Mock Computer Competency Test Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Bharris
B
Bharris
Community Contributor
Quizzes Created: 2 | Total Attempts: 15,476
Questions: 60 | Attempts: 15,070

SettingsSettingsSettings
Mock Computer Competency Test Quiz - Quiz

Are you confident that you can pass this mock computer competency test quiz? This is a pre-assessment (diagnostic) for Computer Skills: Implementation and Integration. This test will help you gauge your computer competency. There are many questions in this quiz that you have to answer, and in the end, your score will give you an idea of how well you understand the topic and how more you have to learn. Good luck!


Questions and Answers
  • 1. 

    What is similar to a copy machine, except that it creates a digital file of the image?

    • A.

      A fax machine

    • B.

      A digitizer

    • C.

      A scanner

    • D.

      None of these

    Correct Answer
    C. A scanner
    Explanation
    A scanner is similar to a copy machine in that it can create a digital file of an image. While a copy machine creates a physical copy of a document, a scanner captures the image and converts it into a digital file that can be stored, edited, or shared electronically. This allows for easy duplication and manipulation of the image without the need for physical copies. A fax machine, on the other hand, transmits a document electronically over a telephone line. A digitizer is a device that converts analog signals into digital data, but it is not specifically used for creating digital files of images.

    Rate this question:

  • 2. 

    What software would you most likely use to compare the average snowfall from several locations?

    • A.

      Spreadsheet

    • B.

      Database

    • C.

      Word Processor

    • D.

      CMD

    Correct Answer
    A. Spreadsheet
    Explanation
    A spreadsheet software is the most suitable tool for comparing the average snowfall from several locations. Spreadsheets allow you to organize and analyze data in a tabular format, making it easy to input and manipulate numerical data. You can easily calculate the average snowfall by using formulas and functions in a spreadsheet. Additionally, you can create charts and graphs to visually compare the snowfall data from different locations, helping you to identify patterns or trends.

    Rate this question:

  • 3. 

    What is a web browser plug-in?

    • A.

      A program that adds a specific feature to the browser allowing it to play or view certain files

    • B.

      A port in a computer that connects printers and PCs

    • C.

      A CD that you must use while on the InternetQ

    Correct Answer
    A. A program that adds a specific feature to the browser allowing it to play or view certain files
    Explanation
    A web browser plug-in is a program that enhances the functionality of a web browser by adding specific features that allow it to play or view certain files. These plug-ins are designed to extend the capabilities of the browser beyond its default capabilities, enabling users to access and interact with various types of multimedia content, such as videos, audio files, or interactive applications, directly within the browser window. This eliminates the need for separate software or applications to handle specific file types, providing a more seamless and convenient browsing experience.

    Rate this question:

  • 4. 

    The process of making readable data into unreadable (nonsense) characters is called:

    • A.

      Call back

    • B.

      Encryption

    • C.

      Phishing

    • D.

      Word

    Correct Answer
    B. Encryption
    Explanation
    Encryption is the process of converting readable data into unreadable characters to ensure its confidentiality and security. It involves the use of algorithms and keys to transform the data into a format that can only be deciphered by authorized individuals or systems with the corresponding decryption key. This technique is commonly used to protect sensitive information, such as personal data, financial records, and communication channels, from unauthorized access or interception.

    Rate this question:

  • 5. 

    In the e-mail address "[email protected]", the domain is:

    • A.

      Model

    • B.

      Sllboces

    • C.

      .org

    • D.

      None of these

    Correct Answer
    B. Sllboces
    Explanation
    The domain in an email address is the part that comes after the "@" symbol. In this case, the domain is "sllboces.org".

    Rate this question:

  • 6. 

    Guidelines written to protect the original work of others:

    • A.

      Acceptable Use Policy

    • B.

      Netiquette

    • C.

      Terms and conditions

    • D.

