Eastern High School IC3 Entrance Exam Quiz!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Jlanham2
J
Jlanham2
Community Contributor
Quizzes Created: 2 | Total Attempts: 2,952
Questions: 99 | Attempts: 1,965

SettingsSettingsSettings
Eastern High School IC3 Entrance Exam Quiz! - Quiz


Are you ready for the Eastern High School IC3 Entrance Exam? This quiz is here for your rescue. With this quiz, you will be accountable for knowing when the first computers were made, who created the Apple Macintosh platform, what constitutes the computer's brain, and what kind of mouse uses a laser to detect the mouse's movement? Good luck with this quiz.


Questions and Answers
  • 1. 

    The first computers were developed in __.

    • A.

      The late 1920's and early 1930's

    • B.

      The late 1940's and early 1950's

    • C.

      Tge mid-1960s

    • D.

      1971

    Correct Answer
    B. The late 1940's and early 1950's
    Explanation
    The correct answer is the late 1940's and early 1950's. This is because the first electronic computers were developed during this time period. These early computers were large and expensive machines that were mainly used by governments and large corporations. They were not as advanced as modern computers, but they laid the foundation for the technology we have today.

    Rate this question:

  • 2. 

    Who developed the Apple Macintosh platform?

    • A.

      Steve Jobs

    • B.

      Steve Wozniak

    • C.

      Dr. Ted Hoff & Bill Gates

    • D.

      Dr. John Atanasoff & Bill Gates

    Correct Answer(s)
    A. Steve Jobs
    B. Steve Wozniak
    Explanation
    Steve Jobs and Steve Wozniak developed the Apple Macintosh platform. They co-founded Apple Inc. and played integral roles in the development of the company's products, including the Macintosh computer. Steve Jobs was known for his visionary leadership and marketing skills, while Steve Wozniak was the technical genius behind the design and engineering of the Macintosh. Together, they revolutionized the personal computer industry and laid the foundation for Apple's success.

    Rate this question:

  • 3. 

    What type of computer could be found in a digital watch?

    • A.

      Mainframe computer

    • B.

      Supercomputer

    • C.

      Embedded computer

    • D.

      Notebook computer

    Correct Answer
    C. Embedded computer
    Explanation
    An embedded computer is the most suitable type of computer that could be found in a digital watch. Embedded computers are designed to perform specific functions and are often integrated into other devices or systems. In the case of a digital watch, an embedded computer is responsible for controlling and displaying the time, as well as other features such as alarms, timers, and possibly fitness tracking. This type of computer is small, low-power, and optimized for efficiency, making it ideal for devices like digital watches where space and battery life are important considerations.

    Rate this question:

  • 4. 

    Which of the following system components are the brains of the computer?

    • A.

      Circuit board

    • B.

      CPU

    • C.

      Memory

    • D.

      Network card

    Correct Answer
    B. CPU
    Explanation
    The CPU, or Central Processing Unit, is considered the brains of the computer. It is responsible for executing instructions, performing calculations, and controlling the overall operation of the computer system. The CPU acts as the primary component that processes data and carries out tasks, making it the most critical component in terms of computing power and functionality.

    Rate this question:

  • 5. 

    __ refers to the machine language which is all 1s and 0s.

    • A.

      Bit

    • B.

      Byte

    • C.

      Binary

    • D.

      Processor pathways

    Correct Answer
    C. Binary
    Explanation
    Binary refers to the machine language which is all 1s and 0s. In computing, binary is the base-2 numeral system used to represent numbers and perform arithmetic operations. It is the fundamental language that computers understand and use to execute instructions. Each binary digit, or bit, represents a value of either 0 or 1. By combining multiple bits, larger units of information such as bytes can be represented. Therefore, binary is the correct answer as it specifically denotes the language consisting of only 1s and 0s.

    Rate this question:

  • 6. 

    Hard drives, magnetic tapes and zip disks are examples of __.

    • A.

      Magnetic storage devices

    • B.

      Optical storage devices

    • C.

      Soild-state storage

    • D.

      Remote storage

    Correct Answer
    A. Magnetic storage devices
    Explanation
    Hard drives, magnetic tapes, and zip disks are examples of magnetic storage devices because they use magnetic fields to store and retrieve data. These devices have a magnetizable coating on their surfaces that can be magnetized to represent binary data. The magnetized areas can then be read by a read/write head to access the stored information. Magnetic storage devices are known for their high capacity and durability, making them suitable for long-term data storage.

