Computer Power Points Quiz - Fall 2011

Approved & Edited by ProProfs Editorial Team
At ProProfs Quizzes, our dedicated in-house team of experts takes pride in their work. With a sharp eye for detail, they meticulously review each quiz. This ensures that every quiz, taken by over 100 million users, meets our standards of accuracy, clarity, and engagement.
Learn about Our Editorial Process
| Written by Jonhamlin
J
Jonhamlin
Community Contributor
Quizzes Created: 18 | Total Attempts: 22,060
Questions: 43 | Attempts: 58

SettingsSettingsSettings
Computer Power Points Quiz - Fall 2011 - Quiz


This quiz is based from the student generated questions from the computer hardware Power Point presentations we saw earlier in the week.


Questions and Answers
  • 1. 

    What is not part of computer maintenance?  

    • A. 

      System Backup

    • B. 

      Virus Scanning

    • C. 

      Hardware upgrade

    • D. 

      Defragment

    Correct Answer
    C. Hardware upgrade
    Explanation
    Hardware upgrade is not part of computer maintenance because computer maintenance typically refers to tasks that involve the regular upkeep and optimization of a computer system to ensure its smooth functioning and prevent issues. Hardware upgrades, on the other hand, involve replacing or adding new components to improve the performance or capabilities of a computer system, which is not considered a routine maintenance task.

    Rate this question:

  • 2. 

    What is the most commonly used cache?

    • A. 

      Rom Cache

    • B. 

      Wallet Cash

    • C. 

      Disk Cache

    • D. 

      Web Browser Cache

    Correct Answer
    D. Web Browser Cache
    Explanation
    The most commonly used cache is the web browser cache. This cache stores temporary files, such as images, scripts, and stylesheets, from websites that a user visits. By storing these files locally, the web browser can load the website faster upon subsequent visits, as it does not need to download all the files again. This improves the overall browsing experience and reduces the amount of data that needs to be transferred over the internet.

    Rate this question:

  • 3. 

    How do you properly clean dust from your computer fans?

    • A. 

      Blow dust from the inside of the computer forcing dust outside

    • B. 

      Blow dust from the outside of the computer forcing dust inside

    • C. 

      Blow dust from the inside of the computer forcing dust inside

    • D. 

      Blow dust from the outside of the computer forcing dust outside

    Correct Answer
    A. Blow dust from the inside of the computer forcing dust outside
    Explanation
    To properly clean dust from computer fans, it is recommended to blow the dust from the inside of the computer, forcing it outside. Blowing the dust from the outside of the computer or forcing it inside can potentially cause the dust to settle in other components or obstruct the fans further. By blowing the dust from the inside, it ensures that the dust is expelled from the computer, helping to maintain proper airflow and prevent overheating.

    Rate this question:

  • 4. 

    What is the complete purpose of the operating system?

    • A. 

      To power the computer

    • B. 

      To detect errors in user applications

    • C. 

      To allow users to interface with the computer

    • D. 

      To manage files on functional hard drives

    Correct Answer
    C. To allow users to interface with the computer
    Explanation
    The complete purpose of the operating system is to allow users to interface with the computer. The operating system acts as an intermediary between the user and the computer hardware, providing a user-friendly interface that allows users to interact with the computer and perform various tasks. It manages the resources of the computer, such as memory and processing power, and provides services and utilities that allow users to run applications, access files, and perform other operations efficiently and effectively.

    Rate this question:

  • 5. 

    What is the Kernel?

    • A. 

      The component that manages hardware resources

    • B. 

      Uncooked popcorn

    • C. 

      Allows video display

    • D. 

      Allows internet access

    Correct Answer
    A. The component that manages hardware resources
    Explanation
    The kernel is the component of an operating system that manages hardware resources. It acts as a bridge between the software and the hardware, allowing applications to communicate with the hardware effectively. It is responsible for managing memory, processing tasks, handling input and output operations, and controlling peripheral devices. Without the kernel, the operating system would not be able to effectively utilize the hardware resources of a computer system.

    Rate this question:

  • 6. 

    What is the percentage of desktop Mac users?

    • A. 

      Around 3%

    • B. 

      Around 30%

    • C. 

      Around 20%

    • D. 

