1.
A secret word or phrase used to access information stored on a computer or computer network.
Correct Answer
C. Password
Explanation
A password is a secret word or phrase that is used to gain access to information stored on a computer or computer network. It is a form of authentication, as it verifies the identity of the user and allows them to access the desired information. By entering the correct password, the user proves that they are authorized to access the system or network, ensuring the security and privacy of the stored data.
2.
A system of computers linked together to share data, software, and hardware.
Correct Answer
A. Network
Explanation
A network is a system of computers that are connected to each other in order to share data, software, and hardware resources. This allows for efficient communication and collaboration between different devices within the network.
3.
This is the most common port for attaching peripherals onto a PC. iPods, Zunes, Flash drives, and more all use this.
Correct Answer
D. USB(Universal Serial Bus)
Explanation
The correct answer is USB (Universal Serial Bus). USB is the most common port for attaching peripherals onto a PC, including iPods, Zunes, flash drives, and more. It is a widely used standard for connecting devices to computers, offering a convenient and versatile way to transfer data and power between devices.
4.
A search for specific data. It implies that any condition can be searched for using them
Search operators AND, OR, and NOT.
This is often used by search engines such as Google or Yahoo
Correct Answer
B. Boolean Search
Explanation
A Boolean search is a type of search that allows users to combine keywords with operators such as AND, OR, and NOT to produce more relevant results. This search method is commonly used by search engines like Google or Yahoo to help users find specific data. By using Boolean operators, users can refine their search queries and include or exclude certain terms to narrow down the results.
5.
This is the metaphor to portray file systems on the computer’s home screen. It consists of pictures, called icons, which show files, folders, and various types of documents. You can arrange the icons on the electronic desktop to suit your particular needs.
Correct Answer
B. Desktop
Explanation
The correct answer is "Desktop" because the given description is referring to the electronic desktop on a computer's home screen. The desktop consists of icons that represent files, folders, and documents, and users can arrange these icons according to their preferences.
6.
This is something that is a box on your screen. It can usually be minimized, maximized, and moved around. You can have many of these on the screen at once
Correct Answer
A. Windows
Explanation
The given description suggests that the item being referred to is a graphical user interface element that appears on the screen, can be resized, moved, and multiple instances can be opened simultaneously. The term "Windows" is commonly used to describe this type of element in operating systems, such as Microsoft Windows. Therefore, "Windows" is the correct answer that best fits the description provided.
7.
This is a place where files can be stored in an organized manner. You can put these within each other and move them around.
Correct Answer
B. Folder or Directory
Explanation
A folder or directory is a place where files can be stored in an organized manner. It allows for the nesting of folders within each other and the ability to move them around. This provides a convenient way to manage and organize files on a computer system.
8.
Any device that you can attach to a computer. This can be an input, output or sometimes it just draws power from the computer.
Correct Answer
D. PeripHeral
Explanation
The term "peripheral" refers to any device that can be connected to a computer, whether it is an input device like a mouse, an output device like a monitor or printer, or even a device that solely draws power from the computer. Therefore, all the options listed (mouse, monitor, printer) fall under the category of peripherals.
9.
If you right click on an icon or object, what usually happens?
Correct Answer
B. It pulls up a list of various things you can do with that icon or object
Explanation
When you right click on an icon or object, it usually pulls up a list of various things you can do with that icon or object. This is known as the context menu or right-click menu. It provides you with options such as opening, editing, deleting, or organizing the item depending on the type of icon or object you are interacting with. The context menu is a convenient way to access different actions or settings related to the selected item without having to navigate through menus or memorize keyboard shortcuts.
10.
This is the basic data layout on a device. This tells a computer how exactly it should store data on the device such as a hard drive, floppy disk, SD card or flash drive and how to read it. By reseting this, you can effectively delete all the data on a drive. Usually it is still there, but the computer no longer knows how to read it.
Correct Answer
D. Format
Explanation
The correct answer is "Format". Formatting refers to the process of preparing a storage device, such as a floppy disk, hard drive, or SD card, for use by a computer. It involves creating a file system on the device, which determines how data is organized and accessed. When a device is formatted, all existing data on it is typically erased, although it may still be recoverable using specialized tools. Formatting essentially resets the data layout on the device, allowing the computer to write new data to it and read it in the specified format.
