C027 Computer Concepts

20 Questions | Total Attempts: 38

SettingsSettingsSettings
Please wait...
Computer Concept Quizzes & Trivia

Web and email Fundamentals


Questions and Answers
  • 1. 
    ____ regulates when the CPU moves to the next task at hand.
    • A. 

      Internal clock

    • B. 

      International time format

    • C. 

      Atomic clock

    • D. 

      ALU

  • 2. 
    A software program which is quite inexpensive and with limited functions is known as 
    • A. 

      Freeware

    • B. 

      Firmware

    • C. 

      Shareware

    • D. 

      Sleepware

  • 3. 
    A version of a software which is released for testing by users and is not yet stable is called 
    • A. 

      Beta version

    • B. 

      Release candidate

    • C. 

      Release to manufacturer

    • D. 

      Oem version

  • 4. 
    What is a cold boot?
    • A. 

      Switch off the machine and restart

    • B. 

      Press reset button

    • C. 

      Log off all users

    • D. 

      Hibernate

  • 5. 
    The process of searching huge amounts of data with the hope of finding a pattern is
    • A. 

      Data mining

    • B. 

      Search engine

    • C. 

      Artificial intelligence

    • D. 

      Heuristics

  • 6. 
    A component, such as a monitor or keyboard, which is connected to the computer is 
    • A. 

      Output device

    • B. 

      Input device

    • C. 

      Peripheral device

    • D. 

      Solid state device

  • 7. 
    An agreement between you, the user, and the software company is often called
    • A. 

      Eula - end user licence agreement

    • B. 

      Site license

    • C. 

      Server licence

    • D. 

      Trial license

  • 8. 
    Program code that is publicly available with few restrictions is
    • A. 

      Open source

    • B. 

      Freeware

    • C. 

      Shareware

    • D. 

      Public software

  • 9. 
    Addresses added to the SMTP delivery list but not shown in the message data, remaining invisible to other recipients
    • A. 

      Carbon copy c.c.

    • B. 

      Blind carbon copy b.c.c.

    • C. 

      Mime address type

    • D. 

      Attachments

  • 10. 
    Main component of the computer operating system software is called 
    • A. 

      Core module

    • B. 

      Kernel

    • C. 

      Extended operating system

    • D. 

      Event viewer

  • 11. 
    Any part of the computer you can physically touch is
    • A. 

      Device driver

    • B. 

      Hard drive

    • C. 

      Hardware

    • D. 

      System device

  • 12. 
    Copying a software program on many computers illegally is known as 
    • A. 

      Software piracy

    • B. 

      Illegal software

    • C. 

      Phishing

    • D. 

      Bootlegging

  • 13. 
    A small dot or arrow to guide user during typing text in a computer program is 
    • A. 

      Track point

    • B. 

      Insertion point

    • C. 

      Ellipsis

    • D. 

      Dot leader

  • 14. 
    Specially designed computer chip that resides inside another device, such as you car or the electronic thermostat in your home
    • A. 

      Planner board

    • B. 

      Integrated circuits

    • C. 

      Embedded computer

    • D. 

      System software

  • 15. 
    A group of small pictures on the desktop to select most of the commonly used commands
    • A. 

      Macros

    • B. 

      Menus

    • C. 

      Tool bar

    • D. 

      Tool tips

  • 16. 
    Which of the following happens when a computer boots up?
    • A. 

      Loading the operating system into RAM

    • B. 

      Reading user input from mouse/keyboard

    • C. 

      Ejecting a pen drive

    • D. 

      Connecting to internet

  • 17. 
    The actual lines of instructions/code that make a program work are called 
    • A. 

      Interpreter

    • B. 

      Binary code

    • C. 

      Source code

    • D. 

      Compiler

  • 18. 
    ____ enable you to send processed data out of your computer in the form of text, pictures, sounds, or video.  
    • A. 

      Printers

    • B. 

      Output devices

    • C. 

      Input devices

    • D. 

      Modems

  • 19. 
    Programmers who break into secure computer networks are known as 
    • A. 

      Phishers

    • B. 

      Super users

    • C. 

      Spammers

    • D. 

      Hackers

  • 20. 
    Software programs which help to manage to do lists, calendars, reminders are called 
    • A. 

      Specialized applications

    • B. 

      Utilities

    • C. 

      Dynamic link libraries

    • D. 

      Drivers