Computer Concepts Ch.3 Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Martinez5663
M
Martinez5663
Community Contributor
Quizzes Created: 1 | Total Attempts: 243
Questions: 30 | Attempts: 243

SettingsSettingsSettings
Computer Concepts Ch.3 Quiz - Quiz

Computer Concepts Quiz over Ch. 3! Practice test.


Questions and Answers
  • 1. 

    16)Font size is measured in                                            .

    Explanation
    Font size is measured in point size. Point size refers to the measurement of the height of characters in a font. It is typically measured in points, where one point is equal to 1/72 of an inch. The larger the point size, the larger the characters will appear on a page or screen.

    Rate this question:

  • 2. 

    3) Many bot-infested computers can be linked together to form what is known as a                .

    Explanation
    A botnet is a network of computers that have been infected with malicious software, or bots, which are controlled by a central command and control server. These infected computers, also known as zombies, can be linked together to form a botnet. The purpose of a botnet is often to carry out coordinated attacks, such as distributed denial of service (DDoS) attacks, spamming, or stealing sensitive information. By leveraging the power of multiple computers, botnets can be highly effective in carrying out malicious activities while remaining difficult to trace back to the perpetrators.

    Rate this question:

  • 3. 

    20)The Windows                      is a database that keeps track of your computer's peripheral devices, software, preferences, and settings. When you install software on the hard disk, information about the software is recorded in the                    .

    Explanation
    The Windows registry is a database that keeps track of a computer's peripheral devices, software, preferences, and settings. When software is installed on the hard disk, information about the software is recorded in the registry.

    Rate this question:

  • 4. 

    1)Two main categories of software is                         software and                    software.

    Explanation
    The correct answer is "application system". The question is asking for the two main categories of software, and "application system" is one of those categories. The other category is not mentioned in the question, but it can be inferred that it is referring to "system software" as the two main categories of software.

    Rate this question:

  • 5. 

    14)Trojan horses are notorious for stealing passwords using a                                       a type of program that records keystrokes.

    Explanation
    Trojan horses are a type of malicious software that disguise themselves as legitimate programs. They can be used to steal sensitive information, such as passwords. One common method they use for this is by installing a keylogger on the victim's computer. A keylogger is a program that records every keystroke made by the user, allowing the attacker to capture passwords and other important information. Therefore, the correct answer to the question is "keylogger".

    Rate this question:

  • 6. 

    A                         holds data for a single entity- a person, place, thing, or event.                  is a string of related information.

    Explanation
    A record holds data for a single entity, such as a person, place, thing, or event. It is a collection of related information stored together. In databases, a record is typically represented as a row in a table, where each column represents a different attribute or field of the entity. The record allows for the organization and retrieval of data in a structured manner.

    Rate this question:

  • 7. 

                                is a collection of data that is stored on one or more computers.

    Explanation
    A database is a collection of data that is stored on one or more computers. It is a structured set of data that is organized and can be accessed, managed, and updated easily. Databases are commonly used in various applications and systems to store and retrieve information efficiently. They provide a centralized and secure way to store and manage data, allowing multiple users to access and manipulate the data simultaneously. By using databases, organizations can ensure data integrity, consistency, and reliability, making it an essential component in modern information systems.

    Rate this question:

  • 8. 

                                    software is designed to protect computers from various forms of destructive software and unauthorized intrusions.

    Explanation
    The given answer "security" is correct because it accurately describes the purpose of the software mentioned in the question. Security software is specifically designed to protect computers from destructive software (such as viruses, malware, and ransomware) and unauthorized intrusions (such as hacking attempts and unauthorized access). It helps to safeguard the computer system and its data from potential threats and vulnerabilities.

    Rate this question:

  • 9. 

    A                         holds one item of data relevant to a record.

    Explanation
    A field holds one item of data relevant to a record. In a database, a field represents a specific piece of information that is stored for each record. It can hold different types of data such as text, numbers, dates, or even images. Fields are used to organize and categorize data within a database, allowing for efficient storage and retrieval of information.