11.
This is a application that is used for composing letters, writing reports, and presenting typed material
Correct Answer
C. Word Processor
Explanation
A word processor is an application that is specifically designed for composing letters, writing reports, and presenting typed material. It provides tools and features for creating, editing, formatting, and organizing text documents. It allows users to easily manipulate text, insert images, tables, and other elements, and apply various formatting options such as font styles, sizes, and colors. It is commonly used for tasks such as writing essays, creating professional documents, and producing printed materials.
12.
CMOS and BIOS are...
Correct Answer
A. Basic Input/Output Systems on a computer. They help tell the computer how to communicate with the different devices on the computer
Explanation
CMOS (Complementary Metal-Oxide-Semiconductor) and BIOS (Basic Input/Output System) are essential components of a computer system. They work together to provide instructions and facilitate communication between the computer's hardware devices. The BIOS is responsible for initializing the hardware and loading the operating system, while the CMOS stores important system configuration settings. Together, they ensure that the computer can effectively communicate with and utilize the various devices connected to it, such as the keyboard, mouse, storage drives, and display.
13.
Why is there a battery in the desktop computer?
Correct Answer
B. To save basic setup information from CMOS/BIOS and to keep the system clock going in a power outage
Explanation
The battery in a desktop computer is necessary to save basic setup information from CMOS/BIOS and to keep the system clock running during a power outage. This is important because when the computer is unplugged or there is a power outage, the computer would lose all the settings and the clock would reset. The battery acts as a backup power source to ensure that this information is retained and the system can resume normal operation once power is restored.
14.
This is a program that is based on a grid. It is very useful for doing calculations quickly and is good at organizing numerical data and making graphs but isn't very good at organizing written data.
Correct Answer
C. Spreadsheet
Explanation
A spreadsheet is a program that is based on a grid and is commonly used for calculations, organizing numerical data, and creating graphs. It is a useful tool for quickly performing calculations and analyzing data. However, it is not designed for organizing written data as effectively as a word processor. Therefore, a spreadsheet is the correct answer in this context.
15.
This is software designed to inform people who are watching the screen about a specific topic. Sometimes this software is interactive, other times it is run on a mouse click or timing. It blocks out all other programs on the screen to display it's information.
Correct Answer
D. Presentation Software
Explanation
Presentation software is designed to inform people who are watching the screen about a specific topic. It can be interactive or run on a mouse click or timing. It also blocks out all other programs on the screen to display its information. Word processors are used for creating and editing documents, spreadsheets for organizing and analyzing data, and databases for storing and managing large amounts of information. Therefore, presentation software is the correct answer as it aligns with the given description.
16.
The most common Office Suite. This contains Microsoft Word, Excel, Access, and Power point.
Correct Answer
A. Microsoft Office
Explanation
Microsoft Office is the correct answer because it is the most common office suite that includes popular software applications such as Microsoft Word, Excel, Access, and Powerpoint. It is widely used in both professional and personal settings for creating documents, spreadsheets, databases, and presentations. Word Perfect, Microsoft Windows, and Apple are not office suites but rather alternative software or operating systems.
17.
This is the lowest form of software on the hard disk. It tells the computer how to use it's devices, maintains the drivers and allows other software to run within it. Linux, Windows, and Apple are all examples of these.
Correct Answer
C. Operating System
Explanation
The correct answer is Operating System. The operating system is the lowest form of software on the hard disk that tells the computer how to use its devices, maintains the drivers, and allows other software to run within it. Examples of operating systems include Linux, Windows, and Apple.
18.
This is the process of transfering data from a remote source such as the internet onto your computer
Correct Answer
B. Download
Explanation
Downloading is the process of transferring data from a remote source, such as the internet, onto your computer. This can include downloading files, documents, images, videos, or any other type of data. It allows users to access and save content from the internet onto their devices for offline use or future reference.
19.
This is the device that stores most of the information in a computer
Correct Answer
A. Hard disk
Explanation
The hard disk is the device that stores most of the information in a computer. It is a non-volatile storage device that permanently stores and retrieves data on a computer. It is where the operating system, software applications, and user files are stored. The hard disk provides long-term storage and allows for quick access to data when needed. It is an essential component of a computer system and is responsible for storing and retrieving data for various computing tasks.