      Exactly 8%

    Correct Answer
    A. Around 3%
    Explanation
    The correct answer is around 3%. This suggests that only a small percentage of computer users use desktop Mac computers, indicating that the majority of computer users prefer other operating systems or devices.

    Rate this question:

  • 7. 

    Who’s the best Teacher Ever?

    • A. 

      Mr. Hamlin

    • B. 

      Mr.Kaylik

    • C. 

      Mr.Kerr

    • D. 

      Ultramotron

    • E. 

      YouTube

    Correct Answer
    A. Mr. Hamlin
    Explanation
    The given question asks for the best teacher ever, and the answer provided is "Mr. Hamlin." This suggests that Mr. Hamlin is considered the best teacher among the options given.

    Rate this question:

  • 8. 

    What are Fiber optic cables and how do they work?

    • A. 

      They don’t do anything

    • B. 

      They make pretty colors

    • C. 

      Refract light

    • D. 

      Pulsate increasing network speed in your modem

    Correct Answer
    C. Refract light
    Explanation
    Fiber optic cables are thin, transparent strands made of glass or plastic that are used to transmit data over long distances. They work by refracting light, which means that when light enters the cable, it bends and travels along the fiber. This process allows for the transmission of information in the form of light signals. The light signals are converted into electrical signals at the receiving end, enabling the transfer of data at high speeds.

    Rate this question:

  • 9. 

    What’s the major difference between intranet/internet?

    • A. 

      There is none

    • B. 

      One is a network cable the other is for your phone

    • C. 

      Internet is public - intranet is private

    • D. 

      Internet connects you to the internet, Ethernet connects to your C; drive

    Correct Answer
    C. Internet is public - intranet is private
    Explanation
    The major difference between intranet and internet is that the internet is a public network, accessible to anyone with an internet connection, while an intranet is a private network that is only accessible to a specific group of people, such as employees within a company.

    Rate this question:

  • 10. 

    What does LAN stand for ?

    • A. 

      LITTLE AREA of NOTHING

    • B. 

      Local area national

    • C. 

      Local Area network

    • D. 

      Large Area Network

    Correct Answer
    C. Local Area network
    Explanation
    LAN stands for Local Area Network. It refers to a network that connects computers and devices within a limited area such as a home, office, or building. LANs are typically used for sharing resources, such as files and printers, and for facilitating communication between connected devices. The given correct answer accurately reflects the acronym and its meaning.

    Rate this question:

  • 11. 

    Who made Wi-Fi internet?

    • A. 

      Microsoft Windows

    • B. 

      NASA

    • C. 

      802.11i alliance

    • D. 

      Wii

    Correct Answer
    C. 802.11i alliance
    Explanation
    The correct answer is 802.11i alliance. The 802.11i alliance, also known as the Wi-Fi Alliance, is a global organization that promotes and certifies Wi-Fi technology. They develop and maintain the Wi-Fi standard, including the security protocols used in wireless networks. While Microsoft Windows is an operating system and NASA is a space agency, they are not directly responsible for creating Wi-Fi internet. Wii, on the other hand, is a gaming console and not related to the development of Wi-Fi technology.

    Rate this question:

  • 12. 

    Do all computers use wireless?

    • A. 

      Yes

    • B. 

      No

    • C. 

      Maybe

    • D. 

      Laptops only

    Correct Answer
    B. No
    Explanation
    Not all computers use wireless technology. While laptops and some desktop computers may have built-in wireless capabilities, there are many computers that still rely on wired connections such as Ethernet cables to connect to the internet or other devices. Additionally, there are other types of computers such as servers or mainframes that are typically not designed to use wireless technology. Therefore, the statement "No" is the correct answer as it acknowledges that not all computers use wireless.

    Rate this question:

  • 13. 

    How can network speed be increased?

    • A. 

      Anti-virus

    • B. 

      Less computers on network

    • C. 

      Reduce downloads / uploads

    • D. 

      All of above

    Correct Answer
    D. All of above
    Explanation
    All of the given options can contribute to increasing network speed. Installing an anti-virus software can help prevent malware and viruses from slowing down the network. Having fewer computers connected to the network reduces the overall traffic and congestion, resulting in faster speeds. Similarly, reducing downloads and uploads can free up bandwidth, allowing for faster data transfer. Therefore, choosing all of the above options can collectively enhance network speed.

    Rate this question:

  • 14. 

