1.
What is the technical term for the body of an airplane?
Answer:
Fuselage
Explanation:
The term "fuselage" refers to the main body structure of an airplane that holds the passengers, cargo, and fuel. It is typically cylindrical in shape and houses the cockpit, cabin, and other essential components of the aircraft. The fuselage plays a crucial role in providing structural integrity and aerodynamic stability to the airplane during flight.
2.
Which aircraft holds the record for fastest speed in our atmosphere?
Answer:
Sr-71
Explanation:
The SR-71, also known as the Blackbird, holds the record for the fastest speed in our atmosphere. This aircraft was capable of reaching speeds exceeding Mach 3 (three times the speed of sound), making it the fastest manned aircraft ever built. Its incredible speed and advanced technology allowed it to perform reconnaissance missions at high altitudes and speeds, making it a legendary aircraft in aviation history.
3.
What is considered the grandfather of modern passenger planes?
Answer:
DC-3
Explanation:
The DC-3 is considered the grandfather of modern passenger planes because it was one of the first widely-used commercial aircraft that revolutionized air travel with its advanced technology, reliability, and comfort for passengers. Its design and features set the standard for future passenger planes, making it a significant milestone in the history of aviation.
4.
What are horizontal stabilizers called when in front of the wing of an airplane?
Answer:
Canards
Explanation:
Canards are horizontal stabilizers located in front of the wing of an airplane. They help control the pitch of the aircraft and provide stability during flight. By positioning the stabilizers in front of the wing, canards can improve maneuverability and lift distribution, making them a popular design choice for certain aircraft configurations.
5.
What was special about the X-29 plane?
Answer:
It Had Forward-Swept Wings
Explanation:
The X-29 plane was special because it had forward-swept wings. This design allowed for improved maneuverability and control at high angles of attack, making it a unique and innovative aircraft compared to traditional planes with swept-back wings. The forward-swept wings also helped to enhance the plane's aerodynamic performance, making it a groundbreaking design in the field of aviation.
6.
What did the U.S. government use expended shell casings for from 1944 to 1946?
Answer:
Making Pennies
Explanation:
During World War II, the U.S. government faced a shortage of copper due to its high demand for military purposes. To address this issue, the government decided to use expended shell casings, which are made of brass, to produce pennies from 1944 to 1946. This innovative solution allowed the government to conserve copper for the war effort while still meeting the demand for coins in circulation.
7.
What does AOL stand for?
Answer:
America On Line
Explanation:
AOL stands for America Online, a popular internet service provider that was widely used in the 1990s and early 2000s. It provided dial-up internet access, email services, instant messaging, and online content.
8.
If an electronic device can be operated by battery or electricity, what can it be called?
Answer:
AC/DC
Explanation:
The term AC/DC refers to alternating current (AC) and direct current (DC), which are two common types of electrical power sources. Therefore, an electronic device that can be operated by both battery (DC) or electricity (AC) can be referred to as AC/DC.
9.
Where is the U.S. Air Force Museum located?
Answer:
Dayton, Ohio
Explanation:
The U.S. Air Force Museum is located in Dayton, Ohio. This city is home to the National Museum of the United States Air Force, which is the official museum of the United States Air Force and one of the world's largest military aviation museums. Dayton, Ohio was chosen as the location for the museum due to its historical significance in aviation and its close ties to the Wright brothers, who conducted many of their early experiments in flight in this area.
10.
In what decade did the first human walk on the moon?
Answer:
60's
Explanation:
The first human walked on the moon in the 1960s, specifically in 1969 when Neil Armstrong and Buzz Aldrin landed on the lunar surface during the Apollo 11 mission. This historic event marked a significant milestone in space exploration and the space race between the United States and the Soviet Union.
11.
What's the name for the small remote-controlled vehicle used to explore Mars?
Answer:
Rover
Explanation:
The small remote-controlled vehicle used to explore Mars is commonly referred to as a rover. These rovers are equipped with various scientific instruments to study the Martian surface and collect valuable data for research purposes. The name "rover" reflects the vehicle's ability to roam around and explore the terrain of Mars, providing scientists with important insights into the planet's geology, atmosphere, and potential for past or present life.
12.
A molotov cocktail is a type of what?
Answer:
Bomb
Explanation:
A molotov cocktail is a type of bomb typically made using a glass bottle filled with a flammable liquid such as gasoline or alcohol, with a cloth wick inserted into the bottle. When lit, the cloth wick ignites the liquid, turning the bottle into an improvised explosive device. Molotov cocktails are commonly used as weapons in riots, protests, and acts of terrorism due to their simplicity and effectiveness in causing damage.