      Fair Use Rules

    Correct Answer
    D. Fair Use Rules
    Explanation
    Fair Use Rules are guidelines that are designed to protect the original work of others while allowing limited use of copyrighted material without permission from the copyright owner. These rules provide a framework for determining whether the use of copyrighted material is fair or infringing. They consider factors such as the purpose and character of the use, the nature of the copyrighted work, the amount and substantiality of the portion used, and the effect of the use on the market for the original work. Fair Use Rules help to balance the rights of copyright holders with the need for creativity and expression.

    Rate this question:

  • 7. 

    An uninstaller is a utility program that:

    • A.

      Removes a program from a computer

    • B.

      Removes viruses from a computer's memory bank

    • C.

      Reduces the size of the memory on a computer

    • D.

      None of these

    Correct Answer
    A. Removes a program from a computer
    Explanation
    An uninstaller is a utility program that removes a program from a computer. It is designed to cleanly remove all the files, folders, and registry entries associated with the program, ensuring that no traces are left behind. This helps in freeing up disk space and maintaining the overall performance of the computer.

    Rate this question:

  • 8. 

    When you change the color and background of a chart in a spreadsheet, you are:

    • A.

      Merging

    • B.

      Calculating

    • C.

      Adding

    • D.

      Formatting

    Correct Answer
    D. Formatting
    Explanation
    When you change the color and background of a chart in a spreadsheet, you are formatting. Formatting refers to the process of changing the appearance of data or objects in a document to enhance its visual appeal or to convey specific information. In this case, changing the color and background of a chart helps to make it more visually appealing or to highlight certain data points or trends.

    Rate this question:

  • 9. 

    To find the average daily amount of rainfall over a four-week period, which software program would be the BEST to use to record data and find the average?

    • A.

      Database

    • B.

      Spreadsheet

    • C.

      Word Processor

    • D.

      CMD

    Correct Answer
    B. Spreadsheet
    Explanation
    A spreadsheet would be the best software program to use to record data and find the average daily amount of rainfall over a four-week period. Spreadsheets allow for easy organization and manipulation of data, making it simple to input and calculate the average rainfall for each day. Additionally, spreadsheets have built-in functions that can quickly calculate averages, saving time and effort in the data analysis process.

    Rate this question:

  • 10. 

    Getting into someone else's computer without their permission is called:

    • A.

      Spamming

    • B.

      Attacking

    • C.

      Hacking

    • D.

      Phishing

    Correct Answer
    C. Hacking
    Explanation
    Hacking refers to the unauthorized access or intrusion into someone else's computer system or network without their permission. It involves bypassing security measures to gain control over the system, steal information, or cause damage. Hacking is a serious offense and is considered illegal in most jurisdictions.

    Rate this question:

  • 11. 

    Adding your comments to a blog or forum is called

    • A.

      Posting

    • B.

      Phishing

    • C.

      Streaming

    • D.

      Privacy

    Correct Answer
    A. Posting
    Explanation
    Adding comments to a blog or forum is commonly referred to as "posting". This term is used to describe the action of sharing thoughts, opinions, or information on an online platform for others to see and engage with. It is a way for individuals to contribute to discussions and participate in online communities.

    Rate this question:

  • 12. 

    Clickable words on a Web page that direct you to another Web page or file are called:

    • A.

      Buttons

    • B.

      Hyperlinks

    • C.

      Icons

    • D.

      Marks

    Correct Answer
    B. Hyperlinks
    Explanation
    Hyperlinks are clickable words or phrases on a web page that redirect users to another web page or file when clicked. They are commonly used to navigate between different pages on a website or to access external resources. Buttons, icons, and marks are also elements commonly found on web pages, but they may not necessarily redirect users to other pages or files.

    Rate this question:

  • 13. 

    The simulation of a real or imagined environment that appears as a three-dimensional (3-D) space is called:

    • A.

      Animation

    • B.

      Virtual Reality

    • C.

      Graphics

    • D.