    In our analogy of the computer, what was the motherboard?

    • A. 

      Body

    • B. 

      Brain

    • C. 

      Nervous System

    • D. 

      Eyes

    Correct Answer
    C. Nervous System
    Explanation
    The correct answer is the Nervous System. In the analogy of the computer, the motherboard is the main component that connects and controls all other parts. Similarly, the nervous system in the human body acts as the control center, coordinating and transmitting signals between the brain, spinal cord, and other parts of the body. It plays a crucial role in regulating bodily functions and transmitting information, just like the motherboard does in a computer.

    Rate this question:

  • 15. 

    What is a cache?

    • A. 

      Carries out the instruction that is received

    • B. 

      Part of the computer that stores data for future use

    • C. 

      Connects all parts of the computer together

    • D. 

      Money cache

    Correct Answer
    B. Part of the computer that stores data for future use
    Explanation
    A cache is a part of the computer that stores data for future use. It is a high-speed memory that is used to temporarily store frequently accessed data or instructions, in order to improve the overall performance of the system. By keeping this data closer to the processor, the cache reduces the time it takes to retrieve information from the main memory, resulting in faster processing speeds.

    Rate this question:

  • 16. 

    What is the best processor out of the ones below?

    • A. 

      AMD Phenom II x4

    • B. 

      Intel i7 980x

    • C. 

      Intel Core 2 duo

    • D. 

      AMD Athlon II x2 265

    Correct Answer
    B. Intel i7 980x
    Explanation
    The Intel i7 980x is considered the best processor out of the options provided because it is a high-end processor with six cores and twelve threads, offering exceptional performance for tasks that require multi-threading. It also has a higher clock speed and larger cache compared to the other processors listed. The AMD Phenom II x4 and Athlon II x2 265 are both older and lower-end processors, while the Intel Core 2 duo is also an older processor that is not as powerful as the i7 980x.

    Rate this question:

  • 17. 

    Since when was CD available? 

    • A. 

      Oct 1992

    • B. 

      Jun 1997

    • C. 

      March 1987

    • D. 

      Oct 1982

    Correct Answer
    D. Oct 1982
    Explanation
    The correct answer is Oct 1982. This is because CDs, or compact discs, were first introduced to the market in October 1982. They revolutionized the music industry by providing a more compact and high-quality format for storing and playing music compared to vinyl records and cassette tapes.

    Rate this question:

  • 18. 

    Which advantage does HDD have over SDD?

    • A. 

      Reliability

    • B. 

      Electricity

    • C. 

      Compatibility

    • D. 

      Speed

    Correct Answer
    C. Compatibility
    Explanation
    HDDs have an advantage over SSDs in terms of compatibility. HDDs can be easily connected to a wide range of devices, including older computers and gaming consoles, as they typically use standard SATA or IDE interfaces. On the other hand, SSDs often require specific connectors or interfaces, such as M.2 or PCIe, which may not be available on all devices. Therefore, HDDs offer greater compatibility in terms of connecting to different systems and devices.

    Rate this question:

  • 19. 

    What is the capacity of normal single-layered Blu Ray disc?

    • A. 

      25GB

    • B. 

      50GB

    • C. 

      250GB

    • D. 

      500GB

    Correct Answer
    A. 25GB
    Explanation
    The capacity of a normal single-layered Blu Ray disc is 25GB.

    Rate this question:

  • 20. 

    What  does a video card make?

    • A. 

      Images to your monitor

    • B. 

      Sound to your speakers

    • C. 

      Internet to your router

    Correct Answer
    A. Images to your monitor
    Explanation
    A video card is responsible for generating and displaying images on a computer monitor. It processes visual data and sends it to the monitor, allowing users to see images, videos, and graphics on their screens. The video card works in conjunction with the computer's graphics processing unit (GPU) to render and deliver high-quality visuals. It does not have any role in providing sound to speakers or connecting to the internet.

    Rate this question:

  • 21. 

    Who is a well known video card maker?

    • A. 

      Nvidia

    • B. 

      Microsoft

    • C. 

      Apple

    • D. 

