen'[email protected]" could not be a valid email address because it contains an apostrophe, which is not allowed in email addresses.

Submit
7. You receive a call from an individual who is NOT a customer, she states her friend has an account but forgot his password and had requested her to call and obtain the password for him. She can't verify any of the profile authentication information with you. What should your next course of action be?

Explanation

The correct answer is to inform the caller that the customer will need to call to obtain his password information. This is the appropriate course of action because the caller cannot verify any of the profile authentication information. It is important to prioritize the security and confidentiality of the customer's login information, and directing the caller to the online self-help for login/password issues ensures that the customer can receive the necessary assistance while maintaining the security of their account.

Submit
8.
“Outlook Express” and “Microsoft Outlook 2000” are examples of?

Explanation

"Outlook Express" and "Microsoft Outlook 2000" are examples of email clients. Email clients are software applications that allow users to send, receive, and manage their email messages. These applications provide features such as composing and organizing emails, managing contacts, and accessing multiple email accounts. "Outlook Express" and "Microsoft Outlook 2000" specifically are popular email clients developed by Microsoft.

Submit
9.
What is a caller ID?

Explanation

Caller ID is a telephone service that displays the name and telephone number of the caller on a display as the call is being received. This allows subscribers to identify who is calling before answering the phone.

Submit
10. Which of the following steps is essential when troubleshooting a computer that won't turn on?

Explanation

 When troubleshooting a computer that won't turn on, the first step should be to check if the power cable is properly plugged in. This basic check ensures that the computer is receiving power, which is a fundamental requirement for it to start. Other steps like checking the monitor connection, running an antivirus scan, or updating the operating system are not relevant if the computer itself cannot turn on.

Submit
11.
Spyware can:

Explanation

Spyware is a type of malicious software that is designed to secretly gather sensitive information from a computer without the user's knowledge or consent. It can steal passwords, credit card numbers, and other personal information, which can then be used for fraudulent purposes. This makes it a serious threat to the security and privacy of computer users.

Submit
12.
What DOS Command is used to view IP information

Explanation

IPCONFIG is the correct answer because it is a DOS command used to view IP information. It displays the current configuration of all network interfaces on a computer, including IP address, subnet mask, default gateway, and DNS servers. This command is commonly used for troubleshooting network connectivity issues and checking the IP configuration settings.

Submit
13.
Which of the following is considered a Web Search Engine?

Explanation

Google and Yahoo! are considered web search engines because they are online platforms that allow users to search for information on the internet. They have search algorithms that index web pages and provide relevant search results based on user queries. Outlook Express and Microsoft Outlook are email clients, Internet Explorer and Netscape Communicator are web browsers, and Windows XP and Linux are operating systems, none of which are web search engines.

Submit
14.
What is a protocol?

Explanation

A protocol is a special set of rules that end points in a telecommunication connection use when they communicate. It defines the format, timing, sequencing, and error control of messages exchanged between devices. Protocols ensure that data is transmitted and received accurately and efficiently, allowing devices to communicate effectively with each other.

Submit
15.
Many computers in the household can be connected to an internet service provider at a time

Explanation

This statement is true because multiple computers in a household can indeed be connected to an internet service provider at the same time. This is usually achieved through the use of a router, which allows multiple devices to connect to the internet through a single internet connection. Each device is assigned a unique IP address, allowing them to access the internet simultaneously.

Submit
16.
How do we access Internet Options in Internet Explorer?

Explanation

To access Internet Options in Internet Explorer, you need to go to the Tools menu. This menu typically appears at the top of the browser window and contains various options and settings related to the browser. Within the Tools menu, you should be able to find the Internet Options tab, which allows you to customize and configure various settings for your Internet browsing experience.

Submit
17.
A television system that has more than the usual number of lines per frame so its pictures show more detail:

Explanation

HDTV stands for High Definition Television, which is a television system that has more than the usual number of lines per frame. This allows for a higher resolution and more detailed pictures compared to standard definition television (SDTV) or enhanced definition television (EDTV). HDTV provides a clearer and sharper image quality, making it the preferred choice for high-quality viewing experiences. CCTV, on the other hand, stands for Closed-Circuit Television and refers to a surveillance system rather than a television system.

Submit
18.
The term used to differentiate standard telephone calls from telephone calls that are made and received over the Internet

Explanation

VoIP stands for Voice over Internet Protocol, which is a technology that allows telephone calls to be made and received over the Internet. It is used to differentiate standard telephone calls from calls made and received over the Internet. IPTV refers to Internet Protocol Television, which is a system for delivering television services over the Internet. POTS stands for Plain Old Telephone Service, which refers to traditional analog telephone service. Therefore, the correct answer is VoIP.

