2nd Semester Vocabulary Quiz 1

16 Questions | Attempts: 79
Share

SettingsSettingsSettings
Vocabulary Quizzes & Trivia

Multiple Choice Vocabulary Quiz


Questions and Answers
  • 1. 

    Context Menu

    • A.

      Protocol that allows users to copy files between their local system and any system they can reach on the network

    • B.

      An integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

    • C.

      This appears when the alternate pointer button is pressed and is specific to the window in which the pointer cursor is position; POP-UP menu.

    • D.

      A device for storing information in a fixed location within your computer. The equivalent of a filing cabinet in an office, the hard drive is used for storing programs and documents that are not being used.

    Correct Answer
    C. This appears when the alternate pointer button is pressed and is specific to the window in which the pointer cursor is position; POP-UP menu.
  • 2. 

    Overflow

    • A.

      Data transfer that continues beyond the boundary of a buffer

    • B.

      The page on the Internet, which most often gives users access to the rest of the Web site. A site is a collection of pages.

    • C.

      - The name given to any computer directly connected to the Internet. Host computers are usually associated with running computer networks, online services, or bulletin board systems. A host computer on the Internet could be anything from a mainframe to a personal computer.

    • D.

      A system that allows people to send e-mail to one address, which is then copied and sent to all of the other subscribers to the mail list. In this way, people who may be using different kinds of e-mail access can participate in discussions together.

    Correct Answer
    A. Data transfer that continues beyond the boundary of a buffer
  • 3. 

    Paging File

    • A.

      A horizontal strip at the top of a window that shows the menus available in a program.

    • B.

      A computer's main circuit board, containing the CPU (Central Processing Unit), microprocessor support chips, RAM (Random Access Memory), and expansion (bus) slots. Also known as the logic board.

    • C.

      A TCP/IP (Transmission Control Protocol/Internet Protocol) application that sends a message to another computer, waits for a reply, and displays the time the transmission took. This serves to identify what computers are available on the Internet and how long wait-times are.

    • D.

      A disk file that provides non-volatile storage of virtual pages swapped out from main memory, in a virtual-memory system.

    Correct Answer
    D. A disk file that provides non-volatile storage of virtual pages swapped out from main memory, in a virtual-memory system.
  • 4. 

    Pin

    • A.

      The unauthorized use or close imitation of the language and thoughts of another author and the representation of them as one's own original work.

    • B.

      A simple electronic connector consisting of a thin, stiff, bare wire intended to fit into a corresponding socket.

    • C.

      Not losing information when power is interrupted.

    • D.

      Windows function; two rapid CLICKS in succession, treated as a single event by the operating system.

    Correct Answer
    B. A simple electronic connector consisting of a thin, stiff, bare wire intended to fit into a corresponding socket.
  • 5. 

    Point

    • A.

      GUI to specify or indicate by placing the cursor over: - and click.

    • B.

      Automatic playing of a multimedia content when a CD or other removable storage device is inserted into a computer.

    • C.

      A temporary storage area in memory.

    • D.

      An image represented as a regular rectangular array of pixel.

    • E.

      Incorporating two largely independent microprocessors in a single chip package.

    Correct Answer
    A. GUI to specify or indicate by placing the cursor over: - and click.
  • 6. 

    Pop-Up Menu

    • A.

      An error in the design or coding of a program

    • B.

      An area of memory, disk space, etc., separated from a larger block by repeated allocation and deallocation.

    • C.

      A software construct that selectively allows processing or passage of only certain information items presented to it.

    • D.

      This appears when a user input triggers its appearance

    Correct Answer
    D. This appears when a user input triggers its appearance
  • 7. 

    Power-On Self-Test

    • A.

      An input device in the form of a stick that can be tilted, rotated, or twisted by the hand.

    • B.

      An internal system check that is carried out by a PC immediately after the power is turned on.

    • C.

      An internal department within an organization that provides technical assistance to the user community.

    • D.

      A usually automated chronological record of events in electronic or paper form.

    Correct Answer
    B. An internal system check that is carried out by a PC immediately after the power is turned on.
  • 8. 

    Rail

    • A.