      None of these

    Correct Answer
    B. Virtual Reality
    Explanation
    Virtual reality refers to the simulation of a real or imagined environment that appears as a three-dimensional space. It involves the use of computer technology to create a completely immersive experience for the user, allowing them to interact with and explore the virtual environment. This can be achieved through the use of specialized hardware, such as headsets or gloves, that track the user's movements and provide a sense of presence within the virtual world. Virtual reality is often used in various fields, including gaming, training, education, and entertainment.

    Rate this question:

  • 14. 

    Which of the following is an example of an image file?

    • A.

      .mp3

    • B.

      .exe

    • C.

      .mp4

    • D.

      .jpeg

    Correct Answer
    D. .jpeg
    Explanation
    .jpeg is an example of an image file because it is a file format commonly used for storing digital images. It is a compressed file format that allows for high-quality images with relatively small file sizes. .mp3, .exe, and .mp4 are file formats used for audio and video files, not images.

    Rate this question:

  • 15. 

    You have asked students to write a report on "How the Civil War Affected the Economy in the South." Which Boolean operators should they start with when conducting an Internet search?

    • A.

      Civil War NOT Economy

    • B.

      Civil War OR Economy

    • C.

      Civil War AND Economy

    Correct Answer
    C. Civil War AND Economy
    Explanation
    When conducting an Internet search for information on how the Civil War affected the economy in the South, students should start with the Boolean operator "AND". This is because they are looking for information that includes both the terms "Civil War" and "Economy". Using "AND" will narrow down the search results and provide more relevant information specifically related to the impact of the Civil War on the economy in the South.

    Rate this question:

  • 16. 

    The first thing to consider when developing a multimedia presentation is:

    • A.

      The audience

    • B.

      The font size

    • C.

      The design template

    • D.

      None of these

    Correct Answer
    A. The audience
    Explanation
    When developing a multimedia presentation, the first thing to consider is the audience. The audience's needs, preferences, and level of understanding should be taken into account in order to create a presentation that effectively communicates the intended message. By considering the audience, the presenter can tailor the content, tone, and style of the presentation to ensure maximum engagement and comprehension.

    Rate this question:

  • 17. 

    Which feature of your word processing program would you use to send a form letter to a group of names and addresses:

    • A.

      Spell Check

    • B.

      Sort and Send

    • C.

      Mail Merge

    • D.

      Formatting

    Correct Answer
    C. Mail Merge
    Explanation
    Mail Merge is the correct answer because it is a feature in word processing programs that allows users to create personalized documents, such as form letters, by merging a main document with a data source that contains names and addresses. This feature automates the process of sending the same letter to multiple recipients with personalized information, saving time and effort for the user.

    Rate this question:

  • 18. 

    Software that blocks access to certain websites is called __________ software.

    • A.

      Filtering

    • B.

      Firewall

    • C.

      Spam

    • D.

      None of these

    Correct Answer
    A. Filtering
    Explanation
    The given question asks for the name of the software that blocks access to certain websites. Among the options provided, "Filtering" is the correct answer. Filtering software is specifically designed to restrict or limit access to certain websites based on predefined criteria or settings. It allows users to control the content that can be accessed on their devices or networks, making it an effective tool for internet safety and security.

    Rate this question:

  • 19. 

    This word processing feature allows information to be organized in rows and columns:

    • A.

      Format

    • B.

      Tables

    • C.

      Tools

    • D.

      Apps

    Correct Answer
    B. Tables
    Explanation
    Tables are a word processing feature that allows information to be organized in rows and columns. They are used to present data in a structured and easy-to-read format, making it easier for readers to understand and analyze the information. Tables are commonly used in documents such as reports, presentations, and spreadsheets to display data in a systematic manner. They provide a clear visual representation of data, making it convenient to compare and contrast different values or categories.

    Rate this question:

  • 20. 

    A computer virus is transmitted MOST often through:

    • A.

      Websites

    • B.

      Software

    • C.

      Audio files

    • D.