13.
Which kind of clock is accurate to within one second in 1.7 million years?
Answer:
Atomic
Explanation:
Atomic clocks are known for their unparalleled accuracy due to their use of atomic vibrations to measure time. By utilizing the natural frequency of atoms, atomic clocks can maintain accuracy to within one second in 1.7 million years. This incredible precision makes them the most reliable timekeeping devices available, far surpassing the accuracy of traditional mechanical or quartz clocks.
14.
What medium allows multiple recordings to be made on the same disc repeatedly?
Answer:
CD-RW
Explanation:
CD-RW stands for Compact Disc Re-Writable, which is a type of compact disc that allows multiple recordings to be made on the same disc repeatedly. This is possible because CD-RW discs can be erased and rewritten multiple times, unlike CD-R discs which can only be written to once. This makes CD-RW a convenient and cost-effective medium for storing and sharing data that may need to be updated or changed frequently.
15.
What is the control for the level of sound coming out of the left or right speakers called?
Answer:
Balance
Explanation:
The control for the level of sound coming out of the left or right speakers is called "Balance". This control allows the user to adjust the volume balance between the left and right speakers, ensuring that the sound is distributed evenly between both channels for an optimal listening experience.
16.
Which device is used by a computer to display graphics and information on a video screen?
Answer:
Monitor
Explanation:
A monitor is a device that is used by a computer to display graphics and information on a video screen. Monitors come in various sizes and resolutions, allowing users to view images, videos, text, and other visual content generated by the computer. The monitor is an essential component of a computer system as it provides the user with a visual interface to interact with the computer and access information.
17.
What is a non-rigid airship called?
Answer:
Blimp
Explanation:
A non-rigid airship is called a blimp because it does not have a rigid structure like a traditional airship. Blimps rely on the pressure of the gas inside the envelope to maintain their shape, making them more flexible and maneuverable compared to rigid airships. The term "blimp" is commonly used to refer to these types of airships in popular culture and everyday language.
18.
What is an "unpowered fixed-wing heavier-than-air" craft called?
Answer:
Glider
Explanation:
A glider is a type of aircraft that does not have an engine and relies on natural forces, such as gravity and air currents, to stay aloft. It is considered a fixed-wing heavier-than-air craft because it generates lift using its wings and is heavier than the air it displaces. Gliders are able to fly for extended periods of time by efficiently using these natural forces to stay airborne.
19.
Which aeronautical term refers to an airplane that has three similar-sized pairs of wings?
Answer:
Triplane
Explanation:
A triplane is an aeronautical term that refers to an airplane with three similar-sized pairs of wings stacked one above the other. This design allows for increased lift and maneuverability compared to traditional biplanes or monoplanes. The triplane configuration was popular during World War I, with famous aircraft such as the Fokker Dr.I and Sopwith Triplane utilizing this design.
20.
A difference between the softest and loudest sounds, fits which audio/video term?
Answer:
Dynamic Range
Explanation:
Dynamic Range refers to the difference between the softest and loudest sounds in an audio or video signal. It is a term used to describe the range of levels that can be accurately reproduced, capturing the full spectrum of sound from the quietest to the loudest. This term is commonly used in audio engineering and video production to ensure that all elements of the sound are properly balanced and represented.
21.
Which company makes and sells the iPod?
Answer:
Apple
Explanation:
Apple is the company responsible for designing, manufacturing, and selling the iPod. Since its release in 2001, Apple has been the sole producer of the iPod, which has become one of the most popular portable media players in the world. The iPod is a product line created by Apple and is closely associated with the company's brand and reputation for innovation in technology.
22.
In tech talk what is a "blackberry"?
Answer:
Handheld Device
Explanation:
In tech talk, a "blackberry" refers to a handheld device. This term is commonly used to describe a type of mobile device, typically with a physical keyboard, that was popular in the early 2000s for its email and messaging capabilities. The Blackberry brand was well-known for its secure communication features and was widely used by professionals for business purposes.
23.
Which device helps you find your location?
Answer:
GPS
Explanation:
GPS, or Global Positioning System, is a device that utilizes satellites to accurately determine a user's location on Earth. By receiving signals from multiple satellites, GPS can triangulate the user's position and provide precise coordinates. This technology is commonly used in navigation systems, smartphones, and other devices to help individuals find their location, navigate to a specific destination, and track their movements.
24.
What is the name of the device used to move the cursor around on the screen of a computer?