Submit
19.
What is the shortcut key to Cut?

Explanation

The shortcut key CTRL + X is used to cut selected text or objects. Cutting removes the selected content from its original location and stores it in the clipboard. This action is commonly used to move or transfer content to a different location within a document or to another document entirely.

Submit
20.
What are COOKIES?

Explanation

Cookies are small pieces of text that are stored on a user's computer by a web browser. These cookies contain the user's settings, shopping cart contents, or other data used by websites. They are used to enhance the user experience by remembering preferences and speeding up certain computer operations.

Submit
21.
Which of the following applications is often required in order to view animated webpages?

Explanation

Macromedia Flash Player is often required to view animated webpages. Flash Player is a multimedia software platform that enables the playback of interactive content, including animations, videos, and games, on web browsers. It is widely used for creating and viewing animated content on websites. Without Flash Player, the animations on webpages would not be able to play or be displayed properly.

Submit
22.
What is call forwarding?

Explanation

Call forwarding is a telephone service that allows incoming calls to be automatically redirected to another extension or phone number. This feature is useful when a person is unavailable or wants to forward calls to a different location or device. It enables customers to manage their calls and ensure they don't miss important communications.

Submit
23.
Adware can:

Explanation

Adware is a type of malicious software that is designed to generate endless pop-up advertisements and slow down the performance of a web browser. It does not increase the speed of a computer or allow the user to download videos from the internet. Additionally, while adware can be intrusive and annoying, it does not typically steal sensitive information such as passwords from a computer.

Submit
24. Which of the following is an example of a web browser?

Explanation

Internet Explorer is an example of a web browser. It is a software application that allows users to access and navigate the internet. It is specifically designed to display websites and webpages, interpret HTML code, and render the content for users to view. Internet Explorer was one of the most popular web browsers before being replaced by Microsoft Edge.

Submit
25.
What is call waiting?

Explanation

Call waiting is a telephone service that alerts the user to an incoming call while they are already on a call. It allows the user to put the current call on hold and switch to the new incoming call. This feature ensures that the user does not miss any important calls and can manage multiple calls efficiently.

Submit
26.
What feature of a Windows Operating System allows the user to view the list of peripherals installed in a computer?

Explanation

The Device Manager is a feature in a Windows Operating System that allows the user to view the list of peripherals installed in a computer. It provides a detailed view of all the hardware devices connected to the computer, such as printers, scanners, keyboards, and mice. The Device Manager also allows the user to manage and troubleshoot any issues related to these peripherals, such as updating drivers or disabling devices.

Submit
27.
What mark will appear in the Windows peripheral if the device is disabled?

Explanation

When a device is disabled in Windows, a red "X" mark will appear in the Windows peripheral. This indicates that the device is currently not functioning or unavailable. The red "X" mark is commonly used as a symbol to represent a disabled or inactive device in Windows.

Submit
28.
A WLAN connection is

Explanation

The correct answer is A, a wireless connection using radio waves. This is because WLAN stands for Wireless Local Area Network, and it uses radio waves to connect devices to the internet or to other devices within a specific area. This type of connection allows for flexibility and mobility as it does not require physical cables to connect devices.

Submit
29.
What is a CACHE?

Explanation

A cache is used to speed up certain computer operations by temporarily placing data, or a copy of it, in a location where it can be accessed more rapidly than normal.

Submit
30.
Which of the following use(s) SMTP and POP3 as its protocol?

Explanation

Outlook Express or Microsoft Outlook uses SMTP (Simple Mail Transfer Protocol) for sending emails and POP3 (Post Office Protocol 3) for receiving emails. These protocols allow the email client to communicate with the email server and perform the necessary actions for sending and receiving emails.

Submit
31.
A type of broadband connection that uses phone lines as a medium:

Explanation

DSL (Digital Subscriber Line) broadband is a type of broadband internet connection that uses existing telephone lines to transmit digital data. It allows for high-speed internet access over these traditional copper phone lines.

Submit
32.
Which of the following can not be used to connect a cable box to a television?

Explanation

The RJ-45 cable cannot be used to connect a cable box to a television. RJ-45 cables are typically used for Ethernet connections, while coaxial and RCA cables are commonly used for audio and video connections. Therefore, the RJ-45 cable is not compatible with connecting a cable box to a television.

Submit
33.
What mark will appear in the Windows peripheral if the device has conflicts?

Explanation

When a device has conflicts in Windows, an exclamation mark will appear in the Windows peripheral. This symbol indicates that there is an issue with the device and it is not functioning properly. The exclamation mark serves as a warning sign to the user that they need to troubleshoot and resolve the conflicts in order to restore normal functionality.