      Email attachments

    Correct Answer
    D. Email attachments
    Explanation
    Email attachments are the most common method of transmitting computer viruses. This is because email attachments can contain malicious code or executable files that, when opened, can infect the recipient's computer. Cybercriminals often use email attachments as a way to trick users into downloading and executing the virus unknowingly. Therefore, it is important to be cautious when opening email attachments and to ensure they are from a trusted source before opening them.

    Rate this question:

  • 21. 

    Which of these is the best way to find websites containing information about the history of Georgia?

    • A.

      Instant message your friend

    • B.

      E-mail the webmaster of your school webpage

    • C.

      Type the words "georgia" and history in a search engine

    • D.

      None of these

    Correct Answer
    C. Type the words "georgia" and history in a search engine
    Explanation
    Typing the words "georgia" and history in a search engine is the best way to find websites containing information about the history of Georgia because search engines are specifically designed to search for and retrieve relevant information from the internet. By typing these keywords, the search engine will generate a list of websites that are likely to contain information about the history of Georgia, making it easier for the user to find the desired information.

    Rate this question:

  • 22. 

    In the Internet address "www.canton.edu," the ".edu" indicates:

    • A.

      The type of organization represented by the address

    • B.

      The accuracy of the information in the address

    • C.

      The date of the information in the addresse address

    • D.

      None of these

    Correct Answer
    A. The type of organization represented by the address
    Explanation
    The ".edu" in the internet address "www.canton.edu" indicates the type of organization represented by the address. In this case, it suggests that the website belongs to an educational institution.

    Rate this question:

  • 23. 

    When searching for a topic using a web search engine, which are the best Boolean operators to use with your keywords to get better results:

    • A.

      AND, OR & NOT in the search

    • B.

      IF, THEN & WHAT in the search

    • C.

      HOW, WHEN & WHY in the search

    • D.

      WHICH, WHEN, and HOW

    Correct Answer
    A. AND, OR & NOT in the search
    Explanation
    Using the Boolean operators AND, OR, and NOT in a web search allows for more precise and targeted results. The operator AND narrows down the search by including all the specified keywords, while OR broadens the search by including any of the specified keywords. The operator NOT excludes certain keywords from the search results. By combining these operators effectively, users can refine their search and find the most relevant information.

    Rate this question:

  • 24. 

    Copying copyright protected software and giving it to others for free is:

    • A.

      Always allowed

    • B.

      A criminal act

    • C.

      Fair use

    • D.

      None of these

    Correct Answer
    B. A criminal act
    Explanation
    Copying copyright protected software and giving it to others for free is considered a criminal act because it violates the rights of the software owner. Copyright laws protect the exclusive rights of the creator or owner of a work, including software, and unauthorized copying and distribution infringes upon those rights. Such actions are illegal and can lead to legal consequences, including fines and penalties.

    Rate this question:

  • 25. 

    What does multitasking mean?

    • A.

      The computer's ability to have more than one type of storage device

    • B.

      The computer's ability to store more than one type of document

    • C.

      The computer's ability to copy a large file with high-speed

    • D.

      The computer's ability to run several programs at the same time

    Correct Answer
    D. The computer's ability to run several programs at the same time
    Explanation
    Multitasking refers to the computer's ability to run multiple programs simultaneously. This means that the computer can execute multiple tasks or processes concurrently, allowing the user to switch between different applications without having to wait for one program to finish before starting another. Multitasking enhances efficiency and productivity by utilizing the computer's processing power effectively and maximizing its resources.

    Rate this question:

  • 26. 

    MP3 and WAV files are examples of:

    • A.

      Audio sound files

    • B.

      Video files

    • C.

      Graphics files

    • D.

      None of these

    Correct Answer
    A. Audio sound files
    Explanation
    MP3 and WAV files are examples of audio sound files. Both MP3 and WAV formats are commonly used for storing and playing audio recordings. MP3 files are compressed audio files that provide high-quality sound with smaller file sizes, making them suitable for music and audio playback on various devices. WAV files, on the other hand, are uncompressed audio files that preserve the original sound quality but result in larger file sizes. These formats are widely supported and compatible with most media players and devices, making them popular choices for storing and sharing audio content.