Answer:
Mouse
Explanation:
The device used to move the cursor around on the screen of a computer is called a mouse. It is a common input device that allows users to interact with the graphical user interface of a computer by moving the cursor and clicking on icons, buttons, and other elements on the screen. The mouse typically has two buttons and a scroll wheel to navigate through content on the screen efficiently.
25.
What type of device would someone use to call a friend?
Answer:
Telephone
Explanation:
A telephone is a device specifically designed for making voice calls to communicate with others. It is a common and traditional means of communication used to connect with friends, family, and colleagues. With the advancement of technology, telephones have evolved to include various features such as text messaging, video calls, and internet connectivity, making it a versatile tool for staying in touch with others.
26.
How can you control a TV set from far away?
Answer:
By Using A Remote Control
Explanation:
A remote control uses infrared signals to communicate with the TV set, allowing the user to change channels, adjust volume, and turn the TV on and off without having to be physically close to the device. The remote control sends specific commands to the TV set, which interprets these signals and carries out the desired actions, providing a convenient way to control the TV from a distance.
27.
What wireless technology replaced infrared?
Answer:
Bluetooth
Explanation:
Bluetooth technology replaced infrared because it offers a more reliable and faster connection between devices, has a longer range, and does not require direct line of sight for communication. Additionally, Bluetooth is more widely supported across various devices and has become the standard for wireless connectivity in many applications.
28.
What stores recently visited webpages for rapid access?
Answer:
Cache
Explanation:
The cache stores recently visited webpages for rapid access by storing copies of data that is frequently accessed or used. This helps to reduce loading times and improve overall performance by retrieving data quickly from the cache instead of having to fetch it from the original source every time it is needed.
29.
What is another term for technical specifications?
Answer:
Configuration
Explanation:
Technical specifications refer to the detailed description of the design and features of a product or system. Configuration is another term used to describe these specifications, as it outlines the specific settings, options, and components that make up the overall design and functionality of a product. In essence, configuration refers to the arrangement and customization of various elements to meet specific requirements or standards.
30.
What is PC and Mac compatible software called?
Answer:
Cross-Platform
Explanation:
Cross-Platform software is designed to be compatible with both PC and Mac operating systems, allowing users to access and use the software on either type of device. This term refers to the ability of the software to run seamlessly across different platforms, providing a consistent user experience regardless of the device being used.
31.
Use of the internet for criminal activity is called?
Answer:
Cybercrime
Explanation:
Cybercrime refers to the use of the internet for criminal activities such as hacking, phishing, identity theft, and spreading malware. This term encompasses a wide range of illegal activities that are conducted using technology and the internet as a medium. Cybercrime poses a significant threat to individuals, organizations, and governments, as it can result in financial loss, data breaches, and even national security risks.
32.
A hard drive's data is optimized through which process?
Answer:
Defragmenting
Explanation:
Defragmenting is the process of reorganizing the data on a hard drive so that files are stored in contiguous blocks, improving access times and overall performance. This optimization helps reduce fragmentation and prevent files from being scattered across different areas of the disk, making it easier for the computer to access and retrieve data efficiently.
33.
The "example" part in the URL "example.com" is what?
Answer:
Domain
Explanation:
The "example" part in the URL "example.com" is referred to as the domain. In a URL, the domain is the unique name that identifies a website. It is typically followed by a domain extension such as .com, .org, or .net. The domain is used to locate and access specific websites on the internet.
34.
What can only be read by the correct decoding key?
Answer:
Encryption
Explanation:
Encryption is the process of converting data into a code to prevent unauthorized access. The only way to decipher encrypted data is by using the correct decoding key. Without the key, the encrypted information remains unreadable and secure. This ensures that only authorized individuals with the correct key can access and interpret the encrypted data.
35.
Processor speed can be measured in which unit?
Answer:
Gigahertz
Explanation:
Processor speed is typically measured in Gigahertz, which represents billions of cycles per second. This unit is commonly used to quantify the clock speed of a processor, indicating how many instructions it can execute in a given amount of time. Gigahertz provides a standardized way to compare the processing power of different CPUs, with higher Gigahertz values generally indicating faster performance.
36.
What term means someone who commits digital crimes?
Answer:
Hacker
Explanation:
A hacker is a term used to describe someone who commits digital crimes by gaining unauthorized access to computer systems or networks. This individual may use their technical skills to exploit vulnerabilities in software or hardware for malicious purposes, such as stealing sensitive information, disrupting operations, or causing damage. Hackers can range from those who engage in cyber espionage to those who participate in cyber attacks for financial gain or ideological reasons.
37.
Ownership of an idea is defined as what?
