7th Grade 5th Hour Vocabulary Test

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Chattycathy528
C
Chattycathy528
Community Contributor
Quizzes Created: 3 | Total Attempts: 1,373
Questions: 26 | Attempts: 690

SettingsSettingsSettings
Vocabulary Quizzes & Trivia

7th Grade 5th hour computer terms vocabulary test


Questions and Answers
  • 1. 

    An email which has been subscribed to but is often unread for a long period of time possibly never is called?

    • A.

      A toy

    • B.

      Your breakfast

    • C.

      A Hyperlink

    • D.

      BACN

    • E.

      None of these

    Correct Answer
    D. BACN
    Explanation
    BACN is the correct answer because it refers to email messages that are subscribed to but often go unread for a long time. BACN emails are usually not spam but are not considered important or urgent enough to read immediately. The term BACN is a play on the word "spam" and reflects the idea that these emails are not unwanted but are also not a priority.

    Rate this question:

  • 2. 

    What does a screen shot do?

    • A.

      To put a picture as your background

    • B.

      Print a picture off the internet

    • C.

      Saves information

    • D.

      Takes a picture of a computer screen to copy somewhere else

    • E.

      None of these

    Correct Answer
    D. Takes a picture of a computer screen to copy somewhere else
    Explanation
    A screen shot is the process of capturing an image of the current display on a computer screen. This image can then be saved or copied to be used elsewhere, such as in a document, presentation, or to share with others. It is a useful tool for capturing and sharing information or troubleshooting technical issues.

    Rate this question:

  • 3. 

    What is a dashboard?

    • A.

      A keyboard

    • B.

      a web-based technology page with information from various sources.

    • C.

      A letter

    • D.

      Something like a ghost

    • E.

      None of these

    Correct Answer
    B. a web-based technology page with information from various sources.
    Explanation
    A dashboard is a web-based technology page that displays information from various sources. It provides a centralized view of data and allows users to monitor and analyze key metrics and performance indicators in real-time. Dashboards are commonly used in business settings to track and visualize data from multiple systems or applications, helping users make informed decisions based on the insights provided.

    Rate this question:

  • 4. 

    A laser is a _____________________.

    • A.

      Ray gun to shot aliens with

    • B.

      Beam of light used for pointing at things instead of using your finger

    • C.

      A sonic light used for playing with cats and dog

    • D.

      The name of a keyboard

    • E.

      None of these

    Correct Answer
    B. Beam of light used for pointing at things instead of using your finger
    Explanation
    A laser is a beam of light used for pointing at things instead of using your finger. Lasers emit a highly concentrated and coherent beam of light that can be used for various purposes such as scientific research, industrial applications, and even in everyday life for pointing or aligning objects with precision. The focused nature of the laser beam allows for accurate and long-range pointing, making it a useful tool in many different fields.

    Rate this question:

  • 5. 

    A game boy is

    • A.

      A small portable gaming system.

    • B.

      A male child who likes to play video games

    • C.

      The first gaming system

    • D.

      The name of an online video game

    • E.

      None of these

    Correct Answer
    A. A small portable gaming system.
    Explanation
    The given correct answer is "a small portable gaming system." This is because a game boy is commonly known as a handheld gaming device that allows users to play video games on the go. It is not a reference to a male child who enjoys playing video games, the first gaming system, or the name of an online video game. Therefore, the correct answer is a small portable gaming system.

    Rate this question:

  • 6. 

    A geek is

    • A.

      A person who is really into computers

    • B.

      A person who is a member of a glee club

    • C.

      A person who is very athletic

    • D.

      A person who was born in Greece

    • E.

      None of these

    Correct Answer
    A. A person who is really into computers
    Explanation
    The correct answer is "a person who is really into computers." A geek is someone who has a deep passion and enthusiasm for computers, often displaying extensive knowledge and expertise in the field. Geeks are typically highly interested in technology, programming, and computer-related activities, and they often spend a significant amount of time exploring and learning about these subjects. This term is commonly used to describe individuals who have a strong affinity for computers and technology.

    Rate this question:

  • 7. 

    A small camera that is attached to a laptop or computer is called?

    • A.

      A mouse

    • B.

      A screen shot

    • C.

      Read only memory

    • D.

      A monitor

    • E.

      A web cam

    Correct Answer
    E. A web cam
    Explanation
    A small camera that is attached to a laptop or computer is called a web cam. A web cam is used to capture video and images and transmit them in real-time over the internet. It allows users to participate in video calls, conferences, and online meetings. It is a popular accessory for video chatting, live streaming, and recording videos.

    Rate this question:

  • 8. 

    A combination camera, phone, PDA, multimedia player, and wireless communication device made by Apple Inc is called?