    Rate this question:

  • 27. 

    To run power hungry programs such as video editing software the computer needs a lot of:

    • A.

      ROM

    • B.

      REM

    • C.

      PIXELS

    • D.

      RAM

    Correct Answer
    D. RAM
    Explanation
    RAM stands for Random Access Memory, and it is a type of computer memory that is used to store data that is being actively used by the computer. Power hungry programs, such as video editing software, require a lot of RAM because they need to store and process large amounts of data in real-time. RAM allows the computer to quickly access and manipulate this data, which is essential for running these types of programs smoothly. Therefore, to run power hungry programs like video editing software, the computer needs a lot of RAM.

    Rate this question:

  • 28. 

    Computer-based models of real-life situations are called:

    • A.

      Simulations

    • B.

      Virtual Mark Up

    • C.

      Computer-based training

    • D.

      None of these

    Correct Answer
    A. Simulations
    Explanation
    Computer-based models that replicate real-life situations are referred to as simulations. Simulations are designed to imitate the behavior and characteristics of the real-world scenario they represent. They are used in various fields such as training, research, and entertainment to provide a realistic and interactive experience. Simulations can be used to study complex systems, test hypotheses, train individuals in specific skills, or even simulate scenarios that are too dangerous or costly to recreate in real life. Virtual Mark Up and Computer-based training are not the correct terms for computer-based models of real-life situations, hence the answer is simulations.

    Rate this question:

  • 29. 

    Which of the following is always legal when you buy a computer game on a CD-ROM?

    • A.

      Burn copies on CDs and give them to your friends.

    • B.

      Load the game on one computer that you use.

    • C.

      Load the game on all of the computers that you use.

    • D.

      None of these

    Correct Answer
    B. Load the game on one computer that you use.
    Explanation
    When you buy a computer game on a CD-ROM, it is always legal to load the game on one computer that you use. This means that you can install and play the game on a single computer that belongs to you. However, it is not legal to burn copies of the game on CDs and give them to your friends, as this would be a violation of copyright laws. Additionally, loading the game on all of the computers that you use is also not legal, as it would exceed the scope of the license agreement for the game. Therefore, the correct answer is to load the game on one computer that you use.

    Rate this question:

  • 30. 

    Which of the following activities would be best accomplished using a spreadsheet?

    • A.

      Peer-edit each other's reports

    • B.

      Change fonts and colors to emphasize important text

    • C.

      Generate a graph of students' favorite sports

    • D.

      None of these

    Correct Answer
    C. Generate a graph of students' favorite sports
    Explanation
    A spreadsheet is a software application that is specifically designed for organizing, analyzing, and presenting data in a tabular form. It allows users to input data, perform calculations, and create visual representations such as graphs and charts. In this case, generating a graph of students' favorite sports would be best accomplished using a spreadsheet because it involves organizing and analyzing data to create a visual representation. The other activities mentioned, such as peer-editing reports and changing fonts and colors, can be done using word processing software or presentation software, but they do not require the data organization and analysis capabilities of a spreadsheet.

    Rate this question:

  • 31. 

    What does .edu in an e-mail address or URL indicate?

    • A.

      A commercial company

    • B.

      An organization

    • C.

      A business website

    • D.

      A college or university

    Correct Answer
    D. A college or university
    Explanation
    The presence of .edu in an e-mail address or URL typically indicates that the entity associated with it is a college or university. This is because .edu is a top-level domain specifically reserved for educational institutions in the United States. Therefore, if an e-mail address or URL contains .edu, it is likely that it belongs to a college or university rather than a commercial company, organization, or business website.

    Rate this question:

  • 32. 

    AltaVista, Excite, InfoSeek, Lycos, Google, Snap, Dogpile -AT and Yahoo are popular:

    • A.

      Informational listservs

    • B.

      Web search engines

    • C.