    Rate this question:

  • 7. 

    When you scan the barcode of an item into the computer, which steps in the information cycle is being performed?

    • A.

      Inputting data

    • B.

      Processing data

    • C.

      Outputting information

    • D.

      Sorting data

    Correct Answer
    A. Inputting data
    Explanation
    When you scan the barcode of an item into the computer, you are inputting data into the system. This is the first step in the information cycle, where raw data is collected and entered into the computer for further processing and analysis. The scanned barcode contains information about the item, such as its name, price, and other details, which is then stored in the computer's database for future reference and use.

    Rate this question:

  • 8. 

    Most of the keyboards provided with desktop computers are__.

    • A.

      Flexible

    • B.

      Enhanced

    • C.

      Virtual

    • D.

      Wireless

    Correct Answer
    B. Enhanced
  • 9. 

    Which type of mouse uses a laser to detect the mouse's movement?

    • A.

      Mechanical

    • B.

      Optomechanical

    • C.

      Optical

    • D.

      Wireless

    Correct Answer
    C. Optical
    Explanation
    An optical mouse uses a laser to detect the mouse's movement. The laser illuminates the surface beneath the mouse, and the sensor detects the reflected light to track the mouse's movement. This technology allows for more precise and accurate tracking compared to mechanical or optomechanical mice. Wireless mice may also use optical technology, but the use of a laser is not exclusive to wireless mice.

    Rate this question:

  • 10. 

    Which type of monitor produces an image by manipulating light within a layer of liquid crystal cells?

    • A.

      CRT

    • B.

      LCD

    • C.

      Gas plasma

    • D.

      All of the above

    Correct Answer
    B. LCD
    Explanation
    LCD stands for Liquid Crystal Display, which is a type of monitor that produces an image by manipulating light within a layer of liquid crystal cells. Unlike CRT monitors, which use cathode ray tubes, and gas plasma monitors, which use ionized gas cells, LCD monitors use liquid crystals to control the passage of light through the cells, creating the image on the screen. Therefore, the correct answer is LCD.

    Rate this question:

  • 11. 

    Which of the following is used to produce a hard copy of the processing results?

    • A.

      CPU

    • B.

      Monitor

    • C.

      Printer

    • D.

      Speaker

    Correct Answer
    C. Printer
    Explanation
    A printer is used to produce a hard copy of the processing results. Unlike a monitor or speaker, which display or output information electronically, a printer physically prints the processed data onto paper or other tangible materials. The CPU, or central processing unit, is responsible for executing instructions and performing calculations, but it does not directly produce a hard copy. Therefore, the correct answer is printer.

    Rate this question:

  • 12. 

    Printing speed is measured in __.

    • A.

      RAM

    • B.

      Characters per second

    • C.

      Pages per minute

    • D.

      Dots per inch

    Correct Answer
    C. Pages per minute
    Explanation
    Printing speed is commonly measured in pages per minute. This metric indicates the number of pages that a printer can produce in one minute. It is a practical and convenient way to compare the speed of different printers. RAM refers to the computer's memory capacity and is not directly related to printing speed. Characters per second is a measure of typing speed, not printing speed. Dots per inch (DPI) refers to the resolution or quality of printed output, not the speed at which it is produced.

    Rate this question:

  • 13. 

    By using a USB hub, you could connect up to __ different peripherals with a single connector

    • A.

      8

    • B.

      40

    • C.

      63

    • D.

      127

    Correct Answer
    D. 127
    Explanation
    A USB hub is a device that allows multiple USB devices to be connected to a single USB port on a computer. The maximum number of devices that can be connected to a USB hub is determined by the USB specification, which currently supports up to 127 devices. Therefore, by using a USB hub, you could connect up to 127 different peripherals with a single connector.

    Rate this question:

  • 14. 

    When you plug in a device and the computer system configures it automatically, this is referred to as __

    • A.

      Plug-and-play

    • B.

      FireWire

    • C.

      A serial port

    • D.

      Bluetooth

    Correct Answer
    A. Plug-and-play
    Explanation
    Plug-and-play refers to the ability of a computer system to automatically detect and configure a newly connected device without requiring manual intervention. When a device is plugged into the computer, the operating system recognizes it and installs the necessary drivers and software to make it functional. This eliminates the need for users to manually configure the device, making the setup process quick and convenient. Therefore, plug-and-play is the correct answer as it accurately describes the automatic configuration process.

