Eastern High School IC3 Entrance Exam Quiz!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jlanham2
J
Jlanham2
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,980
| Attempts: 1,980
SettingsSettings
Please wait...
  • 1/99 Questions

    You would choose Power Point if you wanted to do what--_____?

    • Use as a text editor
    • Prepare a budget
    • Present information in a slide show
    • Create a query
Please wait...
About This Quiz


Are you ready for the Eastern High School IC3 Entrance Exam? This quiz is here for your rescue. With this quiz, you will be accountable for knowing when the first computers were made, who created the Apple Macintosh platform, what constitutes the computer's brain, and what kind of mouse uses a laser to detect the mouse's movement? Good luck with this quiz.

Eastern High School IC3 Entrance Exam Quiz! - Quiz

Quiz Preview

  • 2. 

    Which of the following should be considered when selecting a keyboard?

    • Design

    • Performance

    • Comfort

    • All of the above

    Correct Answer
    A. All of the above
    Explanation
    When selecting a keyboard, it is important to consider all of the given options: design, performance, and comfort. Design refers to the physical appearance and layout of the keyboard, which can vary depending on personal preferences and needs. Performance relates to the keyboard's functionality and responsiveness, including factors such as key switches and anti-ghosting capabilities. Comfort is crucial for prolonged use, considering factors like key spacing, wrist rest, and ergonomic design. Considering all these aspects ensures that the selected keyboard meets one's aesthetic preferences, functional requirements, and provides a comfortable typing experience.

    Rate this question:

  • 3. 

    ________ is a popoular photo image editing program

    • Adobe Photoshop

    • Corel Painter

    • 3D Studio Max

    • QuickTime

    Correct Answer
    A. Adobe Photoshop
    Explanation
    Adobe Photoshop is a popular photo image editing program widely used by professionals and enthusiasts alike. It offers a wide range of tools and features that allow users to enhance, manipulate, and retouch images with precision and creativity. With its intuitive interface and extensive capabilities, Adobe Photoshop has become the industry standard for photo editing and is widely recognized as the go-to software for professionals in fields such as graphic design, photography, and digital art.

    Rate this question:

  • 4. 

    Which is the strongest password?

    • Maxwelldata

    • Max23Well57*El

    • Maxwell123

    • MaxwellElaine

    Correct Answer
    A. Max23Well57*El
    Explanation
    The password "Max23Well57*El" is the strongest because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This makes it more difficult for hackers to guess or crack the password. The other options either lack complexity or are too predictable, making them weaker choices for a password.

    Rate this question:

  • 5. 

    People who use remote software on stolen systems to connect to the organization's network and bypass the company's security measures are called

    • Firewalls

    • Hackers

    • Spikers

    • Bugs

    Correct Answer
    A. Hackers
    Explanation
    Hackers are individuals who use remote software on stolen systems to connect to an organization's network and bypass the company's security measures. They exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal data, or cause damage. Firewalls, on the other hand, are security systems that monitor and control network traffic to protect against unauthorized access. Spikers and bugs are not relevant to the given scenario.

    Rate this question:

  • 6. 

    ________software includes authoring, animation, music, and virtual reality.

    • Education, home, and personal

    • Multimedia

    • Workgroup

    • System

    Correct Answer
    A. Multimedia
    Explanation
    Multimedia software refers to a type of software that incorporates various forms of media such as authoring, animation, music, and virtual reality. It is used in education, home, and personal settings to create interactive and engaging content. This software allows users to combine different media elements to create a rich and immersive experience for the audience. Therefore, the correct answer is Multimedia.

    Rate this question:

  • 7. 

    Generally you access the Recycle Bin through an icon located __.

    • On the desktop

    • On the hard drive

    • On the shortcut menu

    • In the Properties dialog box

    Correct Answer
    A. On the desktop
    Explanation
    The Recycle Bin is generally accessed through an icon located on the desktop. This icon serves as a shortcut to the Recycle Bin, allowing users to easily access and manage their deleted files. Placing the Recycle Bin on the desktop provides a convenient and visible location for users to restore or permanently delete their deleted files.

    Rate this question:

  • 8. 

    To help your grandmother select which computer to purchase, your fist task should be to ____?