      Discussion threads

    • D.

      None of these

    Correct Answer
    B. Web search engines
    Explanation
    The given answer is "Web search engines". This is because the list of websites mentioned (AltaVista, Excite, InfoSeek, Lycos, Google, Snap, Dogpile, and Yahoo) are all well-known search engines. They are platforms that allow users to search for information on the internet by entering keywords or phrases. These search engines index web pages and provide relevant results to the users based on their search queries.

    Rate this question:

  • 33. 

    The connecting of computers so that information can be shared is called:

    • A.

      Surfing

    • B.

      Phishing

    • C.

      Networking

    • D.

      None of these

    Correct Answer
    C. Networking
    Explanation
    Networking refers to the process of connecting computers together so that they can communicate and share information with each other. It involves the use of hardware devices such as routers, switches, and cables, as well as software protocols and configurations. Networking allows for the sharing of resources, such as files and printers, and enables communication between users, whether they are in the same location or in different parts of the world. It is an essential component of modern computer systems and is used in various settings, including homes, offices, and data centers.

    Rate this question:

  • 34. 

    When planning a database, what is the first step?

    • A.

      Select a font

    • B.

      Select a background color

    • C.

      Select fields

    • D.

      None of these

    Correct Answer
    C. Select fields
    Explanation
    The first step in planning a database is to select fields. This involves identifying the specific data that needs to be stored in the database and determining the appropriate fields or columns to accommodate that data. By selecting fields at the beginning of the planning process, it becomes easier to organize and structure the database effectively. Choosing the right fields sets the foundation for the entire database design and ensures that it can accurately capture and store the required information.

    Rate this question:

  • 35. 

    Which of the following types of files CANNOT be opened in a word processing software?

    • A.

      .doc

    • B.

      .txt

    • C.

      .tmt

    • D.

      .dat

    Correct Answer
    D. .dat
    Explanation
    .dat files cannot be opened in a word processing software because they are typically data files that contain raw data and are not meant to be viewed or edited as text. Word processing software is designed to open and edit text-based files such as .doc and .txt, but it does not have the capability to interpret or display the content of .dat files. Therefore, .dat files cannot be opened in a word processing software.

    Rate this question:

  • 36. 

    A file that records a user's website visits and preferences is called a(n):

    • A.

      Screensaver file

    • B.

      Internet file

    • C.

      Cookie file

    • D.

      None of these

    Correct Answer
    C. Cookie file
    Explanation
    A file that records a user's website visits and preferences is called a cookie file. Cookies are small text files that are created by websites and stored on a user's computer. These files contain information such as login credentials, site preferences, and browsing history. When a user visits a website, the cookie file is accessed to provide personalized content and streamline the user experience. Therefore, the correct answer is cookie file.

    Rate this question:

  • 37. 

    Word-wrap allows you to type text that continuously flows to the next line without having to press the:

    • A.

      End key

    • B.

      Alt key

    • C.

      Enter/return key

    • D.

      Space key

    Correct Answer
    C. Enter/return key
    Explanation
    Word-wrap allows you to type text that continuously flows to the next line without having to press the Enter/return key. This means that you can type without having to manually move the cursor to the next line, as the text will automatically wrap to the next line when it reaches the end of the current line.

    Rate this question:

  • 38. 

    Which of the following information is safe to share in a public chatroom or blog?

    • A.

      Age and screen name

    • B.

      Name a school

    • C.

      Screen name only

    • D.

      Name an organization

    Correct Answer
    C. Screen name only
    Explanation
    Sharing only a screen name in a public chatroom or blog is safe because it does not reveal personal information such as age, name, school, or organization. By sharing only a screen name, individuals can maintain their privacy and protect themselves from potential risks such as identity theft or cyberbullying. It is important to avoid sharing too much personal information online to ensure online safety.

    Rate this question:

  • 39. 

    Ethical use of the Internet states users DO NOT send spam, which is a (n):

    • A.

