Vocabulary Test 3 - Practice Intro IT

10 Questions | Attempts: 95
Share

SettingsSettingsSettings
Practice Test Quizzes & Trivia

Multiple choice practice test


Questions and Answers
  • 1. 

    Backup

    • A.

      A software construct that stores information temporarily with automatic allocation of space, usually in last-in first-out order.

    • B.

      To save information, programs etc. to an external source.

    • C.

      A disk file used to hold programs or processes temporarily removed from main memory by a swap operation.

    • D.

      Used to create space between characters.

    Correct Answer
    B. To save information, programs etc. to an external source.
  • 2. 

    Data Theft

    • A.

      To have important files or information stolen from your computer.

    • B.

      A cable having a flat, thin cross-section.

    • C.

      Not changing or requiring regular refreshing; NON-VOLATILE.

    • D.

      A company that sells hardware or software products.

    Correct Answer
    A. To have important files or information stolen from your computer.
  • 3. 

    Driver

    • A.

      Moves the curser down to create a new line when typing.

    • B.

      Someone who drives from place to place looking for unsecured wireless hot spots with the intent of using the hot spots illegitimately.

    • C.

      Instructs the operating system on how to operate specific hardware.

    • D.

      Connects your computer to your ISP or online service over a regular telephone line.

    Correct Answer
    C. Instructs the operating system on how to operate specific hardware.
  • 4. 

    Encryption

    • A.

      Allows your computer to be permanently connected to the Internet using telephone lines with faster service.

    • B.

      A company or organization that provides access to the Internet through its servers, usually for a fee.

    • C.

      A secure process for keeping confidential information private.

    • D.

      Allows people to interact with a computer and computer-controlled devices.

    Correct Answer
    C. A secure process for keeping confidential information private.
  • 5. 

    Humidity

    • A.

      High level of moisture causing damage to the computer

    • B.

      Coding used for internet language.

    • C.

      A window you can open to adjust various aspects of your computer, such as the volume, fonts, desktop background, mouse speed, and clock.

    • D.

      A key used to access commands through the keyboard rather than the menus.

    Correct Answer
    A. High level of moisture causing damage to the computer
  • 6. 

    Ping

    • A.

      To save a file onto your computer from another source, like the Internet.

    • B.

      A test to see if a system on the Internet is working

    • C.

      The page on the Internet, which most often gives users access to the rest of the Web site.

    • D.

      The name given to any computer directly connected to the Internet.

    Correct Answer
    B. A test to see if a system on the Internet is working
  • 7. 

    Power spikes

    • A.

      A system that allows people to send e-mail to one address, which is then copied and sent to all of the other subscribers to the mail list.

    • B.

      Uploading, downloading, and transferring of information

    • C.

      Short, fast transfers of electrical voltage, current, or energy.

    • D.

      A horizontal strip at the top of a window that shows the menus available in a program.

    Correct Answer
    C. Short, fast transfers of electrical voltage, current, or energy.
  • 8. 

    Power spikes

    • A.

      Short, fast transfers of electrical voltage, current, or energy.

    • B.

      The software application that allows you to view Internet pages.

    • C.

      The unauthorized use or close imitation of the language and thoughts of another author and the representation of them as one's own original work.

    • D.

      Monitor output that closely resembles the printed output.

    Correct Answer
    A. Short, fast transfers of electrical voltage, current, or energy.
  • 9. 

    Surge suppressor

    • A.

      With regard to memory, virtual refers to temporarily storing information on the hard drive.

    • B.

      Address locator at the top of any web page

    • C.

      Electrical outlets that protect against power spikes. Power spikes can damage computer and hardware.

    • D.

      The software used to produce documents, such as letters, posters, reports, and syllabi.

    Correct Answer
    C. Electrical outlets that protect against power spikes. Power spikes can damage computer and hardware.
  • 10. 

    Uninterruptible power supply (UPS)

    • A.

      One option for preventing data loss due to power outages is to install this device.

    • B.

      A computer or software package that provides a specific service to client software running on other computers.

    • C.

      Key strokes that enact the same commands available in the menus of a program.

    • D.

      Readable and writeable memory that acts as a storage area while the computer is on, and is erased every time the computer is turned off.

    Correct Answer
    A. One option for preventing data loss due to power outages is to install this device.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 05, 2010
    Quiz Created by
    Panasukk
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.