Can You Pass This Computer Vocabulary Test?

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jianjiaodingdan
J
Jianjiaodingdan
Community Contributor
Quizzes Created: 1 | Total Attempts: 610
| Attempts: 610 | Questions: 26
Please wait...
Question 1 / 26
0 %
0/100
Score 0/100
1. What is an MP3 used for?   

Explanation

An MP3 is used for playing music. It is a digital audio format that allows users to store and play music files on various devices such as smartphones, computers, and portable music players. MP3 files are compressed to reduce their size while maintaining good audio quality, making it easier to store and transfer music files. This format revolutionized the way people listen to music, as it allowed for the easy creation and sharing of digital music files.

Submit
Please wait...
About This Quiz
Can You Pass This Computer Vocabulary Test? - Quiz

Can you pass this basic computer quiz? Having some basic computer knowledge is a desirable skill in the world today as computers are being used in every field.... see moreIf you ate feeling like you have enough knowledge about computers so far be sure to take up the quiz. All the best, and keep looking for avenues to test your understanding. see less

2. When you’re not working on the internet, what is this called?

Explanation

When you are not working on the internet, it means that you are not connected to the internet and are not using any online services or applications. Therefore, the correct answer is "Offline".

Submit
3. A geek is

Explanation

The correct answer is "a person who is really into computers." This is because a geek is commonly understood as someone who is highly interested and knowledgeable about computers, technology, and related subjects. They often spend a significant amount of time exploring, learning, and engaging with computer-related activities, such as programming, gaming, or troubleshooting.

Submit
4. True or False Hacking is when someone who breaks into your computer without your permission.

Explanation

Hacking refers to the unauthorized access or intrusion into someone's computer system or network. It involves gaining entry without the owner's permission or knowledge. Therefore, the statement "Hacking is when someone who breaks into your computer without your permission" is true.

Submit
5. What does a screen shot do?

Explanation

A screen shot is the process of capturing an image of the current display on a computer screen. It allows users to take a picture of what is being shown on their screen at a specific moment and save it as an image file. This image can then be copied or shared with others, used for documentation purposes, or simply saved for personal reference. It is a useful feature for capturing important information or sharing specific content with others.

Submit
6. What is used to scan copies of pictures?

Explanation

A scanner is used to scan copies of pictures. It is a device that captures images or documents and converts them into digital format. Unlike a printer, keyboard, or mouse, which serve different functions, a scanner specifically allows for the reproduction of physical images or documents into digital files. Therefore, the correct answer is a scanner.

Submit
7. What is an E-Mail Bomb?

Explanation

An email bomb refers to the act of sending a large number of unwanted emails to a specific email address. This can overwhelm the recipient's inbox and potentially cause their email server to crash or become unresponsive. It is a form of cyber attack and is considered a malicious activity.

Submit
8. A small camera that is attached to a laptop or computer is called?

Explanation

A small camera that is attached to a laptop or computer is called a web cam. A web cam is used to capture video or images and transmit them in real-time over the internet. It is commonly used for video conferencing, live streaming, and online communication.

Submit
9. When you want to make an icon or file disappear you would drag it to the _________________?

Explanation

When you want to make an icon or file disappear, you would drag it to the recycling bin. The recycling bin is a feature in computer operating systems that allows users to delete files or icons from their system. Once an item is dragged into the recycling bin, it is considered deleted but can still be recovered if needed.

Submit
10. A cracker is someone who?

Explanation

A cracker is someone who hacks into a computer. This means that they gain unauthorized access to a computer system or network in order to exploit it for their own purposes. This can involve stealing sensitive information, causing damage to the system, or using it for illegal activities. It is important to differentiate between a cracker and a hacker, as hackers are generally seen as individuals who use their skills and knowledge to find vulnerabilities in systems for the purpose of improving security.

Submit
11. A laser is a _____________________.

Explanation

A laser is a beam of light used for pointing at things instead of using your finger. Lasers emit a focused and coherent beam of light that can be used for various purposes such as in scientific research, medical procedures, and even in everyday activities like presentations and pointing out objects from a distance. The high intensity and precision of laser beams make them ideal for tasks that require accuracy and control.

Submit
12. What is a dashboard?

Explanation

A dashboard is a web-based technology page that displays information from various sources. It is a visual representation of data that allows users to monitor and analyze key metrics and performance indicators in real-time. Dashboards are commonly used in business and organizations to track progress, make data-driven decisions, and communicate information effectively.

Submit
13. A combination camera, phone, PDA, multimedia player, and wireless communication device made by Apple Inc is called?

Explanation

The correct answer is "iphone". The question is asking for the name of a device that combines various functions such as a camera, phone, PDA, multimedia player, and wireless communication. The iPhone is a popular device made by Apple Inc that fits this description.

Submit
14. A very high energy electromagnetic radiation such as X-rays are called_____________________.

Explanation

Gamma rays are a form of very high energy electromagnetic radiation, similar to X-rays. They have a shorter wavelength and higher frequency than X-rays, making them more energetic. Gamma rays are produced through various processes, such as nuclear reactions and radioactive decay. They are commonly used in medical imaging and cancer treatment due to their ability to penetrate through tissues.