    Rate this question:

  • 10. 

    The intersection of a column and row is called a                       . Each                      in the grid can contain a value, label, or formula.

    Explanation
    The intersection of a column and row is called a "cell". Each "cell" in the grid can contain a value, label, or formula.

    Rate this question:

  • 11. 

    A                       is a set of letters that share an unified design.

    Explanation
    A font is a set of letters that share a unified design. Fonts are used to display text in a specific style, size, and weight. They consist of a collection of characters, including letters, numbers, symbols, and punctuation marks, that have a consistent visual appearance. Fonts are used in various mediums such as printed materials, websites, and digital documents to convey a specific tone or aesthetic.

    Rate this question:

  • 12. 

    A desktop                             (sometimes called a gadget, dashboard                                 , or a control) is a specialized utility program that appears on a computer's screen-based desktop, looks like a control, and might display a snippet of information.

  • 13. 

    Open                         software makes uncompiled program instructions-the                     code-available to programmers who want to modify and improve the software.

  • 14. 

    Files are usually                              to consolidate them into one large file, which is compressed to decrease its size and reduce the download time.

    Explanation
    Files are usually "zipped" to consolidate them into one large file, which is compressed to decrease its size and reduce the download time.

    Rate this question:

  • 15. 

    Security experts use the term                     threat to describe malware that combines more than one type of malicious program.

    Explanation
    The term "blended" is used by security experts to describe malware that combines multiple types of malicious programs. This means that the malware incorporates different techniques and functionalities to carry out its malicious activities. By combining different types of malware, attackers can increase the complexity and effectiveness of their attacks, making it more difficult for security measures to detect and mitigate them. Blended malware can include elements such as viruses, worms, Trojans, spyware, and more, making it a potent and versatile threat.

    Rate this question:

  • 16. 

                                                          software provides a set of tools for transferring video footage from a camcorder to a computer, clipping out unwanted footage, assembling video segments in any sequence, adding special video effects, and adding a sound track.

    Explanation
    The given correct answer is "video editing". This is because the question describes a software that provides tools for transferring video footage from a camcorder to a computer, clipping out unwanted footage, assembling video segments in any sequence, adding special video effects, and adding a sound track. All these activities are part of the process of video editing, which involves manipulating and enhancing video footage to create a final edited video.

    Rate this question:

  • 17. 

    Program                       and data                          are two different kind of extensions when installing software.

  • 18. 

                               software can be defined as any type of application software that has the potential to help people do their work more efficiently.

    Explanation
    The term "software" refers to any type of application or program that can be used on a computer or electronic device. In this context, the given answer states that software can be defined as any type of application software that has the potential to help people do their work more efficiently. This definition emphasizes the purpose of software, which is to enhance productivity and improve efficiency in various tasks and activities.

    Rate this question:

  • 19. 

    A file                      is a three letter suffix that is appended to the file name to indicate the kind of information the file contains.

    Explanation
    The given answer "extension" correctly explains that a file extension is a three-letter suffix that is added to the file name to indicate the type or format of information contained in the file. File extensions are used by operating systems to associate files with specific programs or applications that can open and process them. It helps users easily identify the file type and choose the appropriate software to open and work with the file.

    Rate this question:

  • 20. 

    A software                            is a collection of software applications sold as a single package. A collection of related software.

    Explanation
    A software suite refers to a collection of software applications that are sold together as a single package. It typically includes multiple related software programs that are designed to work together and complement each other. This term is commonly used in the software industry to describe a bundle or package of software applications that are marketed and sold as a unified product.

    Rate this question:

  • 21. 

                                production software assists you with composing, editing, designing, printing, and electronically publishing documents. Most popular types of                       production software  are word processing, desktop publishing, and web authoring.