Answer:
Intellectual Property
Explanation:
Ownership of an idea is defined as intellectual property, which refers to creations of the mind such as inventions, literary and artistic works, designs, symbols, names, and images used in commerce. Intellectual property rights give the creator exclusive rights to their creations, allowing them to benefit financially and have control over how their ideas are used or shared by others.
38.
What is a private network that uses TCP/IP called?
Answer:
Intranet
Explanation:
An intranet is a private network that uses TCP/IP protocols to securely share information within an organization. It allows for communication and collaboration among employees while maintaining restricted access to authorized users only. This network is isolated from the public internet, providing a secure environment for internal data sharing and communication.
39.
What computer term means one piece of keyboard input?
Answer:
Keystroke
Explanation:
A keystroke refers to a single press of a key on a keyboard, which registers as input on a computer. This term is commonly used to describe the action of pressing a key to input a character or command into a computer system. Each keystroke is a discrete unit of input that can trigger a specific action or function on the computer.
40.
What is the term for words typed into a search engine?
Answer:
Keywords
Explanation:
Keywords are the specific words or phrases that are typed into a search engine to find relevant information. By using keywords, users can narrow down search results and find exactly what they are looking for on the internet. Keywords play a crucial role in search engine optimization (SEO) as they help websites rank higher in search engine results pages when those keywords are used effectively.
41.
Which kind of media uses different formats?
Answer:
Multimedia
Explanation:
Multimedia is a type of media that incorporates various formats such as text, audio, video, and images to deliver information or entertainment. This allows for a more engaging and interactive experience for the audience, as they can access information through different mediums. By using different formats, multimedia can cater to different learning styles and preferences, making it a versatile and effective communication tool.
42.
What term means software that can run on different OS?
Answer:
Multiplatform
Explanation:
Multiplatform software refers to applications that are designed to run on multiple operating systems, providing compatibility across different platforms. This type of software allows users to access the same program regardless of the device or operating system they are using, making it versatile and convenient for a wide range of users.
43.
What type of internet broadcast works with the iPod?
Answer:
Podcast
Explanation:
Podcasts are a type of internet broadcast that works with the iPod. Podcasts are audio or video files that are available for streaming or download online, making them easily accessible for iPod users to listen to or watch on their device. This type of broadcast allows users to subscribe to specific shows or topics and listen to them at their convenience, making it a popular choice for iPod users looking for on-the-go entertainment.
44.
Which term refers to a standard computer keyboard?
Answer:
QWERTY
Explanation:
The term "QWERTY" refers to a standard computer keyboard layout that is commonly used in many countries. The name "QWERTY" comes from the arrangement of the first six letters in the top row of the keyboard. This layout was designed to prevent jamming on mechanical typewriters by placing commonly used letters apart from each other. Today, the QWERTY layout is still widely used in computer keyboards and is familiar to most users.
45.
What is DPI a measure of?
Answer:
Resolution
Explanation:
DPI stands for Dots Per Inch, which is a measure of resolution in printing and imaging. It indicates the number of individual dots that can be placed in a line within the span of one inch. Therefore, DPI is a measure of resolution, specifically in terms of how detailed an image or document can be when printed or displayed on a screen.
46.
Which acronym refers to the colors found in TV signals?
Answer:
RGB
Explanation:
RGB stands for Red, Green, Blue, which are the primary colors used in TV signals to create a wide range of colors by mixing different intensities of these three colors. By combining different amounts of red, green, and blue light, all other colors can be created on a television screen. This acronym is commonly used in the field of technology and media to refer to the colors used in digital displays and television broadcasts.
47.
What term describes a discussion on a bulletin board?
Answer:
Thread
Explanation:
A discussion on a bulletin board is commonly referred to as a thread. In this context, a thread is a series of messages or replies on a specific topic that are posted and organized in a linear fashion for users to read and respond to. Threads allow for conversations to flow and for users to easily follow and participate in discussions on bulletin boards or online forums.
48.
What is an average delivery rate over a channel called?
Answer:
Throughput
Explanation:
Throughput refers to the average delivery rate over a channel, indicating the amount of data that can be successfully transmitted within a given period of time. This term is commonly used in networking and communication systems to measure the efficiency and performance of data transfer.
49.
What term means deleting all records from a table?
Answer:
Truncate
Explanation:
Truncating a table means deleting all records from it in one operation, which is faster and more efficient than deleting each record individually. This operation also resets any auto-incrementing keys in the table.
50.
What increases "address space" to add memory?
Answer:
Virtual Memory
Explanation:
Virtual memory increases the "address space" by allowing the operating system to use a combination of RAM and disk space to store data that may not fit entirely in physical memory. This allows programs to access more memory than physically available, making it appear as if there is more memory than there actually is. This expansion of address space enables the addition of more memory to the system without the need for physically installing more RAM.