      Unsolicited message sent to many recipients

    • B.

      Frequently asked question

    • C.

      Program that infects someone's computer

    • D.

      None of these

    Correct Answer
    A. Unsolicited message sent to many recipients
    Explanation
    An unsolicited message sent to many recipients refers to spam. Spam is considered unethical because it is an unwanted and often intrusive form of communication that can clog up email inboxes and waste people's time. It is important for users to respect others' privacy and only send messages that are requested or relevant to the recipient.

    Rate this question:

  • 40. 

    Plagiarism is:

    • A.

      Sending unwated instant messages or e-mails to many people at the same time

    • B.

      Linking to other people's work as part of a blog

    • C.

      Copying other people's ideas or writing without giving credit to the author

    • D.

      Getting influence from others' work

    Correct Answer
    C. Copying other people's ideas or writing without giving credit to the author
    Explanation
    Plagiarism refers to the act of copying someone else's ideas or written work without acknowledging the original author. This can involve directly copying text, paraphrasing without proper citation, or even presenting someone else's ideas as one's own. It is a form of intellectual theft and is considered unethical and dishonest in academic and professional settings. Properly crediting the original author is essential in order to avoid plagiarism and give credit where it is due.

    Rate this question:

  • 41. 

    Symbols such as :) (smile), :( (frown), :\ (undecided), and :o (surprise)-used to express feeling in an e-mail message are called:

    • A.

      Embodiments

    • B.

      Embellishments

    • C.

      Emoticons

    • D.

      Emails

    Correct Answer
    C. Emoticons
    Explanation
    Emoticons are symbols used to express feelings in an e-mail message. They include symbols like :) (smile), :( (frown), :\ (undecided), and :o (surprise). Emoticons are a popular way to add emotion and tone to written communication, allowing the sender to convey their feelings more effectively.

    Rate this question:

  • 42. 

    A student locates a story online, copies it, and submits it to the teacher as his or her own work. This is:

    • A.

      Fair use and legal

    • B.

      Plagiarism and illegal

    • C.

      On the Internet and legal

    • D.

      Plagiarism but legal

    Correct Answer
    B. Plagiarism and illegal
    Explanation
    Copying someone else's work and submitting it as one's own is considered plagiarism, which is unethical and against academic integrity. It is also illegal as it infringes on the original author's rights to their work. Therefore, the action described in the question is both plagiarism and illegal.

    Rate this question:

  • 43. 

    Which of the following activities would be best accomplished using a database?

    • A.

      Create a graph about your favorite books

    • B.

      Create your own class-specific worksheets and study guides

    • C.

      Create a catalog of all the books in your classroom library

    • D.

      Create a presentation to show highlights of a recent field trip

    Correct Answer
    C. Create a catalog of all the books in your classroom library
    Explanation
    Creating a catalog of all the books in a classroom library would be best accomplished using a database. A database allows for organizing and storing large amounts of data, such as book titles, authors, genres, and other relevant information. It provides a structured and efficient way to search, sort, and update the catalog, making it easier to manage and access the information. Additionally, a database can support features like generating reports, tracking book availability, and providing search functionality, which are essential for maintaining a comprehensive catalog of books in a library.

    Rate this question:

  • 44. 

    Software programs or hardware devices setup to protect computers while online are called:

    • A.

      Firewalls

    • B.

      Filter

    • C.

      Cookies

    • D.

      Browsers

    Correct Answer
    A. Firewalls
    Explanation
    Firewalls are software programs or hardware devices that are set up to protect computers while online. They act as a barrier between a computer or a network and potential threats from the internet, such as hackers or malware. Firewalls monitor and control incoming and outgoing network traffic based on predetermined security rules, allowing only authorized connections and blocking unauthorized access. They help to prevent unauthorized access to a computer or network and protect sensitive information from being compromised.

    Rate this question:

  • 45. 

    Which of the following is an output device:

    • A.

      Keyboard

    • B.

      Printer

    • C.

      Microphone

    • D.