    Explanation
    The given answer "document" is correct because the question is asking for the type of software that assists with composing, editing, designing, printing, and electronically publishing documents. The question also mentions that the most popular types of production software are word processing, desktop publishing, and web authoring, all of which are used for creating and working with documents. Therefore, "document" is the appropriate answer.

    Rate this question:

  • 22. 

    From a legal perspective there are two categories of software; public domain and                   .

    Explanation
    From a legal perspective, there are two categories of software: public domain and proprietary. Public domain software refers to software that is not protected by copyright and can be freely used, modified, and distributed by anyone. On the other hand, proprietary software is protected by copyright and its use, modification, and distribution are restricted by the software owner. This means that proprietary software is owned by a specific individual or organization, and users must obtain a license or permission to use it.

    Rate this question:

  • 23. 

    A                     is text that you specify to automatically appear in the top margin of every page.

    Explanation
    A header is text that is specified to automatically appear in the top margin of every page. It is a common feature in word processing software that allows users to add consistent information, such as page numbers, document title, or author name, to all pages of a document.

    Rate this question:

  • 24. 

    A                     is a grid-like structure that can hold text or pictures. For printed documents,                              are a popular way to produce easy-to-read columns and rows of data and to position graphics.

    Explanation
    A table is a grid-like structure that can hold text or pictures. For printed documents, tables are a popular way to produce easy-to-read columns and rows of data and to position graphics.

    Rate this question:

  • 25. 

    Software                                 (sometimes referred to as setup) is a process that places a program into a computer so that it can be run or executed.

    Explanation
    The given definition states that software installation is a process of placing a program into a computer so that it can be run or executed. Therefore, the correct answer for this question is "installation".

    Rate this question:

  • 26. 

    A device                            is a software that helps a peripheral device establish communication with a computer. Acts like an interpreter.

    Explanation
    A driver is a software that helps a peripheral device establish communication with a computer. It acts like an interpreter, translating the commands from the computer into a language that the peripheral device can understand and vice versa. The driver allows the computer to control and utilize the features and functions of the peripheral device effectively. It ensures compatibility and enables smooth communication between the computer and the peripheral device.

    Rate this question:

  • 27. 

    A                             uses rows and columns of numbers to create a model or representation of a real situation.

    Explanation
    A spreadsheet is a tool that uses rows and columns of numbers to create a model or representation of a real situation. It allows users to organize and manipulate data, perform calculations, and create charts or graphs. Spreadsheets are commonly used in business and finance for tasks such as budgeting, financial analysis, and data management. They provide a structured and efficient way to organize and analyze large amounts of data, making them a valuable tool in various industries.

    Rate this question:

  • 28. 

    A software                           is a small section of program code that replaces a part of the software you currently have installed. Software fix.

    Explanation
    A patch is a small section of program code that is used to replace or fix a part of the software that is currently installed. It is a common method of addressing bugs, security vulnerabilities, or adding new features to existing software. By applying a patch, users can update their software without having to reinstall the entire program.

    Rate this question:

  • 29. 

                                                         is a set of patches that correct problems and address security vulnerabilities(usually applies to operating system updates).

    Explanation
    A service pack is a collection of patches and updates that are released by software vendors to fix known issues and address security vulnerabilities in their products. This term is commonly used in the context of operating system updates, where a service pack includes a set of cumulative updates, bug fixes, and security enhancements. Service packs are important for maintaining the stability, performance, and security of software systems by ensuring that any known issues are resolved and the software is up to date.

    Rate this question:

  • 30. 

    Database software helps you enter,                , organize, update, and report information stored in a database.

    Explanation
    Database software helps you find information stored in a database. It provides tools and functionalities that allow users to search for specific data or records within the database. This can be done by using search queries or filters to locate relevant information based on certain criteria. By using the "find" feature in the database software, users can easily locate and retrieve the desired information from the database.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 29, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 19, 2010
    Quiz Created by
    Martinez5663
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.