20.
This is the short term memory of a computer. This accessed faster than from a hard drive or other device. When the computer turns off or reboots this type of memory is cleared
Correct Answer
C. RAM
Explanation
RAM stands for Random Access Memory. It is a type of computer memory that is used for temporary storage of data that is currently being used by the computer. It is accessed faster than data stored on a hard drive or other devices. However, when the computer is turned off or rebooted, the data stored in RAM is cleared, as it is a volatile form of memory. Therefore, RAM is considered as the short term memory of a computer.
21.
This is the term for a box on the top of web pages and dialog boxes that allow you to move to different sections in the dialog box. For instance it might list "Formatting, Shading, Borders" and items related to that topic will be displayed if you click on it
Correct Answer
C. Tab
Explanation
A tab is a term used to describe a box on the top of web pages and dialog boxes that allows you to move to different sections within the dialog box. It typically lists different categories or topics, such as "Formatting, Shading, Borders." When you click on a tab, it displays items related to that specific topic.
22.
On windows PCs, the shortcut key to switch between menus is
Correct Answer
A. Alt-Tab
Explanation
Alt-Tab is the correct answer because it is a commonly used shortcut key on Windows PCs to switch between open applications or windows. When pressed, it displays a thumbnail preview of each open window, allowing the user to select the desired window to switch to. This shortcut is convenient and efficient for multitasking and navigating between different programs or documents quickly.
23.
By hitting the insert key, you can switch between what?
Correct Answer
A. Writing over the text after the cursor or inserting text before the text
Explanation
By hitting the insert key, you can switch between writing over the text after the cursor or inserting text before the text. This means that when the insert mode is on, any new text you type will be inserted at the cursor position, pushing the existing text to the right. However, when the insert mode is off, any new text you type will overwrite the existing text at the cursor position.
24.
The num lock button's primary function is...
Correct Answer
C. To switch between using the numerical keypad as arrow keys and using it as numbers
Explanation
The primary function of the num lock button is to switch between using the numerical keypad as arrow keys and using it as numbers. When the num lock is on, the numerical keypad functions as numbers, allowing users to input numeric data easily. When the num lock is off, the numerical keypad functions as arrow keys, allowing users to navigate through documents or webpages.
25.
The key near alt and ctrl on most keyboards. This key opens the 'start' menu and can be used for various functions
Correct Answer
A. Windows key
Explanation
The correct answer is the Windows key. The Windows key is located near the alt and ctrl keys on most keyboards. It is used to open the 'start' menu in Windows operating systems and can also be used for various functions and shortcuts.
26.
This is a term for a set of letters that are drawn in a certain way.
Correct Answer
B. Font
Explanation
Font is a term used to describe a set of letters that are drawn in a certain way. It refers to the style, size, and appearance of text in a document or on a digital platform. Fonts can vary in their design, such as being bold, italic, or in different colors. They play a crucial role in enhancing the visual appeal and readability of text.
27.
This is a picture, text or other thing on a website you can click on to access other websites
Correct Answer
B. Link
Explanation
A link is a clickable element on a website that allows users to access other websites or navigate to different sections within the same website. It is typically represented by underlined text or a button, and clicking on it redirects the user to the specified destination. In this context, the correct answer is "Link" because it accurately describes the given description of a clickable element on a website that leads to other websites.
28.
At the very bottom of windows systems there is a list of different open windows and the start button. This is called...
Correct Answer
A. Task Bar
Explanation
The correct answer is "Task Bar". The task bar is located at the very bottom of windows systems and it contains a list of different open windows and the start button. It provides quick access to open applications and allows users to switch between different windows easily.
29.
Which of these techniques will result in the most secure password
Correct Answer
E. All of these are great techniques for making passwords harder to guess.
Explanation
All of the mentioned techniques contribute to making passwords more secure. Replacing letters with other characters adds complexity and makes it harder for hackers to guess. Avoiding simple words prevents common dictionary-based attacks. Including both numbers and letters increases the number of possible combinations, making the password more difficult to crack. Adjusting the case of the text in the middle of the password adds an additional layer of complexity. By combining all these techniques, the password becomes harder to guess and provides better security.