    • A.

      None of these

    • B.

      Web cam

    • C.

      Iphone

    • D.

      Mp3

    • E.

      Dashboard

    Correct Answer
    C. IpHone
    Explanation
    The correct answer is iPhone. The iPhone is a combination of various devices such as a camera, phone, PDA, multimedia player, and wireless communication device. It is a product made by Apple Inc.

    Rate this question:

  • 9. 

    When your software crashes, what is it called?

    • A.

      A Hyperlink

    • B.

      An Offline

    • C.

      An RAM

    • D.

      An Abend

    • E.

      An Access

    Correct Answer
    D. An Abend
    Explanation
    When a software crashes, it is commonly referred to as an "Abend". The term "Abend" is derived from the German words "Abend" (evening) and "ende" (end), indicating the end of the program due to an abnormal termination. This term is widely used in the field of computer programming and is often used to describe unexpected or abnormal terminations of software or system failures.

    Rate this question:

  • 10. 

    What is an E-Mail Bomb?

    • A.

      Sending a smelly email

    • B.

      Sending lots of unwanted e-mails to an address

    • C.

      Electronic mail

    • D.

      Retrieving a previously sent email before it is read

    • E.

      None of these

    Correct Answer
    B. Sending lots of unwanted e-mails to an address
    Explanation
    An email bomb refers to the act of sending numerous unwanted emails to a specific address. This can overwhelm the recipient's inbox and potentially cause disruption to their email service. It is a form of cyber attack aimed at causing inconvenience or harm to the targeted individual or organization.

    Rate this question:

  • 11. 

    When you’re not working on the internet, what is this called?

    • A.

      Connected

    • B.

      Online

    • C.

      Offline

    • D.

      Jolt

    • E.

      CPU

    Correct Answer
    C. Offline
    Explanation
    When you are not working on the internet, it means you are not connected to the internet and are not able to access online resources or communicate with others through the internet. This state is referred to as being offline.

    Rate this question:

  • 12. 

    True or False. You lose ram memory when you turn off the CPU?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    When you turn off the CPU, the power supply to the RAM is also shut down, causing the data stored in the RAM to be lost. RAM is a volatile memory, which means it requires continuous power supply to retain data. Therefore, turning off the CPU results in the loss of RAM memory.

    Rate this question:

  • 13. 

    True or False Hacking is when someone who breaks into your computer without your permission.

    • A.

      True

    • B.

      False

    • C.

      I don't know

    • D.

      none of these

    • E.

      all of these

    Correct Answer
    A. True
    Explanation
    Hacking is indeed when someone breaks into your computer without your permission. It refers to unauthorized access to computer systems or networks with the intention of gaining information, causing damage, or committing illegal activities. This act is considered a cybercrime and is punishable by law in many jurisdictions.

    Rate this question:

  • 14. 

    What is an MP3 used for?   

    • A.

      Shaving

    • B.

      Playing Music

    • C.

      Video Making

    • D.

      Making Phone Calls

    • E.

      None of these

    Correct Answer
    B. Playing Music
    Explanation
    An MP3 is used for playing music. It is a popular audio file format that allows users to store and play music on various devices such as smartphones, computers, and portable music players. MP3 files are compressed, which means they take up less storage space while maintaining good audio quality. This makes it convenient for users to carry and listen to their favorite songs on the go.

    Rate this question:

  • 15. 

    A long cable that can connect computers labs together is called?

    • A.

      Homerow

    • B.

      None of these

    • C.

      Network

    • D.

      Data lane

    • E.

      Back bone

    Correct Answer
    E. Back bone
    Explanation
    A long cable that can connect computer labs together is called a backbone. The backbone refers to the main high-speed network that connects multiple smaller networks or devices within a larger network. It provides a central pathway for data transmission and ensures efficient communication between different parts of the network.

    Rate this question:

  • 16. 

    What is a jolt?

    • A.

      It is friction

    • B.

      It freezes your computer

    • C.

      It is a vitamin drink

    • D.

      Is getting hit by lightning

    • E.

      None of these

    Correct Answer
    B. It freezes your computer
    Explanation
    A jolt refers to a sudden and brief interruption or disruption in the functioning of a computer system, causing it to freeze or stop responding. This can occur due to various reasons such as software conflicts, hardware issues, or power surges. When a computer freezes, it becomes unresponsive and the user is unable to perform any tasks until the issue is resolved.

    Rate this question:

  • 17. 

    How is a database is sorted?

    • A.

      By a key

    • B.

      By a button

    • C.

      By a name

    • D.

      By a file

    • E.