    • Let grandma try your computer

    • Ask her what she will be using the computer for

    • Find out how much money she has to spend

    • Discuss backup proceedures with her

    Correct Answer
    A. Ask her what she will be using the computer for
    Explanation
    To help your grandmother select which computer to purchase, it is important to ask her what she will be using the computer for. This will provide valuable information about her specific needs and requirements. By understanding her intended usage, you can recommend a computer with the appropriate specifications, features, and software that will best suit her needs. This approach ensures that the computer she chooses will be capable of performing the tasks she wants to accomplish, leading to a more satisfactory purchase decision.

    Rate this question:

  • 9. 

    Another word for software is___?

    • Input

    • Output

    • System

    • Program

    Correct Answer
    A. Program
    Explanation
    The term "software" refers to a collection of programs, data, and instructions that tell a computer how to perform specific tasks. Therefore, "program" is an appropriate synonym for software as it represents a set of instructions or code that enables a computer system to carry out various functions and operations.

    Rate this question:

  • 10. 

    Which of the following is considered unethical behavior?

    • Respecting the property of others

    • Sharing someone elses passwords without permission

    • Viewing files found in the public domain

    • Encrypting your own data to keep in form being read without your permission

    Correct Answer
    A. Sharing someone elses passwords without permission
    Explanation
    Sharing someone else's passwords without permission is considered unethical behavior because it violates the principles of privacy and trust. Sharing passwords without consent can lead to unauthorized access to personal information, accounts, and sensitive data, potentially causing harm or misuse. Respecting the property of others, viewing files in the public domain, and encrypting personal data are generally considered ethical behaviors that prioritize privacy and security.

    Rate this question:

  • 11. 

    To find information about a topic in Help, you can enter _____ into the Search Box.

    • Keywords

    • A question mark

    • A path

    • A filename

    Correct Answer
    A. Keywords
    Explanation
    To find information about a topic in Help, you can enter "keywords" into the Search Box. This is because entering relevant keywords related to the topic you are looking for will help narrow down the search results and provide you with more accurate and specific information. By using keywords, you can quickly find the relevant help articles or resources that address your specific query or concern.

    Rate this question:

  • 12. 

    Which Office program is used to evaluate, calculate, manipulate, analyze, and present numeric data?

    • Word

    • Power Point

    • Excel

    • Access

    Correct Answer
    A. Excel
    Explanation
    Excel is the correct answer because it is a powerful spreadsheet program that allows users to evaluate, calculate, manipulate, analyze, and present numeric data. It provides various functions and tools for performing complex calculations, creating charts and graphs, and organizing data efficiently. Excel is widely used in various industries and professions for financial analysis, data management, budgeting, and reporting purposes. It is specifically designed to handle numerical data and perform calculations, making it the ideal choice for working with numeric data in the Microsoft Office suite.

    Rate this question:

  • 13. 

    Two or more computers linked together for the purpose of sharing data, software, and resources is called a __________.

    • Use Group

    • Topology

    • Switch

    • Network

    Correct Answer
    A. Network
    Explanation
    A network is a collection of two or more computers that are connected together to share data, software, and resources. It allows for the efficient sharing of information and resources among the connected computers. Networks can be wired or wireless, and they can be set up in various topologies such as star, bus, or ring. The use of a switch can enhance the performance and security of a network by facilitating the flow of data between connected devices. However, a network itself is the broader term that encompasses all these components and functionalities.

    Rate this question:

  • 14. 

    Data on a hard drive is stored in small __ dots on the disk

    • Water-proof

    • Magnetic

    • Removable

    • Battery-powered

    Correct Answer
    A. Magnetic
    Explanation
    The data on a hard drive is stored in small magnetic dots on the disk. These dots are magnetized to represent the binary code that makes up the data. The magnetic nature of the dots allows the hard drive to read and write data using a magnetic head, which can detect and manipulate the magnetic fields on the disk. This magnetic storage method is what allows for the long-term retention of data on a hard drive.

    Rate this question:

  • 15. 

    The recycle bin stores discarded files until_______?

    • Another user logs on

    • The computer is shut down

    • The end of the day

    • The bid is purposely emptied

    Correct Answer
    A. The bid is purposely emptied
    Explanation
    The recycle bin stores discarded files until the bin is purposely emptied. This means that the files remain in the recycle bin until the user intentionally chooses to delete them permanently. The other options mentioned, such as another user logging on, the computer being shut down, or the end of the day, do not affect the files stored in the recycle bin.

    Rate this question:

  • 16. 

    The MS Office Outlook _____________ stores names, email addresses, phone numbers and other contact Information.