    Rate this question:

  • 15. 

    The __ process make data unreadable unless or until it is decrypted

    • A.

      Back up

    • B.

      Troubleshooting

    • C.

      Connectivity

    • D.

      Encryption

    Correct Answer
    D. Encryption
    Explanation
    Encryption is the process of converting data into a code or cipher so that it cannot be understood by unauthorized users. It ensures that data remains confidential and secure by making it unreadable unless decrypted with the correct encryption key. Therefore, encryption is the correct answer as it is the process that makes data unreadable until it is decrypted.

    Rate this question:

  • 16. 

    People who use remote software on stolen systems to connect to the organization's network and bypass the company's security measures are called

    • A.

      Firewalls

    • B.

      Hackers

    • C.

      Spikers

    • D.

      Bugs

    Correct Answer
    B. Hackers
    Explanation
    Hackers are individuals who use remote software on stolen systems to connect to an organization's network and bypass the company's security measures. They exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal data, or cause damage. Firewalls, on the other hand, are security systems that monitor and control network traffic to protect against unauthorized access. Spikers and bugs are not relevant to the given scenario.

    Rate this question:

  • 17. 

    Data on a hard drive is stored in small __ dots on the disk

    • A.

      Water-proof

    • B.

      Magnetic

    • C.

      Removable

    • D.

      Battery-powered

    Correct Answer
    B. Magnetic
    Explanation
    The data on a hard drive is stored in small magnetic dots on the disk. These dots are magnetized to represent the binary code that makes up the data. The magnetic nature of the dots allows the hard drive to read and write data using a magnetic head, which can detect and manipulate the magnetic fields on the disk. This magnetic storage method is what allows for the long-term retention of data on a hard drive.

    Rate this question:

  • 18. 

    If media is damaged by water, first __

    • A.

      Restart the computer

    • B.

      Place it in an airtight plastic bag

    • C.

      Dry it

    • D.

      Any of the above

    Correct Answer
    C. Dry it
    Explanation
    If media is damaged by water, the first step should be to dry it. This is because water can cause damage to electronic components and circuits, leading to malfunction or complete failure. By drying the media, the moisture is removed, reducing the risk of further damage and increasing the chances of it functioning properly again. Restarting the computer or placing it in an airtight plastic bag may not effectively address the water damage issue, whereas drying it directly targets the problem. Therefore, drying the media is the most appropriate course of action in this situation.

    Rate this question:

  • 19. 

    If the printed image is faded, this could indicate__.

    • A.

      The toner is low

    • B.

      The print density is set too low

    • C.

      Economy mode printing is turned on

    • D.

      Any of the above

    Correct Answer
    D. Any of the above
    Explanation
    If the printed image is faded, it could indicate that the toner is low, the print density is set too low, or economy mode printing is turned on. Any of these factors can result in a faded image.

    Rate this question:

  • 20. 

    You would use the DOS ping command to test for which issue?

    • A.

      Display problems

    • B.

      Connectivity

    • C.

      Paper jams

    • D.

      Crashed hard drive

    Correct Answer
    B. Connectivity
    Explanation
    The DOS ping command is used to test for connectivity issues. It sends a small packet of data to a specific IP address or domain name and measures the time it takes for the packet to travel to the destination and back. If the ping is successful, it indicates that there is a connection between the source and destination. If the ping fails, it suggests that there may be a connectivity issue, such as a network problem or a firewall blocking the connection. Therefore, the DOS ping command is specifically used to test for connectivity problems.

    Rate this question:

  • 21. 

    To protect agains power spikes, you would use a(n)

    • A.

      Standby power system (SPS)

    • B.

      Driver

    • C.

      Surge suppressor

    • D.

      Separate thermostat

    Correct Answer
    C. Surge suppressor
    Explanation
    A surge suppressor is used to protect against power spikes. Power spikes are sudden increases in voltage that can damage electronic devices. Surge suppressors work by diverting excess voltage away from the devices, preventing them from being damaged. They are typically installed between the power source and the devices, and can handle a certain amount of voltage before they need to be replaced. Using a surge suppressor is an effective way to safeguard electronic equipment from power surges and ensure their longevity.