Submit
34.
Which of the following is not a purpose of an internet firewall?

Explanation

An internet firewall is designed to block unauthorized access to a computer, restrict access to a network, and control inbound traffic from a user or program. However, hiding the identity of the user is not a purpose of an internet firewall. Firewalls primarily focus on protecting the system and network from external threats, rather than concealing the user's identity.

Submit
35.
Which does not describe a public network:

Explanation

Option C, "Local Area Network," does not describe a public network. A Local Area Network (LAN) typically refers to a network that is limited to a small geographic area, such as a home, office, or campus. It is not inherently public, as it is usually privately owned and operated by an organization or individual for their own use. Public networks, on the other hand, are accessible to devices outside the network, and they can include Wide Area Networks (WANs) as well as the internet. Therefore, option C does not fit the description of a public network.

Submit
36.
Which of the following use(s) HTTP as its protocol?

Explanation

Both Internet Explorer and Netscape Navigator use HTTP as their protocol. HTTP (Hypertext Transfer Protocol) is the protocol used for transferring data over the internet. Internet Explorer and Netscape Navigator are web browsers, which allow users to access and view websites on the internet. These browsers communicate with web servers using HTTP to request and receive web pages, images, and other resources. Microsoft Outlook, on the other hand, is an email client and does not use HTTP as its protocol.

Submit
37.
A required device used to connect to an ISP Network.

Explanation

A modem is the correct answer because it is a device that is used to connect to an ISP network. A modem converts the digital signals from a computer into analog signals that can be transmitted over telephone lines or cable lines, allowing the computer to access the internet through the ISP network. Switches, routers, and hubs are networking devices that are used to connect multiple devices within a local network, but they are not specifically used to connect to an ISP network.

Submit
38.
What is the shortcut key to Redo?

Explanation

The shortcut key to redo in most applications is CTRL + Y. This key combination allows the user to reverse the previous undo action and restore the changes that were undone. It is a convenient way to quickly redo an action without having to navigate through menus or use the mouse.

Submit
39.
What mark will appear in the Windows peripheral if the device is not installed properly?

Explanation

The mark that appears in the Windows peripheral if the device is not installed properly is typically an "Exclamation Mark." This mark indicates that there is an issue or problem with the device, such as a driver error or hardware malfunction.

Submit
40. What is the first step you should take when troubleshooting a computer that won't start?

Explanation

When a computer does not start, the initial step in troubleshooting should involve checking the most basic potential issues before moving to more complex diagnostics. This includes ensuring that the computer is properly plugged into a power source and that the power switch is turned on. This step helps to rule out any simple power supply issues that might be preventing the computer from starting.

Submit
41. If New York time is three hours ahead of San Francisco time, what time would it be in New York if a San Francisco clock is one hour behind, the time shows 4 o'clock?

Explanation

If the San Francisco clock is one hour behind and shows 4 o'clock, then the actual time in San Francisco would be 5 o'clock. Since New York time is three hours ahead of San Francisco time, the time in New York would be 8 o'clock.

Submit
42.
Most of the Montano family lives in Cebu City. Many of the people in Cebu City celebrate Sinulog Festival. Cesar is a member of the Montano family. Based on these facts, we can conclude that:

Explanation

Based on the information given, it is stated that "Most" of the Montano family lives in Cebu City, but it does not necessarily mean that Cesar is part of the majority. Additionally, it is mentioned that "Many" people in Cebu City celebrate Sinulog Festival, but it does not imply that Cesar does not celebrate it. Therefore, we cannot conclude whether Cesar lives in Cebu City or if he celebrates Sinulog Festival.

Submit
43. Bella must use EDSA to get to work. Bella has a meeting today at 9:00 AM. If Bella misses the meeting, she probably will lose a major account. EDSA is closed all day due to repairs. Based on the above, we can conclude that:

Explanation

Bella needs to use EDSA to get to work, but it's closed all day for repairs. She has a crucial meeting at 9:00 AM, and missing it could result in losing a major account. Since EDSA's closure prevents her from getting to work on time, it is reasonable to conclude that Bella will miss the meeting and, consequently, lose the major account. Other conclusions cannot be definitively drawn from the given information.

Submit
44.
Which menu option would you select in Outlook Express to add a new account?

Explanation

In Outlook Express, a new email account is added through the "Tools" menu. Upon opening the application, users navigate to the menu bar at the top and select "Tools," which leads them to a dropdown menu offering various options. Among these options is one related to "Accounts" or "Account Settings." Clicking on this option opens a window where users can manage their email accounts. Within this window is typically an option to add a new account. Users follow the provided prompts to input the necessary information for the new email account. Overall, accessing the "Tools" menu in Outlook Express is the primary way to add a new email account to the application.