51.
What language do you use to make a virtual tour?
Answer:
VRML
Explanation:
Virtual tours are typically created using VRML (Virtual Reality Modeling Language). VRML is a file format and programming language used to create 3D graphics for virtual reality environments. It allows developers to define the geometry, appearance, and behavior of objects within a virtual space, making it an ideal choice for creating interactive and immersive virtual tours.
52.
What refers to wireless network components?
Answer:
Wi-Fi
Explanation:
Wi-Fi refers to wireless network components because it is a technology that allows electronic devices to connect to a wireless LAN (local area network) using radio waves. Wi-Fi enables devices such as smartphones, laptops, and tablets to access the internet without the need for physical wired connections, making it a key component of wireless networks.
53.
Internet users often connect with what connection type?
Answer:
ADSL
Explanation:
Internet users often connect with ADSL (Asymmetric Digital Subscriber Line) connection type because it allows for faster download speeds compared to traditional dial-up connections. ADSL uses existing telephone lines to transmit data, making it a cost-effective and widely available option for home and small business users. This type of connection provides a more stable and reliable internet experience, making it a popular choice for those who require consistent and high-speed internet access.
54.
What optical disc format is used by the Sony PS3?
Answer:
Blu-Ray
Explanation:
The Sony PS3 uses the Blu-Ray optical disc format, which allows for high-definition video playback and storage of large amounts of data. This format was chosen by Sony to provide users with a superior gaming and entertainment experience due to its high capacity and ability to deliver high-quality audio and video.
55.
What can be used to start a computer?
Answer:
Boot Disk
Explanation:
A boot disk is a removable storage device that contains the necessary files and software to start up a computer. When a computer is turned on, it looks for the operating system on the boot disk to load the necessary files and initiate the startup process. This allows the computer to begin running the operating system and other software applications stored on the disk.
56.
Hardware working like another device is called what?
Answer:
Clone
Explanation:
When hardware is working like another device, it is referred to as a clone. This term is commonly used to describe a device that closely resembles or emulates the functionality of another device. Cloning can involve replicating the design, features, or performance of the original hardware in order to create a similar or compatible product.
57.
What is the most common LAN connection?
Answer:
Ethernet
Explanation:
Ethernet is the most common LAN connection due to its widespread availability, reliability, and cost-effectiveness. It allows for high-speed data transfer between devices within a local area network, making it a popular choice for both home and business networks. Ethernet technology has evolved over the years to support faster speeds and greater bandwidth, ensuring its continued dominance in the realm of LAN connections.
58.
Which takes heat away from delicate components?
Answer:
Heat Sink
Explanation:
A heat sink is designed to absorb and dissipate heat generated by delicate components, such as processors or graphics cards, in order to prevent them from overheating. By providing a larger surface area for heat to transfer to, a heat sink helps to keep these components at a safe operating temperature, prolonging their lifespan and preventing damage.
59.
What piece of computer hardware is abbreviated as "NIC"?
Answer:
Network Interface Card
Explanation:
A Network Interface Card (NIC) is a piece of computer hardware that allows computers to connect to a network. It is responsible for facilitating communication between the computer and the network by providing a physical connection for data to be transmitted and received. NICs are essential for enabling devices to access the internet, share files, and communicate with other devices on the same network.
60.
Keyboards and monitors are examples of what devices?
Answer:
Peripheral
Explanation:
Keyboards and monitors are considered peripheral devices because they are external devices that connect to a computer to provide input (keyboard) and output (monitor) functions. Peripherals are devices that are not essential to the basic functioning of a computer but enhance its capabilities and user experience. These devices can be easily connected and disconnected from the computer as needed.
61.
What, connected to the motherboard, prevents lag time?
Answer:
RAM
Explanation:
RAM, or Random Access Memory, is a type of computer memory that is directly connected to the motherboard. It is used to temporarily store data that the CPU needs to access quickly. By having more RAM, the computer can store more data for quick access, which helps prevent lag time by allowing the CPU to quickly retrieve the necessary information to perform tasks efficiently.
62.
What device performs services for computers?
Answer:
Server
Explanation:
A server is a type of computer system that provides services or resources to other computers on a network. It can perform various tasks such as hosting websites, storing files, managing email, and running applications. Servers are designed to handle multiple requests from clients and are optimized for reliability, performance, and security. They play a crucial role in enabling communication and data sharing among computers in a network.
63.
In 2008, what was the most common computer port?