    Rate this question:

  • 22. 

    One of the best ways to cut down on computer repair is __.

    • A.

      By using cable management kits

    • B.

      By perchasing an ergonomic keyboard

    • C.

      Through preventative maintenance

    • D.

      To replace the power supply regularly

    Correct Answer
    C. Through preventative maintenance
    Explanation
    Preventative maintenance refers to regular checks and actions taken to prevent potential issues or breakdowns. By performing routine maintenance tasks such as cleaning the computer, updating software, and checking for malware, the chances of encountering major problems are reduced. This proactive approach helps identify and address minor issues before they escalate into costly repairs. Therefore, through preventative maintenance, computer repair can be significantly minimized.

    Rate this question:

  • 23. 

    Which of the following should be considered when selecting a keyboard?

    • A.

      Design

    • B.

      Performance

    • C.

      Comfort

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    When selecting a keyboard, it is important to consider all of the given options: design, performance, and comfort. Design refers to the physical appearance and layout of the keyboard, which can vary depending on personal preferences and needs. Performance relates to the keyboard's functionality and responsiveness, including factors such as key switches and anti-ghosting capabilities. Comfort is crucial for prolonged use, considering factors like key spacing, wrist rest, and ergonomic design. Considering all these aspects ensures that the selected keyboard meets one's aesthetic preferences, functional requirements, and provides a comfortable typing experience.

    Rate this question:

  • 24. 

    You would most likely find a touchpad on __.

    • A.

      A laser printer

    • B.

      The motherboard

    • C.

      A notebook computer

    • D.

      An ergonomic keyboard

    Correct Answer
    C. A notebook computer
    Explanation
    A touchpad is a common input device found on notebook computers, allowing users to control the cursor and navigate through the screen by using their finger or a stylus. It is not typically found on other devices such as a laser printer, motherboard, or an ergonomic keyboard. Therefore, a notebook computer is the most likely place to find a touchpad.

    Rate this question:

  • 25. 

    Generally you access the Recycle Bin through an icon located __.

    • A.

      On the desktop

    • B.

      On the hard drive

    • C.

      On the shortcut menu

    • D.

      In the Properties dialog box

    Correct Answer
    A. On the desktop
    Explanation
    The Recycle Bin is generally accessed through an icon located on the desktop. This icon serves as a shortcut to the Recycle Bin, allowing users to easily access and manage their deleted files. Placing the Recycle Bin on the desktop provides a convenient and visible location for users to restore or permanently delete their deleted files.

    Rate this question:

  • 26. 

    Which purchase would provide you the best value for increasing overall computer performance?

    • A.

      A cable management kit

    • B.

      A touchpad

    • C.

      Additional computer memory

    • D.

      Corona wires

    Correct Answer
    C. Additional computer memory
    Explanation
    Additional computer memory would provide the best value for increasing overall computer performance. This is because increasing the amount of memory in a computer allows it to handle more data and run multiple programs simultaneously without slowing down. It improves the overall speed and efficiency of the computer, making it perform tasks faster and smoother. Cable management kits, touchpads, and corona wires do not directly impact computer performance in the same way as additional memory does.

    Rate this question:

  • 27. 

    To delete temporary file and other files that are not needed, you would use_____?

    • A.

      Disk Cleanup

    • B.

      The Recycle Bin

    • C.

      The deframentation utility

    • D.

      The self cleaning mode

    Correct Answer
    A. Disk Cleanup
    Explanation
    Disk Cleanup is the correct answer because it is a utility tool in Windows that allows users to delete temporary files, system files, and other unnecessary files from their computer. It helps to free up disk space and improve the overall performance of the system. The Recycle Bin is used to store deleted files temporarily before they are permanently deleted. The defragmentation utility is used to optimize the arrangement of files on a hard drive for faster access. The self-cleaning mode is not a recognized term or feature in relation to deleting unnecessary files.

    Rate this question:

  • 28. 

    You can use the Delete Browsing History dialog box to delete_______?

    • A.

      Files from the Recycle Bin

    • B.

      Fragmented files

    • C.

      Cookies

    • D.

      System properties

    Correct Answer
    C. Cookies
    Explanation
    The Delete Browsing History dialog box can be used to delete cookies. Cookies are small text files that websites store on a user's computer to remember information about them, such as login credentials or preferences. Deleting cookies can help protect privacy and remove stored data from websites.