    • Mailing List

    • Mail Merge

    • Address Book

    • Distribution List

    Correct Answer
    A. Address Book
    Explanation
    The MS Office Outlook stores names, email addresses, phone numbers, and other contact information. The Address Book is a feature in Outlook that allows users to store and manage their contacts. It provides a centralized location to store all contact details, making it easier to find and communicate with contacts. Users can add, edit, and delete contacts in the Address Book, as well as organize them into different categories or groups. Overall, the Address Book in MS Office Outlook is a convenient tool for managing and accessing contact information.

    Rate this question:

  • 17. 

    If the printed image is faded, this could indicate__.

    • The toner is low

    • The print density is set too low

    • Economy mode printing is turned on

    • Any of the above

    Correct Answer
    A. Any of the above
    Explanation
    If the printed image is faded, it could indicate that the toner is low, the print density is set too low, or economy mode printing is turned on. Any of these factors can result in a faded image.

    Rate this question:

  • 18. 

    Which purchase would provide you the best value for increasing overall computer performance?

    • A cable management kit

    • A touchpad

    • Additional computer memory

    • Corona wires

    Correct Answer
    A. Additional computer memory
    Explanation
    Additional computer memory would provide the best value for increasing overall computer performance. This is because increasing the amount of memory in a computer allows it to handle more data and run multiple programs simultaneously without slowing down. It improves the overall speed and efficiency of the computer, making it perform tasks faster and smoother. Cable management kits, touchpads, and corona wires do not directly impact computer performance in the same way as additional memory does.

    Rate this question:

  • 19. 

    The Table button in Word is located on the ________tab.

    • Home

    • Insert

    • View

    • Review

    Correct Answer
    A. Insert
    Explanation
    The correct answer is "Insert" because the Table button, which is used to insert tables into a Word document, is located on the Insert tab. This tab contains various options for inserting different elements into the document, such as tables, pictures, shapes, and charts.

    Rate this question:

  • 20. 

    You would most likely find a touchpad on __.

    • A laser printer

    • The motherboard

    • A notebook computer

    • An ergonomic keyboard

    Correct Answer
    A. A notebook computer
    Explanation
    A touchpad is a common input device found on notebook computers, allowing users to control the cursor and navigate through the screen by using their finger or a stylus. It is not typically found on other devices such as a laser printer, motherboard, or an ergonomic keyboard. Therefore, a notebook computer is the most likely place to find a touchpad.

    Rate this question:

  • 21. 

    To giver her company the right to install a program on a server than can be accessed by a specific number of computers, You would need to acquire a ____________?

    • Network license

    • Single use liscence

    • Service Pack

    • Upgraded Web Application

    Correct Answer
    A. Network license
    Explanation
    A network license would be required in order to give her company the right to install a program on a server that can be accessed by a specific number of computers. This type of license allows multiple users to access and use the program simultaneously over a network, ensuring compliance with licensing agreements and providing centralized control and management of the software.

    Rate this question:

  • 22. 

    If you want to make all the changes the reviewers suggest, click the ______ button.

    • Accept All Changes in Document

    • Reject and Move to Next

    • Accept and Move to Next

    • Next

    Correct Answer
    A. Accept All Changes in Document
    Explanation
    The given correct answer is "Accept All Changes in Document". This option is the most appropriate because it clearly states the action that will be taken if the user wants to make all the changes that the reviewers have suggested. The other options, such as "Reject and Move to Next" and "Accept and Move to Next", do not convey the same meaning and may cause confusion. "Next" is also not a suitable option as it does not specify what action will be taken. Therefore, "Accept All Changes in Document" is the correct choice.

    Rate this question:

  • 23. 

    To save a file in text format or Rich Text Format, you use the ______command in your text editor?

    • Convert

    • Compress

    • Save as

    • Connect

    Correct Answer
    A. Save as
    Explanation
    To save a file in text format or Rich Text Format, you use the "Save as" command in your text editor. This command allows you to specify the file format and location where you want to save the file. By selecting the "Save as" option, you can choose the desired format, such as plain text or Rich Text Format, and save the file accordingly.

    Rate this question:

  • 24. 

    Without administrative rights to your computer, you cannot_______________?

    • Install software

    • Browse the internet

    • Access your user account

    • Type in a password

    Correct Answer
    A. Install software
    Explanation
    Without administrative rights to your computer, you cannot install software. Administrative rights are necessary to make changes to the system settings and install new software on a computer. Without these rights, you will not have the necessary permissions to modify the system files and install any new programs.

    Rate this question:

  • 25. 

    If you are sending an email to more than one person, you should separate each address with this punctuation mark____.