      Ram Cards

    Correct Answer
    A. Nvidia
    Explanation
    Nvidia is a well-known video card maker in the industry. They are recognized for producing high-quality graphics processing units (GPUs) that are widely used in gaming, professional visualization, and artificial intelligence applications. Nvidia's GPUs are known for their exceptional performance, advanced features, and efficient power consumption, making them a popular choice among gamers and professionals alike. Their reputation and dominance in the market make Nvidia the correct answer to this question.

    Rate this question:

  • 22. 

    What is a good price for a decent video card?

    • A. 

      $100

    • B. 

      $250

    • C. 

      $500

    • D. 

      $1500

    Correct Answer
    B. $250
    Explanation
    A good price for a decent video card is $250 because it strikes a balance between affordability and performance. While a $100 video card may be too budget-friendly and may not provide the desired level of performance, a $500 or $1500 video card may be overkill for most users. $250 is a reasonable price point that offers a good combination of features, performance, and value for the average user looking for a decent video card.

    Rate this question:

  • 23. 

    What is the advantage of non-modular power supply?

    • A. 

      It has many cables

    • B. 

      Easily cluttered in the case

    • C. 

      The price is cheaper

    • D. 

      You can plug out every cables

    Correct Answer
    C. The price is cheaper
    Explanation
    The advantage of a non-modular power supply is that it is cheaper compared to modular power supplies. This means that it is more cost-effective for users who are on a budget or looking to save money on their power supply.

    Rate this question:

  • 24. 

    What are some things that you should look for when choosing a computer case?

    • A. 

      How well the fresh air circulates

    • B. 

      How much space there is for cable management

    • C. 

      Awesomeness of the design and how much you like the case

    • D. 

      All the above

    Correct Answer
    D. All the above
    Explanation
    When choosing a computer case, it is important to consider how well the fresh air circulates to ensure proper cooling of the components. Additionally, having enough space for cable management is crucial to keep the interior organized and maintain good airflow. Lastly, the design and personal preference play a role in choosing a case, as it should be aesthetically pleasing and align with the user's taste. Therefore, all of the mentioned factors should be considered when selecting a computer case.

    Rate this question:

  • 25. 

    Why does cooling need upgrade?

    • A. 

      To keep up the heat output of the computer components

    • B. 

      Cause the chicken crossed the road

    • C. 

      Components get bigger, need bigger fan

    • D. 

      Heat sink is not compatible with thermal compound

    Correct Answer
    A. To keep up the heat output of the computer components
    Explanation
    The cooling system needs an upgrade to keep up with the heat output of the computer components. As computer components become more powerful and generate more heat, the existing cooling system may not be sufficient to effectively dissipate the heat. Upgrading the cooling system, such as installing a bigger fan or improving the heat sink, can help prevent overheating and ensure optimal performance of the computer.

    Rate this question:

  • 26. 

    How many versions of the USB are there?

    • A. 

      10

    • B. 

      4

    • C. 

      3

    • D. 

      Over 9000

    Correct Answer
    C. 3
    Explanation
    There are three versions of the USB.

    Rate this question:

  • 27. 

    Which one is not a real type of mouse?

    • A. 

      Optical

    • B. 

      Laser

    • C. 

      Digital

    • D. 

      Mechanical

    Correct Answer
    C. Digital
    Explanation
    The options Optical, Laser, and Mechanical are all types of real computer mice. Optical mice use light to track movement, Laser mice use laser technology, and Mechanical mice have a physical ball that rolls to track movement. However, Digital is not a type of mouse but rather a term that refers to the way information is processed and stored in computers.

    Rate this question:

  • 28. 

    Why was the first trackball developed?

    • A. 

      Secret Military Project

    • B. 

      Personal Project

    • C. 

      For Fun

    • D. 

      It was an accident

    Correct Answer
    A. Secret Military Project
    Explanation
    The first trackball was developed as a secret military project. This suggests that it was created with a specific purpose related to military operations or technology.

    Rate this question:

  • 29. 

    What is a negative factor in downloading music?

    • A. 

      Decreases sales / earnings for the artist

    • B. 

      Free to get

    • C. 

      Increase sales

    • D. 

      Artists become popular

    Correct Answer
    A. Decreases sales / earnings for the artist
    Explanation
    Downloading music for free is a negative factor because it decreases sales and earnings for the artist. When people can obtain music for free, they are less likely to purchase it, resulting in a loss of revenue for the artist. This can have a significant impact on their overall sales and earnings, making it difficult for them to sustain their career and continue creating music.