Answer:
USB
Explanation:
In 2008, USB ports had become the most common computer port due to their versatility, ease of use, and ability to connect a wide range of devices such as keyboards, mice, printers, and external storage devices. The widespread adoption of USB technology by computer manufacturers and the increasing popularity of USB flash drives contributed to making USB the dominant port in 2008.
64.
What is a free toolbar with online advertisements an example of?
Answer:
Adware
Explanation:
A free toolbar with online advertisements is an example of adware, which is software that displays advertisements on a user's computer. Adware is often bundled with free software downloads and can track user behavior to display targeted ads. While adware may be considered unwanted by some users, it is not necessarily harmful like malware, as its main purpose is to generate revenue through advertising.
65.
A script for e-mail replying is called what?
Answer:
Autoresponder
Explanation:
An autoresponder is a script or program designed to automatically respond to incoming emails. It is commonly used to send out automated responses or messages to individuals who have sent an email to a particular address. Autoresponders are helpful for businesses and individuals who receive a high volume of emails and want to ensure that each message is acknowledged in a timely manner.
66.
What data, sent to a browser, tracks website use?
Answer:
A Cookie
Explanation:
Cookies are small pieces of data sent from a website and stored on a user's computer by the user's web browser while the user is browsing. They are used to track website usage, such as remembering login information, user preferences, and tracking user behavior on the site. Cookies allow websites to provide a personalized user experience and gather valuable data for analytics and marketing purposes.
67.
Core Force is an example of what protective software?
Answer:
Firewall
Explanation:
Core Force is an example of a firewall, which is a type of protective software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Firewalls act as a barrier between a trusted internal network and untrusted external networks, such as the internet, to prevent unauthorized access and protect against cyber threats. Core Force specifically focuses on providing network security by filtering traffic and blocking potentially harmful connections.
68.
FTP stands for file transfer what?
Answer:
Protocol
Explanation:
FTP stands for File Transfer Protocol, which is a standard network protocol used for transferring files between a client and a server on a computer network. It provides a simple and efficient way to transfer files securely over a TCP/IP network.
69.
What is a bridge between two networks?
Answer:
Gateway
Explanation:
A gateway is a network node that connects two different networks, allowing them to communicate with each other. It acts as a bridge by translating data between the different network protocols used by each network. This enables devices on one network to access resources on the other network, facilitating seamless communication and data transfer between the two networks.
70.
What protocol did Tim Berners-Lee invent in 1989?
Answer:
HTTP
Explanation:
Tim Berners-Lee invented the Hypertext Transfer Protocol (HTTP) in 1989. This protocol is the foundation of data communication on the World Wide Web, allowing for the transfer of information between a web server and a web browser. HTTP enables the retrieval of resources such as HTML documents, images, and videos, making it a crucial component of the internet as we know it today.
71.
What body managed domain-name allocations until 1998?
Answer:
InterNIC
Explanation:
InterNIC was the organization responsible for managing domain-name allocations until 1998. It was a collaborative project between Network Solutions, Inc., AT&T, and General Atomics, tasked with overseeing the registration and allocation of domain names, IP addresses, and other internet-related tasks.
72.
What type of company provides access to the Internet?
Answer:
ISP
Explanation:
An ISP, or Internet Service Provider, is a type of company that provides individuals and organizations with access to the Internet. ISPs typically offer a range of services including internet connectivity, email services, web hosting, and more. Customers pay a subscription fee to an ISP in order to connect to the internet and access online content and services.
73.
What syntax-based language integrates into HTML pages?
Answer:
JavaScript
Explanation:
JavaScript is a syntax-based language that can be easily integrated into HTML pages to add dynamic functionality and interactivity. It is commonly used for client-side scripting to create interactive elements on websites, validate forms, and manipulate the content of a webpage. By embedding JavaScript code within HTML pages, developers can enhance user experience and create more engaging web applications.
74.
Which of the following helps translate domains to IPs?
Answer:
Name Server
Explanation:
Name Servers help translate domain names to IP addresses by storing a database of domain names and their corresponding IP addresses. When a user enters a domain name into their web browser, the Name Server is queried to find the associated IP address, allowing the user to access the desired website. This process is crucial for the functioning of the internet as it enables users to easily navigate to websites using human-readable domain names instead of complex numerical IP addresses.
75.
Attempting to steal personal data through emails is called what?
Answer:
Phishing
Explanation:
Phishing is a type of cyber attack where attackers attempt to steal personal information such as login credentials, credit card numbers, or other sensitive data by posing as a trustworthy entity in an electronic communication. This is typically done through deceptive emails that appear to be from legitimate sources, tricking recipients into providing their information unknowingly.
76.