    • Colon

    • Semi-colon

    • Period

    • Exclaimation Point

    Correct Answer
    A. Semi-colon
    Explanation
    When sending an email to multiple recipients, it is recommended to separate each address with a semi-colon. This punctuation mark is commonly used in email clients and programs to indicate the end of one recipient's address and the start of the next one. By using a semi-colon, the email program can correctly interpret and separate each address, ensuring that the email is sent to all intended recipients.

    Rate this question:

  • 26. 

    The __ process make data unreadable unless or until it is decrypted

    • Back up

    • Troubleshooting

    • Connectivity

    • Encryption

    Correct Answer
    A. Encryption
    Explanation
    Encryption is the process of converting data into a code or cipher so that it cannot be understood by unauthorized users. It ensures that data remains confidential and secure by making it unreadable unless decrypted with the correct encryption key. Therefore, encryption is the correct answer as it is the process that makes data unreadable until it is decrypted.

    Rate this question:

  • 27. 

    Your Mother is leaning toward a Macintosh computer, you point out what potential disadvantage of this choice.

    • You must me a knowledgeable IT pro to use it

    • It runs only on Linux and UNIX operating systems

    • You might have difficulty exchanging data with a PC type computer

    • It does not come with software or a warranty

    Correct Answer
    A. You might have difficulty exchanging data with a PC type computer
    Explanation
    The potential disadvantage of choosing a Macintosh computer is that you might have difficulty exchanging data with a PC type computer. This is because Macintosh computers use a different operating system and file system compared to PCs, which can sometimes create compatibility issues when transferring files or sharing data between the two platforms.

    Rate this question:

  • 28. 

    __________ programs allow you to save a document in Rich Text Format?

    • Word processing

    • Spreadsheet

    • Presentation

    • Database

    Correct Answer
    A. Word processing
    Explanation
    Word processing programs, such as Microsoft Word or Google Docs, allow users to save their documents in Rich Text Format (RTF). RTF is a file format that allows for the formatting of text, including fonts, colors, and styles, to be preserved across different platforms and applications. This format is commonly used when sharing documents between different word processing programs or when formatting needs to be maintained for printing or publishing purposes. Spreadsheet, presentation, and database programs do not typically support saving documents in RTF format.

    Rate this question:

  • 29. 

    In Excel, when a cell is selected it is called_________________?

    • Working

    • Range

    • Active

    • Cell Reference Activity

    Correct Answer
    A. Active
    Explanation
    When a cell is selected in Excel, it is referred to as "Active." This means that it is the currently active or focused cell, and any changes or operations performed will affect this cell. The term "Active" is commonly used in Excel to indicate the selected cell and is an important concept in navigating and manipulating data within a spreadsheet.

    Rate this question:

  • 30. 

    Which of the following is used to produce a hard copy of the processing results?

    • CPU

    • Monitor

    • Printer

    • Speaker

    Correct Answer
    A. Printer
    Explanation
    A printer is used to produce a hard copy of the processing results. Unlike a monitor or speaker, which display or output information electronically, a printer physically prints the processed data onto paper or other tangible materials. The CPU, or central processing unit, is responsible for executing instructions and performing calculations, but it does not directly produce a hard copy. Therefore, the correct answer is printer.

    Rate this question:

  • 31. 

    __ refers to the machine language which is all 1s and 0s.

    • Bit

    • Byte

    • Binary

    • Processor pathways

    Correct Answer
    A. Binary
    Explanation
    Binary refers to the machine language which is all 1s and 0s. In computing, binary is the base-2 numeral system used to represent numbers and perform arithmetic operations. It is the fundamental language that computers understand and use to execute instructions. Each binary digit, or bit, represents a value of either 0 or 1. By combining multiple bits, larger units of information such as bytes can be represented. Therefore, binary is the correct answer as it specifically denotes the language consisting of only 1s and 0s.

    Rate this question:

  • 32. 

    You have created a list of columns and rows containing contact information.  You decide that you would rather have this in table format.  Which command in Word should you use to accomplish this?

    • Convert Text to Table

    • Convert Table to Text

    • Quick Table

    • Quick Draw Feature

    Correct Answer
    A. Convert Text to Table
    Explanation
    To convert the contact information from a list format to a table format in Word, you should use the "Convert Text to Table" command. This command allows you to select the text that you want to convert and specify the number of columns and rows you want in the table. It automatically converts the selected text into a table format, making it easier to organize and manage the contact information.

    Rate this question:

  • 33. 