      The time required for a device to respond, especially the time required for a disk drive platter to rotate to a specific position.

    • B.

      An efficient method for storing graphic files for transmission across phone lines.

    • C.

      A wire or other conductor within a computer that supplies substantial operating power to certain computer components.

    • D.

      Symbols or illustrations on the desktop or computer screen that indicate program files, documents, or other functions.

    Correct Answer
    C. A wire or other conductor within a computer that supplies substantial operating power to certain computer components.
  • 9. 

    Scale

    • A.

      A small piece of software that adds features to already existing, usually large, programs.

    • B.

      This is text without extraneous codes that designate font size, font style, et cetera.

    • C.

      Any of a number of giant databases on the Internet, which store data on Web sites and their corresponding URLs.

    • D.

      To change the size of a picture or other graphic without changing any other characteristics.

    Correct Answer
    D. To change the size of a picture or other graphic without changing any other characteristics.
  • 10. 

    Screen Saver

    • A.

      Readable memory that cannot be corrupted by accidental erasure.

    • B.

      A program that displays a continuously changing image on the monitor of a computer that is not in use, in order to avoid damaging the monitor resulting from display of a single static image over a long period.

    • C.

      Readable and writeable memory that acts as a storage area while the computer is on, and is erased every time the computer is turned off.

    • D.

      A list of options that "pulls down" when you select a menu at the top of a window.

    Correct Answer
    B. A program that displays a continuously changing image on the monitor of a computer that is not in use, in order to avoid damaging the monitor resulting from display of a single static image over a long period.
  • 11. 

    Stack

    • A.

      Key strokes that enact the same commands available in the menus of a program.

    • B.

      A software construct that stores information temporarily with automatic allocation of space, usually in last-in first-out order.

    • C.

      A computer or software package that provides a specific service to client software running on other computers.

    • D.

      The software used to produce documents, such as letters, posters, reports, and syllabi.

    Correct Answer
    B. A software construct that stores information temporarily with automatic allocation of space, usually in last-in first-out order.
  • 12. 

    Swap File

    • A.

      With regard to memory, virtual refers to temporarily storing information on the hard drive.

    • B.

      A disk file used to hold programs or processes temporarily removed from main memory by a swap operation.

    • C.

      Files that are compressed and must be "unzipped" to be read.

    • D.

      Monitor output that closely resembles the printed output.

    Correct Answer
    B. A disk file used to hold programs or processes temporarily removed from main memory by a swap operation.
  • 13. 

    Ribbon

    • A.

      The unauthorized use or close imitation of the language and thoughts of another author and the representation of them as one's own original work.

    • B.

      This serves to identify what computers are available on the Internet and how long wait-times are.

    • C.

      A cable having a flat, thin cross-section

    • D.

      A computer's main circuit board

    Correct Answer
    C. A cable having a flat, thin cross-section
  • 14. 

    Static

    • A.

      A horizontal strip at the top of a window that shows the menus available in a program.

    • B.

      A system that allows people to send e-mail to one address, which is then copied and sent to all of the other subscribers to the mail list.

    • C.

      The name given to any computer directly connected to the Internet.

    • D.

      Not changing or requiring regular refreshing.

    Correct Answer
    D. Not changing or requiring regular refreshing.
  • 15. 

    Vendor

    • A.

      A company that sells hardware or software products

    • B.

      The name given to any computer directly connected to the Internet.

    • C.

      The page on the Internet, which most often gives users access to the rest of the Web site.

    • D.

      A device for storing information in a fixed location within your computer.

    Correct Answer
    A. A company that sells hardware or software products
  • 16. 

    Wardriver

    • A.

      An integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system

    • B.

      Protocol that allows users to copy files between their local system and any system they can reach on the network

    • C.

      Someone who drives from place to place looking for unsecured wireless hot spots with the intent of using the hot spots illegitimately.

    • D.

      A computer network limited to the immediate area, usually the same building.

    Correct Answer
    C. Someone who drives from place to place looking for unsecured wireless hot spots with the intent of using the hot spots illegitimately.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 28, 2010
    Quiz Created by
    Panasukk
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.