What adjustments create higher search engine ranking?
Answer:
SEO
Explanation:
The term "SEO" stands for search engine optimization, which refers to the process of making adjustments to a website in order to improve its visibility and ranking on search engine results pages. By implementing various SEO techniques such as optimizing content, improving website structure, and building quality backlinks, a website can increase its chances of ranking higher in search engine results. These adjustments help search engines better understand the relevance and authority of a website, ultimately leading to improved rankings.
77.
What is the email equivalent of junk mail called?
Answer:
Spam
Explanation:
Spam refers to unsolicited and often irrelevant or inappropriate emails sent in bulk to a large number of recipients. This term originates from a Monty Python sketch where the word "spam" is repeated excessively, similar to how these unwanted emails can overwhelm an inbox. Just like junk mail that clogs up physical mailboxes, spam inundates email accounts with unwanted messages.
78.
What type of program scours the internet for data?
Answer:
Spider
Explanation:
A spider is a type of program used to automatically browse the internet and collect data from websites. It works by following links from one webpage to another, indexing information as it goes. This process allows spiders to gather a large amount of data quickly and efficiently, making them a valuable tool for tasks such as web scraping and search engine optimization.
79.
What is the term for faking an identity online?
Answer:
Spoofing
Explanation:
Spoofing is the term used to describe the act of faking an identity online. This can involve creating fake accounts, pretending to be someone else, or using false information to deceive others. Spoofing is commonly used in phishing scams, hacking attempts, and other malicious activities where the perpetrator is trying to hide their true identity.
80.
What is the technology which allows video to be viewed while it downloads called?
Answer:
Streaming
Explanation:
Streaming is the technology that enables videos to be viewed while they are still downloading. This process involves the continuous transmission of data over a network, allowing users to watch the content in real-time without having to wait for the entire file to download first. Streaming technology has revolutionized the way we consume media, providing instant access to a wide range of videos and other content online.
81.
Which network is similar to LAN but larger?
Answer:
WAN
Explanation:
A WAN (Wide Area Network) is similar to a LAN (Local Area Network) but covers a larger geographical area. WANs connect multiple LANs over long distances, typically using leased lines or satellite links. This allows for communication and data sharing between different locations or offices within a company or organization. WANs are commonly used by businesses to connect their offices spread across different cities or countries.
82.
What service finds information about a domain?
Answer:
WHOIS
Explanation:
WHOIS is a service that allows users to find information about a domain, such as the owner's contact information, registration date, and expiration date. This service is commonly used by individuals and organizations to gather information about a particular domain name before making decisions related to purchasing or using that domain.
83.
What is a website allowing users to edit content?
Answer:
Wiki
Explanation:
A wiki is a type of website that allows users to collaboratively create, edit, and manage content. It enables multiple users to contribute and modify content, making it a popular platform for knowledge sharing and collaboration. Wikis are known for their ease of use and ability to track changes, making it a valuable tool for projects requiring input from multiple individuals.
84.
Which is a language used in creating web pages?
Answer:
XHTML
Explanation:
XHTML is a language used in creating web pages because it is a markup language that defines the structure and content of a web page. It is an extension of HTML and follows stricter rules for syntax and formatting, making it more compatible with modern web browsers. By using XHTML, web developers can ensure that their web pages are well-structured, accessible, and compatible with different devices and platforms.
85.
What was the first book that Johannes Gutenberg produced with his printing press?
Answer:
The Bible
Explanation:
Johannes Gutenberg's first book produced with his printing press was the Bible. This monumental work, known as the Gutenberg Bible, played a significant role in the spread of literacy and the Protestant Reformation. Its production marked a turning point in the history of printing and had a lasting impact on the dissemination of knowledge and information.
86.
On April 15, 1738, you could open a bottle using what?
Answer:
Bottle Opener
Explanation:
On April 15, 1738, bottle openers were commonly used to open bottles. This invention made it easier and more efficient to access the contents of a sealed bottle, providing a convenient solution for individuals wanting to enjoy a drink without struggling to open the bottle using other methods. The use of a bottle opener would have been a practical and essential tool for anyone looking to enjoy a beverage on that date.
87.
Who first tested a lightning rod in 1752?
Answer:
Benjamin Franklin
Explanation:
Benjamin Franklin first tested a lightning rod in 1752 as part of his experiments to understand electricity and lightning. His famous kite experiment demonstrated that lightning is a form of electricity and led to the invention of the lightning rod, which is used to protect buildings from lightning strikes by safely conducting the electrical charge to the ground.
88.
In 1765, Eberhard added what to pencils?