Submit
15. A game boy is

Explanation

The correct answer is "a small portable gaming system." This is because a game boy refers to a handheld gaming device that allows users to play video games on the go. It is not a male child who likes to play video games, the first gaming system, or the name of an online video game. Therefore, the correct answer is a small portable gaming system.

Submit
16. What is a jolt?

Explanation

A jolt refers to a sudden interruption or disruption in the normal functioning of a computer system, causing it to freeze or become unresponsive. This can occur due to various reasons such as a power surge, software malfunction, or hardware failure.

Submit
17. When your software crashes, what is it called?

Explanation

When your software crashes, it is commonly referred to as an "Abend". The term "Abend" is derived from the German words "abnormal end" and is used in the field of computing to describe an abnormal termination or failure of a program or system. It is often used by programmers and IT professionals to identify and troubleshoot software crashes or errors.

Submit
18. When a wave frequency exceeds 20,000 hertz it is called _______?

Explanation

When a wave frequency exceeds 20,000 hertz, it is called an ultrasound. Ultrasound refers to sound waves with frequencies higher than the upper audible limit of human hearing. It is commonly used in medical imaging to visualize internal body structures. The other options, such as "none of these," "a mega sound," "very loud," and "a sonic boom," do not accurately describe a wave frequency exceeding 20,000 hertz.

Submit
19. A term to describe when an image has been displaying too long, resulting in a permanent "ghost" image being burned into the screen is called shadow burn.

Explanation

The term used to describe when an image has been displaying too long, resulting in a permanent "ghost" image being burned into the screen is actually called "screen burn-in" or "image retention." It is not referred to as "shadow burn."

Submit
20. True or False. You lose ram memory when you turn off the CPU?

Explanation

When the CPU is turned off, the RAM memory loses all the data stored in it. RAM is a volatile memory, meaning it requires power to retain data. Once the power is cut off, the stored data is lost, and the RAM is cleared. Therefore, it is true that you lose RAM memory when you turn off the CPU.

Submit
21. How is a database is sorted?

Explanation

A database is sorted by a key, which is a unique identifier for each record in the database. The key is used to arrange the records in a specific order, such as alphabetical or numerical. Sorting by a key allows for efficient searching and retrieval of data from the database.

Submit
22. What's at the beginning or end of a data transmission?

Explanation

A tag is typically used at the beginning or end of a data transmission to identify and organize the information being transmitted. It acts as a label or marker that helps in categorizing and processing the data.

Submit
23. An email which has been subscribed to but is often unread for a long period of time possibly never is called?

Explanation

BACN is the correct answer because it refers to emails that are subscribed to but often remain unread for a long time. BACN emails are typically not spam, but they are not high-priority either, often being newsletters, promotional emails, or notifications that are not immediately relevant or important to the recipient. The term "BACN" is a play on the word "bacon" and reflects the idea that these emails are not unwanted like spam, but they are also not actively sought out or consumed like a regular email.

Submit
24. An example of a shortcut used in chats or emails is?

Explanation

LULU is an example of a shortcut used in chats or emails. It is commonly used to express laughter or amusement, similar to "LOL" or "haha". This shortcut is often used to quickly convey a positive or humorous response in online conversations.

Submit
25. What is a nano?

Explanation

The correct answer is "none of these" because the options provided do not accurately define what a nano is. A nano is a prefix used in the metric system to denote one billionth of a unit. It can be used to describe various things such as nanometers (a billionth of a meter) or nanoseconds (a billionth of a second). Therefore, none of the given options correctly describe what a nano is.

Submit
26. A long cable that can connect computers labs together is called?

Explanation

A long cable that can connect computer labs together is called a backbone. The backbone refers to the main cable that serves as the central pathway for data transmission between different network segments or nodes. It provides high-speed connectivity and acts as a central infrastructure for the network, allowing for efficient communication and data transfer between computers labs.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 15, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 15, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 07, 2018
    Quiz Created by
    Jianjiaodingdan
Cancel
  • All
    All (26)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is an MP3 used for?   
When you’re not working on the internet, what is this called?
A geek is
True or False Hacking is when someone who breaks into your computer...
What does a screen shot do?
What is used to scan copies of pictures?
What is an E-Mail Bomb?
A small camera that is attached to a laptop or computer is...
When you want to make an icon or file disappear you would...
A cracker is someone who?
A laser is a _____________________.
What is a dashboard?
A combination camera, phone, PDA, multimedia player, and wireless...
A very high energy electromagnetic radiation such as X-rays are...
A game boy is
What is a jolt?
When your software crashes, what is it called?
When a wave frequency exceeds 20,000 hertz it is called _______?
A term to describe when an image has been displaying too long,...
True or False. You lose ram memory when you turn off the CPU?
How is a database is sorted?
What's at the beginning or end of a data transmission?
An email which has been subscribed to but is often unread for a long...
An example of a shortcut used in chats or emails is?
What is a nano?
A long cable that can connect computers labs together is called?
Alert!

Advertisement