1.
An email which has been subscribed to but is often unread for a long period of time possibly never is called?
Correct Answer
D. BACN
Explanation
BACN is the correct answer because it refers to email messages that are subscribed to but often go unread for a long time. BACN emails are usually not spam but are not considered important or urgent enough to read immediately. The term BACN is a play on the word "spam" and reflects the idea that these emails are not unwanted but are also not a priority.
2.
What does a screen shot do?
Correct Answer
D. Takes a picture of a computer screen to copy somewhere else
Explanation
A screen shot is the process of capturing an image of the current display on a computer screen. This image can then be saved or copied to be used elsewhere, such as in a document, presentation, or to share with others. It is a useful tool for capturing and sharing information or troubleshooting technical issues.
3.
What is a dashboard?
Correct Answer
B. a web-based technology page with information from various sources.
Explanation
A dashboard is a web-based technology page that displays information from various sources. It provides a centralized view of data and allows users to monitor and analyze key metrics and performance indicators in real-time. Dashboards are commonly used in business settings to track and visualize data from multiple systems or applications, helping users make informed decisions based on the insights provided.
4.
A laser is a _____________________.
Correct Answer
B. Beam of light used for pointing at things instead of using your finger
Explanation
A laser is a beam of light used for pointing at things instead of using your finger. Lasers emit a highly concentrated and coherent beam of light that can be used for various purposes such as scientific research, industrial applications, and even in everyday life for pointing or aligning objects with precision. The focused nature of the laser beam allows for accurate and long-range pointing, making it a useful tool in many different fields.
5.
A game boy is
Correct Answer
A. A small portable gaming system.
Explanation
The given correct answer is "a small portable gaming system." This is because a game boy is commonly known as a handheld gaming device that allows users to play video games on the go. It is not a reference to a male child who enjoys playing video games, the first gaming system, or the name of an online video game. Therefore, the correct answer is a small portable gaming system.
6.
A geek is
Correct Answer
A. A person who is really into computers
Explanation
The correct answer is "a person who is really into computers." A geek is someone who has a deep passion and enthusiasm for computers, often displaying extensive knowledge and expertise in the field. Geeks are typically highly interested in technology, programming, and computer-related activities, and they often spend a significant amount of time exploring and learning about these subjects. This term is commonly used to describe individuals who have a strong affinity for computers and technology.
7.
A small camera that is attached to a laptop or computer is called?
Correct Answer
E. A web cam
Explanation
A small camera that is attached to a laptop or computer is called a web cam. A web cam is used to capture video and images and transmit them in real-time over the internet. It allows users to participate in video calls, conferences, and online meetings. It is a popular accessory for video chatting, live streaming, and recording videos.
8.
A combination camera, phone, PDA, multimedia player, and wireless communication device made by Apple Inc is called?
Correct Answer
C. IpHone
Explanation
The correct answer is iPhone. The iPhone is a combination of various devices such as a camera, phone, PDA, multimedia player, and wireless communication device. It is a product made by Apple Inc.
9.
When your software crashes, what is it called?
Correct Answer
D. An Abend
Explanation
When a software crashes, it is commonly referred to as an "Abend". The term "Abend" is derived from the German words "Abend" (evening) and "ende" (end), indicating the end of the program due to an abnormal termination. This term is widely used in the field of computer programming and is often used to describe unexpected or abnormal terminations of software or system failures.
10.
What is an E-Mail Bomb?
Correct Answer
B. Sending lots of unwanted e-mails to an address
Explanation
An email bomb refers to the act of sending numerous unwanted emails to a specific address. This can overwhelm the recipient's inbox and potentially cause disruption to their email service. It is a form of cyber attack aimed at causing inconvenience or harm to the targeted individual or organization.
11.
When you’re not working on the internet, what is this called?
Correct Answer
C. Offline
Explanation
When you are not working on the internet, it means you are not connected to the internet and are not able to access online resources or communicate with others through the internet. This state is referred to as being offline.
12.
True or False. You lose ram memory when you turn off the CPU?
Correct Answer
A. True
Explanation
When you turn off the CPU, the power supply to the RAM is also shut down, causing the data stored in the RAM to be lost. RAM is a volatile memory, which means it requires continuous power supply to retain data. Therefore, turning off the CPU results in the loss of RAM memory.
13.
True or False Hacking is when someone who breaks into your computer without your permission.
Correct Answer
A. True
Explanation
Hacking is indeed when someone breaks into your computer without your permission. It refers to unauthorized access to computer systems or networks with the intention of gaining information, causing damage, or committing illegal activities. This act is considered a cybercrime and is punishable by law in many jurisdictions.