    Rate this question:

  • 29. 

    If you identify more than one possible solution , critique and test each one to determine____?

    • A.

      If you can reproduce the problem

    • B.

      If a problem actually exists

    • C.

      Its likely outcome

    • D.

      Refer to the notes you already took

    Correct Answer
    C. Its likely outcome
    Explanation
    The question is asking about what to do if there are multiple possible solutions. The answer suggests that in order to determine the best solution, one should critique and test each option. This process will help in determining the likely outcome of each solution and ultimately choose the most suitable one. Additionally, the answer advises referring to the notes that have already been taken, which implies that previous observations and data should be considered in the decision-making process.

    Rate this question:

  • 30. 

    After putting a selected solution into place, the next step is to ______?

    • A.

      Document the prooblem and solution

    • B.

      Consult the hardware of software documentation

    • C.

      Evaluate its performance

    • D.

      Call a service professional and explain to them the problem

    Correct Answer
    C. Evaluate its performance
    Explanation
    After putting a selected solution into place, the next step is to evaluate its performance. This involves assessing whether the solution is effectively addressing the problem it was implemented for. By evaluating the performance, one can determine if any adjustments or improvements are needed to optimize the solution's effectiveness. This step is crucial in ensuring that the solution is successful and meets the desired objectives.

    Rate this question:

  • 31. 

    To help your grandmother select which computer to purchase, your fist task should be to ____?

    • A.

      Let grandma try your computer

    • B.

      Ask her what she will be using the computer for

    • C.

      Find out how much money she has to spend

    • D.

      Discuss backup proceedures with her

    Correct Answer
    B. Ask her what she will be using the computer for
    Explanation
    To help your grandmother select which computer to purchase, it is important to ask her what she will be using the computer for. This will provide valuable information about her specific needs and requirements. By understanding her intended usage, you can recommend a computer with the appropriate specifications, features, and software that will best suit her needs. This approach ensures that the computer she chooses will be capable of performing the tasks she wants to accomplish, leading to a more satisfactory purchase decision.

    Rate this question:

  • 32. 

    Your Mother is leaning toward a Macintosh computer, you point out what potential disadvantage of this choice.

    • A.

      You must me a knowledgeable IT pro to use it

    • B.

      It runs only on Linux and UNIX operating systems

    • C.

      You might have difficulty exchanging data with a PC type computer

    • D.

      It does not come with software or a warranty

    Correct Answer
    C. You might have difficulty exchanging data with a PC type computer
    Explanation
    The potential disadvantage of choosing a Macintosh computer is that you might have difficulty exchanging data with a PC type computer. This is because Macintosh computers use a different operating system and file system compared to PCs, which can sometimes create compatibility issues when transferring files or sharing data between the two platforms.

    Rate this question:

  • 33. 

    Keyboards, scanners, and microphones are examples of ____?

    • A.

      Software programs

    • B.

      Input devices

    • C.

      Output devices

    • D.

      Utilities

    Correct Answer
    B. Input devices
    Explanation
    Keyboards, scanners, and microphones are examples of input devices. Input devices are hardware devices that allow users to input data or commands into a computer. These devices send information to the computer for processing. Keyboards are used to input text and commands, scanners are used to input physical documents or images, and microphones are used to input audio. Therefore, the correct answer is input devices.

    Rate this question:

  • 34. 

    Another word for software is___?

    • A.

      Input

    • B.

      Output

    • C.

      System

    • D.

      Program

    Correct Answer
    D. Program
    Explanation
    The term "software" refers to a collection of programs, data, and instructions that tell a computer how to perform specific tasks. Therefore, "program" is an appropriate synonym for software as it represents a set of instructions or code that enables a computer system to carry out various functions and operations.

    Rate this question:

  • 35. 

    Word processors and database systems are types of ______?

    • A.

      Application software

    • B.

      System software

    • C.

      Utilities

    • D.

      Operating systems

    Correct Answer
    A. Application software
    Explanation
    Word processors and database systems are examples of application software. Application software refers to programs that are designed to perform specific tasks for users, such as word processing, data management, or creating spreadsheets. These software applications are built on top of the operating system and utilize system resources to provide functionality to the user. System software, on the other hand, includes operating systems and utilities that manage and control the computer hardware and provide a platform for other software applications to run.