      Mouse

    Correct Answer
    B. Printer
    Explanation
    An output device is a device that is used to display or present information to the user. In this case, a printer is an output device because it is used to produce a physical copy of information, such as text or images, onto paper. The other options listed, such as keyboard, microphone, and mouse, are all input devices as they are used to input or provide information to the computer.

    Rate this question:

  • 46. 

    The instructions written in code that tell a web page how to display properly are called:

    • A.

      Hypertext Transfer Protocol (HTTP)

    • B.

      File Transfer Protocol (FTP)

    • C.

      Beginner's All Purpose Symbolic Instruction Code (BASIC)

    • D.

      Hypertext Markup Language (HTML)

    Correct Answer
    D. Hypertext Markup Language (HTML)
    Explanation
    The instructions written in code that tell a web page how to display properly are called Hypertext Markup Language (HTML). HTML is the standard markup language used for creating web pages and it provides a structure for the content on a web page, including headings, paragraphs, images, links, and other elements. It is responsible for defining the layout, formatting, and appearance of the web page content. HTTP is a protocol used for transferring data over the internet, FTP is a protocol used for transferring files, and BASIC is a programming language.

    Rate this question:

  • 47. 

    Which of the following would you use to compute the average score of four tests using a spreadsheet?

    • A.

      A formula

    • B.

      A calculator

    • C.

      A compilation

    • D.

      A nerdy friend

    Correct Answer
    A. A formula
    Explanation
    To compute the average score of four tests using a spreadsheet, you would use a formula. A formula allows you to perform calculations and manipulate data in a spreadsheet. By using a formula, you can easily add up the scores of the four tests and divide it by four to find the average. This automated process saves time and ensures accuracy in calculating the average score.

    Rate this question:

  • 48. 

    The part of a computer that controls the flow of information and manages tasks is the:

    • A.

      Storage Device (SD)

    • B.

      Central Processing Unit (CPU)

    • C.

      Output Device (OD)

    • D.

      Helper Troll (HT)

    Correct Answer
    B. Central Processing Unit (CPU)
    Explanation
    The central processing unit (CPU) is responsible for controlling the flow of information and managing tasks in a computer. It is often referred to as the "brain" of the computer as it carries out instructions and performs calculations. The CPU interprets and executes instructions from the computer's memory, performs arithmetic and logical operations, and coordinates the activities of all the other hardware components. It is essential for the overall functioning of the computer system.

    Rate this question:

  • 49. 

    To investigate the impact of the Ice Age on the formation of the Great Lakes, which of the following types of software would give you the ability to see what happened over time without actually being alive during the Ice Age?

    • A.

      Integrated Learning System

    • B.

      Reference

    • C.

      Blog and Wiki

    • D.

      Simulation

    Correct Answer
    D. Simulation
    Explanation
    Simulation software would give you the ability to see what happened over time without actually being alive during the Ice Age. Simulation software allows users to create virtual models or scenarios that mimic real-world situations. In this case, the simulation software could be used to recreate the conditions of the Ice Age and simulate the formation of the Great Lakes over time. This would provide valuable insights into the impact of the Ice Age on the formation of the Great Lakes without the need to physically observe the events.

    Rate this question:

  • 50. 

    When you try to access the Internet, you get error messages stating a "failure to connect." The first thing you should do is:

    • A.

      Download the latest drivers

    • B.

      Find a different computer to work on

    • C.

      Check that cables are correctly connected to the computer

    • D.

      Shout expletives

    Correct Answer
    C. Check that cables are correctly connected to the computer
    Explanation
    When you encounter a "failure to connect" error message while trying to access the Internet, the first thing you should do is check that cables are correctly connected to the computer. This is because a loose or improperly connected cable can cause connectivity issues and prevent you from accessing the Internet. By ensuring that the cables are securely connected, you can eliminate this potential cause of the problem and troubleshoot further if necessary.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 31, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 05, 2009
    Quiz Created by
    Bharris
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.