14.
What is an MP3 used for?
Correct Answer
B. Playing Music
Explanation
An MP3 is used for playing music. It is a popular audio file format that allows users to store and play music on various devices such as smartphones, computers, and portable music players. MP3 files are compressed, which means they take up less storage space while maintaining good audio quality. This makes it convenient for users to carry and listen to their favorite songs on the go.
15.
A long cable that can connect computers labs together is called?
Correct Answer
E. Back bone
Explanation
A long cable that can connect computer labs together is called a backbone. The backbone refers to the main high-speed network that connects multiple smaller networks or devices within a larger network. It provides a central pathway for data transmission and ensures efficient communication between different parts of the network.
16.
What is a jolt?
Correct Answer
B. It freezes your computer
Explanation
A jolt refers to a sudden and brief interruption or disruption in the functioning of a computer system, causing it to freeze or stop responding. This can occur due to various reasons such as software conflicts, hardware issues, or power surges. When a computer freezes, it becomes unresponsive and the user is unable to perform any tasks until the issue is resolved.
17.
How is a database is sorted?
Correct Answer
A. By a key
Explanation
A database is sorted by a key. A key is a unique identifier for each record in the database. Sorting by a key means arranging the records in a specific order based on the values of the key. This allows for efficient searching, retrieval, and organization of data within the database. Sorting by other factors such as a button, name, or file would not provide the same level of organization and ease of access as sorting by a key. Therefore, the correct answer is sorting by a key.
18.
What's at the beginning or end of a data transmission?
Correct Answer
D. A tag
Explanation
A tag is typically used at the beginning or end of a data transmission to identify and label the data being transmitted. It helps in organizing and categorizing the data, making it easier to identify and process.
19.
An example of a shortcut used in chats or emails is?
Correct Answer
B. LULU
Explanation
LULU is an example of a shortcut used in chats or emails. This abbreviation is commonly used to express laughter or amusement, similar to "LOL" or "haha". It is a way to quickly convey a positive reaction or humor in a text-based conversation.
20.
When you want to make an icon or file disappear you would drag it to the _________________?
Correct Answer
E. Recycling bin
Explanation
When you want to make an icon or file disappear, you would drag it to the recycling bin. The recycling bin is a storage location on a computer's desktop where deleted files and folders are temporarily stored before they are permanently deleted. Dragging an icon or file to the recycling bin signifies that you want to delete it from its current location.
21.
When a wave frequency exceeds 20,000 hertz it is called _______?
Correct Answer
E. A ultrasound
Explanation
When a wave frequency exceeds 20,000 hertz, it is called an ultrasound. Ultrasound refers to sound waves with frequencies higher than the upper audible limit of human hearing. These high-frequency waves are commonly used in medical imaging, such as ultrasound scans, as well as in various industrial applications.
22.
What is a nano?
Correct Answer
E. None of these
23.
What is used to scan copies of pictures?
Correct Answer
D. A scanner
Explanation
A scanner is used to scan copies of pictures. It is a device that converts physical documents or images into digital format, allowing them to be stored, edited, and shared electronically. Unlike a printer, keyboard, or mouse, a scanner specifically focuses on capturing and reproducing images or documents accurately. Therefore, the correct answer is a scanner.
24.
A very high energy electromagnetic radiation such as X-rays are called_____________________.
Correct Answer
gamma rays
Gamma
Gamma Rays
gamma
Explanation
Gamma rays are a form of very high energy electromagnetic radiation. They have the shortest wavelengths and highest frequencies among all types of electromagnetic radiation. They are often produced by nuclear reactions and radioactive decay. Gamma rays are used in various fields such as medicine (in radiation therapy and imaging) and industry (in sterilization and material testing).
25.
A cracker is someone who?
Correct Answer
D. Hacks into a computer
Explanation
A cracker is someone who hacks into a computer. This means that they gain unauthorized access to a computer system or network, often with malicious intent. Unlike ethical hackers or cybersecurity professionals who aim to identify vulnerabilities and improve security, crackers engage in illegal activities such as stealing sensitive information, spreading malware, or causing damage to the targeted system.
26.
A term to describe when an image has been displaying too long, resulting in a permanent "ghost" image being burned into the screen is called shadow burn.
Correct Answer
B. False
Explanation
The given statement is false. The correct term to describe when an image has been displaying too long, resulting in a permanent "ghost" image being burned into the screen is called screen burn-in, not shadow burn. Shadow burn is not a recognized term in relation to this phenomenon.