Answer:
Erasers
Explanation:
Eberhard added erasers to pencils in 1765 to provide a convenient tool for correcting mistakes and making revisions while writing or drawing. This addition revolutionized the functionality of pencils, making them more versatile and practical for everyday use. The introduction of erasers to pencils allowed for cleaner and more precise work, ultimately improving the overall writing and drawing experience for users.
89.
Self-contained underwater breathing apparatus is what?
Answer:
S.C.U.B.A. Gear
Explanation:
S.C.U.B.A. gear stands for Self-contained underwater breathing apparatus gear, which is a system that allows divers to breathe underwater without being connected to a surface air supply. This gear typically includes a tank of compressed air, a regulator to control airflow, a mouthpiece or mask for breathing, and other necessary equipment for underwater exploration.
90.
Peter Roget invented the slide rule and what word book?
Answer:
Thesaurus
Explanation:
Peter Roget did not invent the slide rule; he is actually best known for creating the thesaurus, a book of synonyms and antonyms. The thesaurus has been widely used as a reference tool for finding alternative words and expanding one's vocabulary. It is a valuable resource for writers, students, and anyone looking to improve their language skills.
91.
What element was named after the planet Uranus?
Answer:
Uranium
Explanation:
Uranium was named after the planet Uranus because both the element and the planet were discovered around the same time period in the late 18th century. The element was named after Uranus as a way to honor the newly discovered planet, following the tradition of naming elements after celestial bodies. Uranium's name is derived from Uranus, the seventh planet from the sun in our solar system.
92.
Who invented the cotton gin?
Answer:
Eli Whitney
Explanation:
Eli Whitney is credited with inventing the cotton gin in 1793. The cotton gin revolutionized the cotton industry by making the process of separating cotton fibers from seeds much more efficient. This invention had a significant impact on the economy of the southern United States by increasing the profitability of cotton production and leading to an increase in the demand for slave labor to work in the cotton fields.
93.
In 1822, C. Graham patented what type of teeth?
Answer:
False
94.
After an 1824 glass shortage, what held milk?
Answer:
Paper Carton
Explanation:
After the glass shortage in 1824, paper cartons were used to hold milk as an alternative packaging solution. This innovation allowed for a more convenient and practical way to transport and store milk without relying on glass containers. The paper carton also provided a more cost-effective and eco-friendly option compared to glass, making it a popular choice for packaging liquids like milk.
95.
A series of dots and dashes are used in what?
Answer:
Morse Code
Explanation:
Morse Code is a method of communication using a series of dots and dashes to represent letters, numbers, and punctuation. It was historically used in telegraphy and radio communication, allowing messages to be transmitted over long distances using sound or light signals. The dots and dashes, also known as dits and dahs, are combined to form characters and words in the code.
96.
Who first vulcanized rubber?
Answer:
Charles Goodyear
Explanation:
Charles Goodyear is credited with first vulcanizing rubber, a process of treating rubber with sulfur to improve its elasticity and durability. He accidentally discovered this method in 1839 when he dropped a mixture of rubber and sulfur on a hot stove, resulting in a more durable and flexible material. This discovery revolutionized the rubber industry and led to the widespread use of rubber in various applications.
97.
Where would you find a Pullman sleeping car?
Answer:
Train
Explanation:
A Pullman sleeping car is a type of railway passenger car designed for overnight travel, equipped with sleeping berths and other amenities to provide a comfortable experience for passengers. These cars are typically found on long-distance train routes where passengers may need to sleep during the journey.
98.
Mr. Bell's first phone call was to whom?
Answer:
Mr. Watson
Explanation:
Alexander Graham Bell's first phone call was to his assistant, Mr. Watson. Bell famously said "Mr. Watson, come here, I want to see you" during that historic call, which marked the beginning of the era of telecommunications. Watson was instrumental in helping Bell develop the telephone and was present during many of the key moments in its invention and early use.
99.
Who first demonstrated an electric light in Menlo Park?
Answer:
Thomas Edison
Explanation:
Thomas Edison first demonstrated an electric light in Menlo Park. He is credited with inventing the first commercially practical incandescent light bulb, which revolutionized the way we illuminate our homes and cities. Edison's work on electric lighting laid the foundation for the modern lighting industry and paved the way for further advancements in technology.
100.
Who first patented the Kodak box camera?
Answer:
George Eastman
Explanation:
George Eastman was the first to patent the Kodak box camera. He revolutionized photography by making it more accessible to the general public with his invention of the camera, which was easy to use and affordable. This invention marked the beginning of Eastman's successful career in the photography industry, ultimately leading to the founding of the Eastman Kodak Company.