      None of these

    Correct Answer
    A. By a key
    Explanation
    A database is sorted by a key. A key is a unique identifier for each record in the database. Sorting by a key means arranging the records in a specific order based on the values of the key. This allows for efficient searching, retrieval, and organization of data within the database. Sorting by other factors such as a button, name, or file would not provide the same level of organization and ease of access as sorting by a key. Therefore, the correct answer is sorting by a key.

    Rate this question:

  • 18. 

    What's at the beginning or end of a data transmission?

    • A.

      A screen

    • B.

      A hacker

    • C.

      A button

    • D.

      A tag

    • E.

      An address

    Correct Answer
    D. A tag
    Explanation
    A tag is typically used at the beginning or end of a data transmission to identify and label the data being transmitted. It helps in organizing and categorizing the data, making it easier to identify and process.

    Rate this question:

  • 19. 

    An example of a shortcut used in chats or emails is?

    • A.

      None of these

    • B.

      LULU

    • C.

      AAAL

    • D.

      PIPO

    • E.

      QWE

    Correct Answer
    B. LULU
    Explanation
    LULU is an example of a shortcut used in chats or emails. This abbreviation is commonly used to express laughter or amusement, similar to "LOL" or "haha". It is a way to quickly convey a positive reaction or humor in a text-based conversation.

    Rate this question:

  • 20. 

    When you want to make an icon or file disappear you would drag it to the _________________?

    • A.

      Internet Explorer

    • B.

      Internal hard drive

    • C.

      Random access memory

    • D.

      None of these

    • E.

      Recycling bin

    Correct Answer
    E. Recycling bin
    Explanation
    When you want to make an icon or file disappear, you would drag it to the recycling bin. The recycling bin is a storage location on a computer's desktop where deleted files and folders are temporarily stored before they are permanently deleted. Dragging an icon or file to the recycling bin signifies that you want to delete it from its current location.

    Rate this question:

  • 21. 

    When a wave frequency exceeds 20,000 hertz it is called _______?

    • A.

      None of these

    • B.

      A mega sound

    • C.

      Very loud

    • D.

      A sonic boom

    • E.

      A ultrasound

    Correct Answer
    E. A ultrasound
    Explanation
    When a wave frequency exceeds 20,000 hertz, it is called an ultrasound. Ultrasound refers to sound waves with frequencies higher than the upper audible limit of human hearing. These high-frequency waves are commonly used in medical imaging, such as ultrasound scans, as well as in various industrial applications.

    Rate this question:

  • 22. 

    What is a nano?

    • A.

      Shaving

    • B.

      Logging on

    • C.

      A type of computer chip

    • D.

      A billionth of a minute

    • E.

      None of these

    Correct Answer
    E. None of these
  • 23. 

    What is used to scan copies of pictures?

    • A.

      A printer

    • B.

      A keyboard

    • C.

      A mouse

    • D.

      A scanner

    • E.

      All of these

    Correct Answer
    D. A scanner
    Explanation
    A scanner is used to scan copies of pictures. It is a device that converts physical documents or images into digital format, allowing them to be stored, edited, and shared electronically. Unlike a printer, keyboard, or mouse, a scanner specifically focuses on capturing and reproducing images or documents accurately. Therefore, the correct answer is a scanner.

    Rate this question:

  • 24. 

    A very high energy electromagnetic radiation such as X-rays are called_____________________.

    Correct Answer
    gamma rays
    Gamma
    Gamma Rays
    gamma
    Explanation
    Gamma rays are a form of very high energy electromagnetic radiation. They have the shortest wavelengths and highest frequencies among all types of electromagnetic radiation. They are often produced by nuclear reactions and radioactive decay. Gamma rays are used in various fields such as medicine (in radiation therapy and imaging) and industry (in sterilization and material testing).

    Rate this question:

  • 25. 

    A cracker is someone who?

    • A.

      Sends an email

    • B.

      Has his own social networking site

    • C.

      Logins to a computer

    • D.

      Hacks into a computer

    • E.

      None of these

    Correct Answer
    D. Hacks into a computer
    Explanation
    A cracker is someone who hacks into a computer. This means that they gain unauthorized access to a computer system or network, often with malicious intent. Unlike ethical hackers or cybersecurity professionals who aim to identify vulnerabilities and improve security, crackers engage in illegal activities such as stealing sensitive information, spreading malware, or causing damage to the targeted system.

    Rate this question:

  • 26. 

    A term to describe when an image has been displaying too long, resulting in a permanent "ghost" image being burned into the screen is called shadow burn.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement is false. The correct term to describe when an image has been displaying too long, resulting in a permanent "ghost" image being burned into the screen is called screen burn-in, not shadow burn. Shadow burn is not a recognized term in relation to this phenomenon.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Oct 23, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 04, 2009
    Quiz Created by
    Chattycathy528
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.