    Rate this question:

  • 30. 

    What is the definition of piracy?

    • A. 

      Giving, generous to others

    • B. 

      Pirates technically this is correct

    • C. 

      The unauthorized reproduction or use of a copyrighted

    • D. 

      None of the above

    Correct Answer
    C. The unauthorized reproduction or use of a copyrighted
    Explanation
    Piracy refers to the unauthorized reproduction or use of a copyrighted material. This can include activities such as illegally downloading or sharing movies, music, software, or other protected content without the permission of the copyright holder.

    Rate this question:

  • 31. 

    What is torrent?

    • A. 

      A fish

    • B. 

      File sharing protocol used for distributing large amounts of

    • C. 

      Downloading tool

    • D. 

      An internet cable

    Correct Answer
    B. File sharing protocol used for distributing large amounts of
    Explanation
    data over the internet.

    Rate this question:

  • 32. 

    The ILOVEYOU Virus was:

    • A. 

      A Trojan horse

    • B. 

      A bootsector

    • C. 

      A computer worm

    • D. 

      A computer virus

    Correct Answer
    C. A computer worm
    Explanation
    The ILOVEYOU Virus was a computer worm. Computer worms are self-replicating malware that spread from one computer to another, typically by exploiting vulnerabilities in computer systems or through email attachments. The ILOVEYOU Virus was one of the most destructive worms in history, spreading through email and causing widespread damage by overwriting files and spreading itself to other contacts. Unlike viruses, worms do not need to attach themselves to a host program and can independently spread across networks.

    Rate this question:

  • 33. 

    What is not part of data encryption?

    • A. 

      SSL

    • B. 

      ICP

    • C. 

      HTTPS

    • D. 

      E-Commerce

    Correct Answer
    D. E-Commerce
    Explanation
    The correct answer is E-Commerce. E-Commerce refers to the buying and selling of goods and services over the internet, while data encryption is a process of converting data into a code to prevent unauthorized access. E-Commerce is not directly related to data encryption, although encryption may be used to secure the data involved in E-Commerce transactions.

    Rate this question:

  • 34. 

    What connections are used for secure payments?

    • A. 

      HTTP

    • B. 

      HTTPS

    • C. 

      S-HTTPS

    • D. 

      S-HTTP

    Correct Answer
    B. HTTPS
    Explanation
    HTTPS is used for secure payments because it stands for Hypertext Transfer Protocol Secure. It is a secure version of HTTP that uses encryption to protect the data being transmitted. HTTPS ensures that the communication between the user's browser and the website is encrypted and cannot be intercepted by attackers. This is essential for secure payments as it prevents sensitive information, such as credit card details, from being accessed by unauthorized individuals.

    Rate this question:

  • 35. 

    The most connected country to the internet is

    • A. 

      China

    • B. 

      India

    • C. 

      US

    • D. 

      Canada

    Correct Answer
    A. China
    Explanation
    China is considered the most connected country to the internet because it has the largest number of internet users in the world. With a population of over 1.4 billion people, China has a vast online community that contributes to its high level of connectivity. Additionally, China has a well-developed internet infrastructure, with extensive broadband coverage and a wide range of internet services available to its citizens. The country also has a thriving e-commerce industry and is home to some of the largest internet companies globally, further emphasizing its strong internet connectivity.

    Rate this question:

  • 36. 

    What was the first message that was send through ARPANET?

    • A. 

      Login

    • B. 

      Lo

    • C. 

      Gin

    • D. 

      Log

    Correct Answer
    B. Lo
    Explanation
    The first message sent through ARPANET was "Lo". This short form of "Login" was intended to send the command to log into the remote host. It was a historic moment as it marked the beginning of computer networking and paved the way for the development of the internet as we know it today.

    Rate this question:

  • 37. 

    Who was the inventor of the internet?

    • A. 

      Leonard Kleinrock

    • B. 

      Bob Kahn

    • C. 

      Vint Cerf

    • D. 

      It does not have a single inventor

    Correct Answer
    D. It does not have a single inventor
    Explanation
    The internet was not invented by a single person. It is a result of the efforts and contributions of many individuals over time. Leonard Kleinrock, Bob Kahn, and Vint Cerf are all considered pioneers in the development of the internet, but none of them can be credited as the sole inventor. The internet is a complex network that evolved through collaboration and advancements in technology by numerous people, making it impossible to attribute its invention to a single individual.