30.
An applet or flash document are...
Correct Answer
A. Things on websites that are often interactive or animated
Explanation
An applet or flash document refers to interactive or animated elements on websites. These elements can include games, interactive forms, animations, or other types of multimedia content that engage users and provide an interactive experience. These elements are typically created using programming languages like Java or Adobe Flash and are embedded within web pages to enhance the user experience.
31.
Which of the following is not an example of a image file
Correct Answer
D. DOC
Explanation
An image file is a file format that is used to store digital images. JPG, TIF, and BMP are all examples of image file formats commonly used to store and display images. However, DOC is not an image file format. DOC is a file format used by Microsoft Word to store documents. It is primarily used for text-based documents and does not support the storage of images. Therefore, DOC is not an example of an image file.
32.
This is the type of file that is usually a program to be run by the computer. The code is executed and it is dangerous to run these if you do not know the source
Correct Answer
B. Exe
Explanation
An ".exe" file is a type of file that is usually a program to be run by the computer. It contains executable code that is executed by the computer's operating system. It is important to know the source of an ".exe" file before running it because it can potentially contain malicious code, such as viruses or malware, which can harm the computer or compromise its security. Therefore, it is considered dangerous to run ".exe" files if you do not know the source.
33.
It is not possible to get a virus unless the code is executed. This means that you can't get a virus from an AVI(video), MP3(audio), txt(text), or from the e-mail itself
Correct Answer
A. True
Explanation
The explanation for the given correct answer is that viruses typically require the execution of code in order to infect a system. AVI, MP3, and txt files are not executable files, so they cannot contain a virus that can infect a system. Similarly, simply opening an email cannot execute code and therefore cannot infect a system with a virus. Therefore, it is true that it is not possible to get a virus from an AVI, MP3, txt, or from the email itself.
34.
Some programs have bugs in them that allow people to hack your machine and install viruses and other programs without your knowledge
Correct Answer
A. True
Explanation
This statement is true because there are indeed programs that have bugs or vulnerabilities that can be exploited by hackers. These vulnerabilities can allow unauthorized access to a machine, enabling hackers to install viruses and other malicious programs without the user's knowledge. It is important to keep software and operating systems up to date with the latest security patches to minimize the risk of such attacks.
35.
This is a series of inputs, like from a keyboard or a mouse that the computer runs as if a user was using that device. These can make repetitive tasks go a lot faster but sometimes can contain viruses if you do not know the source
Correct Answer
B. Macro
Explanation
A macro is a series of inputs that can be recorded and played back on a computer. It allows users to automate repetitive tasks, such as filling out forms or executing a sequence of commands. However, macros can also be used to execute malicious actions if created by an untrusted source. Therefore, it is important to be cautious and know the source of the macro before running it on a computer.
36.
This is the icon or command on a web browser that allows you to re-download a website.
Correct Answer
A. Refresh/Reload
Explanation
The correct answer is "Refresh/Reload" because this icon or command on a web browser allows the user to re-download a website. By clicking on the refresh/reload button, the browser will reload the current webpage, fetching any new updates or changes made to the website since the last time it was loaded. This is useful when a user wants to see the most recent version of a webpage or if there are any loading issues that need to be resolved.
37.
This is the number composed of four numbers separated by periods(IE 12.23.445.22) that the internet uses to direct information to your computer.
Correct Answer
A. IP address
Explanation
An IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It consists of four numbers separated by periods, such as 12.23.445.22. This address is used to direct information to a specific computer on the internet, allowing for communication and data transfer between devices.
38.
The precusors to the internet were originally developed as...
Correct Answer
B. A way of decentralizing data in case of a nuclear strike
Explanation
The precursors to the internet were originally developed as a way of decentralizing data in case of a nuclear strike. This means that the intention behind creating the early versions of the internet was to ensure that information could still be accessed and shared even if certain locations or communication channels were destroyed in a nuclear attack. By decentralizing the data, it would be distributed across multiple nodes or servers, making it more resilient and less vulnerable to being completely wiped out in the event of a nuclear strike.