    Rate this question:

  • 36. 

    ________software includes authoring, animation, music, and virtual reality.

    • A.

      Education, home, and personal

    • B.

      Multimedia

    • C.

      Workgroup

    • D.

      System

    Correct Answer
    B. Multimedia
    Explanation
    Multimedia software refers to a type of software that incorporates various forms of media such as authoring, animation, music, and virtual reality. It is used in education, home, and personal settings to create interactive and engaging content. This software allows users to combine different media elements to create a rich and immersive experience for the audience. Therefore, the correct answer is Multimedia.

    Rate this question:

  • 37. 

    ______________ provides a graphical user interface (GUI) you use to control the computer

    • A.

      An input device

    • B.

      An operating system

    • C.

      Application software

    • D.

      A flowchart

    Correct Answer
    B. An operating system
    Explanation
    An operating system provides a graphical user interface (GUI) that allows users to interact with and control the computer. It acts as an intermediary between the hardware and the user, managing resources, running applications, and providing a user-friendly interface for performing tasks. The operating system handles tasks such as file management, memory management, and device drivers, making it responsible for controlling and coordinating the overall operation of the computer.

    Rate this question:

  • 38. 

    Which software modification generally involves radical changes to the product______?

    • A.

      Upgrade

    • B.

      Patch

    • C.

      Update

    • D.

      Service Pack

    Correct Answer
    A. Upgrade
    Explanation
    An upgrade generally involves radical changes to the product. It refers to the process of installing a new version or release of a software that includes significant improvements, new features, or major changes to the existing functionality. Upgrades often require users to migrate their data and settings to the new version and may involve learning new workflows or interfaces. Unlike patches, updates, or service packs which typically address bugs, security vulnerabilities, or minor enhancements, upgrades bring substantial modifications to the software.

    Rate this question:

  • 39. 

    To giver her company the right to install a program on a server than can be accessed by a specific number of computers, You would need to acquire a ____________?

    • A.

      Network license

    • B.

      Single use liscence

    • C.

      Service Pack

    • D.

      Upgraded Web Application

    Correct Answer
    A. Network license
    Explanation
    A network license would be required in order to give her company the right to install a program on a server that can be accessed by a specific number of computers. This type of license allows multiple users to access and use the program simultaneously over a network, ensuring compliance with licensing agreements and providing centralized control and management of the software.

    Rate this question:

  • 40. 

    You follow rules for how words are used together, this is called___________?

    • A.

      Input

    • B.

      Syntax

    • C.

      Logic

    • D.

      Protocol

    Correct Answer
    B. Syntax
    Explanation
    Syntax refers to the rules and structure governing how words are combined to form grammatically correct sentences or phrases in a language. It involves the arrangement of words, phrases, and punctuation marks to convey meaning and ensure clarity in communication. Understanding and following the syntax of a language is crucial for effective communication and comprehension.

    Rate this question:

  • 41. 

    __________ programs allow you to save a document in Rich Text Format?

    • A.

      Word processing

    • B.

      Spreadsheet

    • C.

      Presentation

    • D.

      Database

    Correct Answer
    A. Word processing
    Explanation
    Word processing programs, such as Microsoft Word or Google Docs, allow users to save their documents in Rich Text Format (RTF). RTF is a file format that allows for the formatting of text, including fonts, colors, and styles, to be preserved across different platforms and applications. This format is commonly used when sharing documents between different word processing programs or when formatting needs to be maintained for printing or publishing purposes. Spreadsheet, presentation, and database programs do not typically support saving documents in RTF format.

    Rate this question:

  • 42. 

    Which is not a View option in Word   ____?

    • A.

      Print Layout

    • B.

      Slide Show

    • C.

      Full Screen

    • D.

      Draft

    Correct Answer
    B. Slide Show
    Explanation
    The question asks for a view option that is not available in Microsoft Word. The options "Print Layout," "Full Screen," and "Draft" are all valid view options in Word. However, "Slide Show" is not a view option in Word. Slide shows are typically associated with presentation software like Microsoft PowerPoint, not with word processing software like Word.

    Rate this question:

  • 43. 

    Which Word feature automatically moves the insertion point to the next line when one line is filled with text?

    • A.

      Accessibility options

    • B.

      Fontface

    • C.

      Search and Replace

    • D.