    Rate this question:

  • 38. 

    What do MACs have that’s similar to a BIOS?

    • A. 

      Same as Windows

    • B. 

      Closed Firmware

    • C. 

      Open Firmware

    • D. 

      Same as Linux

    Correct Answer
    C. Open Firmware
    Explanation
    MACs have Open Firmware that is similar to a BIOS. Open Firmware is a firmware interface that is present in some Macintosh computers. It provides low-level hardware initialization, booting, and runtime services. Similarly, a BIOS (Basic Input/Output System) is a firmware interface found in Windows-based computers that performs similar functions. Therefore, the presence of Open Firmware in MACs makes it similar to a BIOS.

    Rate this question:

  • 39. 

    What is a popular Virus that attacked the BIOS in mid 1980?

    • A. 

      TBE (The BIOS Eraser)

    • B. 

      Chernobyl Virus

    • C. 

      BIOS Presentant Infection.

    • D. 

      A and B

    Correct Answer
    B. Chernobyl Virus
    Explanation
    The Chernobyl Virus is a popular virus that attacked the BIOS in the mid-1980s. It was named after the Chernobyl nuclear disaster, as it shared similarities in terms of its destructive capabilities. The virus was able to overwrite the BIOS code, rendering the computer inoperable and causing damage to the hardware. It gained widespread attention due to its ability to spread quickly and cause significant damage to infected systems.

    Rate this question:

  • 40. 

    The Southern Bridge is …

    • A. 

      A section of the motherboard where PCI Buses are present, so video and sounds cards are located there.

    • B. 

      A section of the CPU where the frequency is determined.

    • C. 

      A section of the motherboard where PCI Buses aren’t present and the BIOS/ CPU is located there.

    • D. 

      A section of the CPU where all the information coming from the cores of the CPU interact.

    Correct Answer
    A. A section of the motherboard where PCI Buses are present, so video and sounds cards are located there.
    Explanation
    The Southern Bridge refers to a section of the motherboard where PCI Buses are present. This means that video and sound cards are located in this section.

    Rate this question:

  • 41. 

    What makes Cloud Computing different from traditional servers?

    • A. 

      It is a firewall

    • B. 

      Installs all firmware’s on all PC’s automatically

    • C. 

      Cheaper, Holds many software’s in one place

    • D. 

      All of the above

    Correct Answer
    C. Cheaper, Holds many software’s in one place
    Explanation
    Cloud computing is different from traditional servers because it is cheaper and can hold many software applications in one place. Unlike traditional servers, cloud computing allows for cost savings as it eliminates the need for on-premises hardware and maintenance costs. Additionally, cloud computing provides the ability to host multiple software applications on a single platform, making it more efficient and convenient for users.

    Rate this question:

  • 42. 

    What’s makes analog transmissions different from digital transmissions?

    • A. 

      Analog has faster quicker and higher speeds.

    • B. 

      Analog creates a wave transmission, digital creates a rebound transmission.

    • C. 

      Analog must be converted to digital before receiving. Digital skips that step.

    • D. 

      Wave lengths are short on analog. Wave lengths are long on digital.

    Correct Answer
    C. Analog must be converted to digital before receiving. Digital skips that step.
    Explanation
    Analog transmissions and digital transmissions differ in the way they are processed and transmitted. Analog signals are continuous and vary in amplitude and frequency, while digital signals are discrete and represented by binary code. In order to receive analog transmissions, they need to be converted into digital signals using analog-to-digital conversion. On the other hand, digital transmissions do not require this conversion step as they are already in a digital format.

    Rate this question:

  • 43. 

    Google Wallet NFC, What does NFC stand for?

    • A. 

      Networking Forwarder Communicate

    • B. 

      New Function Computing

    • C. 

      Near Field Communications

    • D. 

      National Federation Centre

    Correct Answer
    C. Near Field Communications
    Explanation
    NFC stands for Near Field Communications. It is a technology that allows devices to communicate with each other by bringing them close together, typically within a few centimeters. In the context of Google Wallet, NFC enables users to make contactless payments by simply tapping their phone on a compatible payment terminal. This technology is widely used for various applications such as mobile payments, data transfer, and access control.

    Rate this question:

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.