    In PowerPoint, the _________________ is the slide that controls how the other slides look and behave.

    • Dominant Slide

    • Master Slide

    • Ober Slide

    • Supervisor Slide

    Correct Answer
    A. Master Slide
    Explanation
    The master slide in PowerPoint is the slide that controls the overall appearance and behavior of all other slides in the presentation. It allows users to set the background, font styles, placeholders, and other design elements that will be applied consistently throughout the presentation. By making changes to the master slide, users can easily update the entire presentation at once, saving time and ensuring consistency in design.

    Rate this question:

  • 34. 

    One of the best ways to cut down on computer repair is __.

    • By using cable management kits

    • By perchasing an ergonomic keyboard

    • Through preventative maintenance

    • To replace the power supply regularly

    Correct Answer
    A. Through preventative maintenance
    Explanation
    Preventative maintenance refers to regular checks and actions taken to prevent potential issues or breakdowns. By performing routine maintenance tasks such as cleaning the computer, updating software, and checking for malware, the chances of encountering major problems are reduced. This proactive approach helps identify and address minor issues before they escalate into costly repairs. Therefore, through preventative maintenance, computer repair can be significantly minimized.

    Rate this question:

  • 35. 

    What type of programs reduce the amount of disk space a file requires?

    • Backup programs

    • File compression programs

    • Anti-virus programs

    • Web conferencing programs

    Correct Answer
    A. File compression programs
    Explanation
    File compression programs reduce the amount of disk space a file requires by compressing the data in the file. This compression process reduces the file size by removing redundant or unnecessary data, resulting in a smaller file size. This can be useful for storing and transferring files more efficiently, as well as saving disk space on a computer or storage device.

    Rate this question:

  • 36. 

    Keyboards, scanners, and microphones are examples of ____?

    • Software programs

    • Input devices

    • Output devices

    • Utilities

    Correct Answer
    A. Input devices
    Explanation
    Keyboards, scanners, and microphones are examples of input devices. Input devices are hardware devices that allow users to input data or commands into a computer. These devices send information to the computer for processing. Keyboards are used to input text and commands, scanners are used to input physical documents or images, and microphones are used to input audio. Therefore, the correct answer is input devices.

    Rate this question:

  • 37. 

    If a file cannot be read by an applicaiton, you can check it by right clicking the filename and then clicking ________________?

    • Properties

    • Encrypt

    • General

    • Advanced Features

    Correct Answer
    A. Properties
    Explanation
    To check a file that cannot be read by an application, you can right click on the filename and then click on "Properties". This will open a window displaying various information about the file, such as its size, location, creation date, and permissions. By accessing the properties of the file, you can gather more details about it and potentially troubleshoot any issues that may be preventing it from being read by the application.

    Rate this question:

  • 38. 

    If you do not want to make a change suggested by a reviewer, click the _________  button.

    • Next Change

    • Previous

    • Accept and move to Next

    • Reject and move to Next

    Correct Answer
    A. Reject and move to Next
    Explanation
    The correct answer is "Reject and move to Next". This option is chosen when the user does not want to make a change suggested by a reviewer and wants to proceed to the next suggestion. It allows the user to skip the suggested change and move on to the next one without accepting or implementing the reviewer's suggestion.

    Rate this question:

  • 39. 

    What type of computer could be found in a digital watch?

    • Mainframe computer

    • Supercomputer

    • Embedded computer

    • Notebook computer

    Correct Answer
    A. Embedded computer
    Explanation
    An embedded computer is the most suitable type of computer that could be found in a digital watch. Embedded computers are designed to perform specific functions and are often integrated into other devices or systems. In the case of a digital watch, an embedded computer is responsible for controlling and displaying the time, as well as other features such as alarms, timers, and possibly fitness tracking. This type of computer is small, low-power, and optimized for efficiency, making it ideal for devices like digital watches where space and battery life are important considerations.

    Rate this question:

  • 40. 

    Loading a file into an application is called ______?

    • Opening

    • Closing

    • Filing

    • Confounding

    Correct Answer
    A. Opening
    Explanation
    Loading a file into an application is referred to as "opening". This term is commonly used in computing to describe the action of accessing and displaying the contents of a file within a specific program or software. When a file is opened, it becomes accessible for viewing, editing, or performing various operations within the application. Therefore, "opening" accurately describes the process of loading a file into an application.

    Rate this question:

  • 41. 

    If the primary addressee does not see that others are being sent the same message at the same time, this is an example of?