      Word wrap

    Correct Answer
    D. Word wrap
    Explanation
    Word wrap is a feature in Word that automatically moves the insertion point to the next line when one line is filled with text. This feature ensures that the text is displayed properly within the document, without requiring the user to manually press Enter to start a new line. It helps in maintaining the readability and formatting of the text by adjusting it within the available space.

    Rate this question:

  • 44. 

    Which Office program is used to evaluate, calculate, manipulate, analyze, and present numeric data?

    • A.

      Word

    • B.

      Power Point

    • C.

      Excel

    • D.

      Access

    Correct Answer
    C. Excel
    Explanation
    Excel is the correct answer because it is a powerful spreadsheet program that allows users to evaluate, calculate, manipulate, analyze, and present numeric data. It provides various functions and tools for performing complex calculations, creating charts and graphs, and organizing data efficiently. Excel is widely used in various industries and professions for financial analysis, data management, budgeting, and reporting purposes. It is specifically designed to handle numerical data and perform calculations, making it the ideal choice for working with numeric data in the Microsoft Office suite.

    Rate this question:

  • 45. 

    The rows in an Access table are called__________?

    • A.

      Cells

    • B.

      Records

    • C.

      Fields

    • D.

      Objects

    Correct Answer
    C. Fields
    Explanation
    In an Access table, the rows are called "records". Each record represents a complete set of information or data. Fields, on the other hand, refer to the columns in the table, which hold specific types of data. Cells and objects are not the correct terms to describe the rows in an Access table.

    Rate this question:

  • 46. 

    ________ is a popoular photo image editing program

    • A.

      Adobe Photoshop

    • B.

      Corel Painter

    • C.

      3D Studio Max

    • D.

      QuickTime

    Correct Answer
    A. Adobe Photoshop
    Explanation
    Adobe Photoshop is a popular photo image editing program widely used by professionals and enthusiasts alike. It offers a wide range of tools and features that allow users to enhance, manipulate, and retouch images with precision and creativity. With its intuitive interface and extensive capabilities, Adobe Photoshop has become the industry standard for photo editing and is widely recognized as the go-to software for professionals in fields such as graphic design, photography, and digital art.

    Rate this question:

  • 47. 

    What type of programs reduce the amount of disk space a file requires?

    • A.

      Backup programs

    • B.

      File compression programs

    • C.

      Anti-virus programs

    • D.

      Web conferencing programs

    Correct Answer
    B. File compression programs
    Explanation
    File compression programs reduce the amount of disk space a file requires by compressing the data in the file. This compression process reduces the file size by removing redundant or unnecessary data, resulting in a smaller file size. This can be useful for storing and transferring files more efficiently, as well as saving disk space on a computer or storage device.

    Rate this question:

  • 48. 

    You would choose Power Point if you wanted to do what--_____?

    • A.

      Use as a text editor

    • B.

      Prepare a budget

    • C.

      Present information in a slide show

    • D.

      Create a query

    Correct Answer
    C. Present information in a slide show
    Explanation
    Power Point is a presentation software that allows users to create and present information in a slide show format. It provides various tools and features such as slide layouts, animations, and transitions to enhance the visual appeal of the presentation. Therefore, if someone wants to present information in a slide show, they would choose Power Point.

    Rate this question:

  • 49. 

    Keeping track of files and directories is a job performed by ____?

    • A.

      Driver

    • B.

      Operating System

    • C.

      Emulation Card

    • D.

      Application Software

    Correct Answer
    B. Operating System
    Explanation
    The operating system is responsible for managing files and directories on a computer system. It keeps track of the location, organization, and access permissions of files and directories. The operating system provides functions and utilities to create, delete, move, and modify files and directories. It also ensures that multiple users and applications can access and share files in a secure and efficient manner. Therefore, the operating system is the correct answer for the given question.

    Rate this question:

  • 50. 

    Which of the following is a peripheral device?

    • A.

      Motherboard

    • B.

      Microprocessor

    • C.

      Random Access Memory

    • D.

      Printer

    Correct Answer
    D. Printer
    Explanation
    A peripheral device is a device that is connected to a computer system but is not an essential part of it. It provides additional functionality or input/output capabilities. The motherboard, microprocessor, and random access memory are all essential components of a computer system. However, a printer is a peripheral device as it is connected to the computer system to provide output in the form of printed documents.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.