Submit
45.
Which of the following supports Standard Definition?

Explanation

Coaxial cable supports Standard Definition (SD) as it is commonly used to transmit television signals, including SD video, from broadcast antennas, cable television, and satellite television. While component cables can also support SD, coaxial cable is more traditionally associated with SD video signals. Ethernet and USB are used for digital data transmission and are not specifically tied to Standard Definition video transmission.

Submit
46.
Which does not describe an "Aspect Ratio"?

Explanation

All the provided choices correctly describe what an "Aspect Ratio" is, and thus the correct selection is "None of the Above," meaning that none of the statements fail to describe an aspect ratio. 

Submit
47.
What does 802.11g mean?

Explanation

802.11g is a standard for WLANs (Wireless Local Area Network) that allows for wireless transmission over relatively short distances at a maximum speed of 54 Mbps. This standard provides a faster data transfer rate compared to previous standards like 802.11b, making it suitable for applications that require higher bandwidth such as video streaming or online gaming.

Submit
48.
Which does not describe a Wireless Access Point?

Explanation

A wireless access point is a device that allows wired communication devices to connect to a wireless network using Wi-Fi, Bluetooth, or related standards. It usually connects to a router. However, it cannot be a modem as modems are used for different purposes, such as converting analog signals to digital signals for internet connectivity. Therefore, the statement "Could also be a modem" does not describe a wireless access point.

Submit
49.
Which of the following supports High Definition?

Explanation

All of the options listed (HDMI, Component, and DVI) support High Definition. HDMI (High-Definition Multimedia Interface) is a digital interface that supports high-quality audio and video transmission. Component cables can also support high-definition video signals, typically using three separate cables for video and two for audio. DVI (Digital Visual Interface) is another digital video interface that can transmit high-definition video signals. Therefore, all three options mentioned can support High Definition.

Submit
50.
Which of the following is not a function of a voicemail?

Explanation

Voicemail systems are primarily designed to handle incoming calls when the recipient is unavailable to answer. They allow callers to leave voice messages, which can be recorded, saved, and later retrieved by the intended recipient. Voicemail systems typically do not include a paging feature, which is more commonly associated with intercom systems or separate paging devices. Therefore, option C, "use for paging the user," is not a function of a voicemail system.

Submit
View My Results
Godwin Iheuwa |MS (Computer Science) |
Database Administrator
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.

Quiz Review Timeline (Updated): Jul 11, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 11, 2024
    Quiz Edited by
    ProProfs Editorial Team

    Expert Reviewed by
    Godwin Iheuwa
  • Nov 15, 2010
    Quiz Created by
    REVLacsamana
Cancel
  • All
    All (50)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is the shortcut key to Paste?
What button enables the number pad on the keyboard?
What button enables all letters to be uppercase?
Which of the following could be an IP address?
Which of the following is not an example of an Operating System?
Which of the following could not be a valid email address?
You receive a call from an individual who is NOT a customer, she...
“Outlook ...
What is a caller ID?
Which of the following steps is essential when troubleshooting a...
Spyware can:
What DOS Command is used to view IP information
Which of the following is considered a Web Search Engine?
What is a protocol?
Many ...
How do we access Internet Options in Internet Explorer?
A ...
The term used to differentiate standard telephone calls from telephone...
What is the shortcut key to Cut?
What are COOKIES?
Which ...
What is call forwarding?
Adware can:
Which of the following is an example of a web browser?
What is call waiting?
What ...
What mark will ...
A WLAN connection is
What is a CACHE?
Which of the following use(s) SMTP and POP3 as its protocol?
A type of broadband connection that uses phone lines as a medium:
Which of the following can not be used to connect a cable box to a...
What mark will ...
Which of the following is not a purpose of an internet firewall?
Which does not describe a public network:
Which of the following use(s) HTTP as its protocol?
A required device used to connect to an ISP Network.
What is the shortcut key to Redo?
What mark will appear in the Windows peripheral if the device is not...
What is the first step you should take when troubleshooting a computer...
If New York time is three hours ahead of San Francisco time, what time...
Most ...
Bella must use EDSA to get to work. Bella has a meeting today at 9:00...
Which menu option would you select in Outlook Express to add a new...
Which of the following supports Standard Definition?
Which does not describe an "Aspect Ratio"?
What does 802.11g mean?
Which does not describe a Wireless Access Point?
Which of the following supports High Definition?
Which of the following is not a function of a voicemail?
Alert!

Advertisement