    • Carbon Copy

    • Blind Copy

    • Screened Copy

    • Top Secret Copy

    Correct Answer
    A. Blind Copy
    Explanation
    Blind Copy is the correct answer because it refers to sending a message to multiple recipients without revealing their identities to each other. In this scenario, the primary addressee is unaware that others are also receiving the same message simultaneously.

    Rate this question:

  • 42. 

    You can use the Delete Browsing History dialog box to delete_______?

    • Files from the Recycle Bin

    • Fragmented files

    • Cookies

    • System properties

    Correct Answer
    A. Cookies
    Explanation
    The Delete Browsing History dialog box can be used to delete cookies. Cookies are small text files that websites store on a user's computer to remember information about them, such as login credentials or preferences. Deleting cookies can help protect privacy and remove stored data from websites.

    Rate this question:

  • 43. 

    Which Word feature automatically moves the insertion point to the next line when one line is filled with text?

    • Accessibility options

    • Fontface

    • Search and Replace

    • Word wrap

    Correct Answer
    A. Word wrap
    Explanation
    Word wrap is a feature in Word that automatically moves the insertion point to the next line when one line is filled with text. This feature ensures that the text is displayed properly within the document, without requiring the user to manually press Enter to start a new line. It helps in maintaining the readability and formatting of the text by adjusting it within the available space.

    Rate this question:

  • 44. 

    Keeping track of files and directories is a job performed by ____?

    • Driver

    • Operating System

    • Emulation Card

    • Application Software

    Correct Answer
    A. Operating System
    Explanation
    The operating system is responsible for managing files and directories on a computer system. It keeps track of the location, organization, and access permissions of files and directories. The operating system provides functions and utilities to create, delete, move, and modify files and directories. It also ensures that multiple users and applications can access and share files in a secure and efficient manner. Therefore, the operating system is the correct answer for the given question.

    Rate this question:

  • 45. 

    Installing new or updated software for an optical disk is a simple process that starts by ___________?

    • Making a backup copy

    • Recording the product key

    • Registering the software

    • Inserting the disk into the CD or DVD drive

    Correct Answer
    A. Inserting the disk into the CD or DVD drive
    Explanation
    To install new or updated software for an optical disk, the first step is to insert the disk into the CD or DVD drive. This allows the computer to read the disk and initiate the installation process. Once the disk is inserted, the installation wizard or prompt will guide the user through the necessary steps to complete the installation.

    Rate this question:

  • 46. 

    Password best practices suggest ____

    • Text only

    • Numbers and Text

    • Numbers and Symbols

    • Text, Numbers, and Symbols

    Correct Answer
    A. Text, Numbers, and Symbols
    Explanation
    Password best practices suggest using a combination of text, numbers, and symbols. This makes the password more complex and harder to guess or crack. Including a mix of different characters increases the security of the password and reduces the risk of it being easily compromised.

    Rate this question:

  • 47. 

    Cache is_________?

    • High speed, non volitile, onboard, temporary memory

    • Special types of passwords

    • An external adapter suited to generic pheripheral devices

    • An always on, dedicated line into the internet

    Correct Answer
    A. High speed, non volitile, onboard, temporary memory
    Explanation
    Cache is a type of memory that is designed to store frequently accessed data for quick retrieval. It is high speed because it is located closer to the processor than main memory. It is non-volatile, meaning that it retains data even when power is lost. It is onboard, meaning that it is integrated into the processor or located very close to it. And it is temporary because it is constantly being overwritten with new data as needed.

    Rate this question:

  • 48. 

    ______________ provides a graphical user interface (GUI) you use to control the computer

    • An input device

    • An operating system

    • Application software

    • A flowchart

    Correct Answer
    A. An operating system
    Explanation
    An operating system provides a graphical user interface (GUI) that allows users to interact with and control the computer. It acts as an intermediary between the hardware and the user, managing resources, running applications, and providing a user-friendly interface for performing tasks. The operating system handles tasks such as file management, memory management, and device drivers, making it responsible for controlling and coordinating the overall operation of the computer.

    Rate this question:

  • 49. 

    Which does not Belong?

    • Floppy Disk

    • DVD

    • CD

    • Blue Ray Disk

    Correct Answer
    A. Floppy Disk
    Explanation
    The floppy disk does not belong because it is an outdated storage medium that was commonly used in the past but has been largely replaced by more advanced technologies such as DVDs, CDs, and Blu-ray disks. The other options are all modern storage mediums that are still widely used today.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 15, 2011
    Quiz Created by
    Jlanham2
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.