Ehs 2012 Computer Final Exam

Approved & Edited by ProProfs Editorial Team
At ProProfs Quizzes, our dedicated in-house team of experts takes pride in their work. With a sharp eye for detail, they meticulously review each quiz. This ensures that every quiz, taken by over 100 million users, meets our standards of accuracy, clarity, and engagement.
Learn about Our Editorial Process
| Written by Jlanham2
J
Jlanham2
Community Contributor
Quizzes Created: 2 | Total Attempts: 2,948
Questions: 100 | Attempts: 988

SettingsSettingsSettings
Ehs 2012 Computer Final Exam - Quiz

This exam tests general knowledge about computing basics, software, and systems. � �The test consists of�50 multiple choice questions. � Questions will be randomly generated and is used to determine computer interest, aptitude and class enrollment. � �This is a timed test, you have 45 minutes to answer 50 all questions, good luck!� �A permanent record of your results will be generated.


Questions and Answers
  • 1. 

    The first computers were develpoed in __.

    • A. 

      The late 1920's and early 1930's

    • B. 

      The late 1940's and early 1950's

    • C. 

      Tge mid-1960s

    • D. 

      1971

    Correct Answer
    B. The late 1940's and early 1950's
    Explanation
    The correct answer is "the late 1940's and early 1950's". This is because the first electronic computers were developed during this time period. These early computers were large, expensive, and used vacuum tubes for circuitry. They marked a significant advancement in computing technology and paved the way for the development of modern computers.

    Rate this question:

  • 2. 

    Who developed Apple Macintosh platform (pick 2)

    • A. 

      Steve Jobs

    • B. 

      Steve Wozniak

    • C. 

      Dr. Ted Hoff & Bill Gates

    • D. 

      Dr. John Atanasoff & Bill Gates

    Correct Answer(s)
    A. Steve Jobs
    B. Steve Wozniak
    Explanation
    Steve Jobs and Steve Wozniak developed the Apple Macintosh platform. Steve Jobs was one of the co-founders of Apple Inc. and played a crucial role in the development of the Macintosh computer. Steve Wozniak, also known as "Woz," was another co-founder of Apple and was responsible for designing the hardware and software of the Macintosh. Together, Jobs and Wozniak revolutionized the personal computer industry with the introduction of the Macintosh, which featured a graphical user interface and mouse, making it more user-friendly and accessible to the general public.

    Rate this question:

  • 3. 

    What type of computer could be found in a digital watch?

    • A. 

      Mainframe computer

    • B. 

      Supercomputer

    • C. 

      Embedded computer

    • D. 

      Notebook computer

    Correct Answer
    C. Embedded computer
    Explanation
    An embedded computer is the correct answer because it is a type of computer specifically designed to perform a dedicated function within a larger system. In the case of a digital watch, an embedded computer is used to control and operate the various features and functions of the watch, such as displaying the time, setting alarms, and running other basic applications. Embedded computers are typically small, low-power devices that are integrated into everyday objects to provide specific functionalities.

    Rate this question:

  • 4. 

    Which of the following system components is the brains of the computer?

    • A. 

      Circuit board

    • B. 

      CPU

    • C. 

      Memory

    • D. 

      Network card

    Correct Answer
    B. CPU
    Explanation
    The CPU (Central Processing Unit) is often referred to as the brains of the computer because it is responsible for executing instructions and performing calculations. It is the component that carries out the majority of the computer's processing and controls the operation of other hardware components. The CPU is the main component that determines the overall performance and speed of a computer system.

    Rate this question:

  • 5. 

    __ refers to the machine language which is all 1s and 0s

    • A. 

      Bit

    • B. 

      Byte

    • C. 

      Binary

    • D. 

      Processor pathways

    Correct Answer
    C. Binary
    Explanation
    Binary refers to the machine language which is all 1s and 0s. This is because computers use a binary system to represent and process data. In binary, each digit can only be a 0 or a 1, which corresponds to the two states of an electronic switch in a computer circuit. By using combinations of 1s and 0s, computers can represent and manipulate all types of data, including numbers, text, and instructions. Therefore, binary is the correct answer to the question.

    Rate this question:

  • 6. 

    Hard drives, magnetic tapes and zip disks are examples of __.

    • A. 

      Magnetic storage devices

    • B. 

      Optical storage devices

    • C. 

      Soild-state storage

    • D. 

      Remote storage

    Correct Answer
    A. Magnetic storage devices
    Explanation
    Hard drives, magnetic tapes, and zip disks are all examples of magnetic storage devices because they use magnetic fields to store and retrieve data. Magnetic storage devices are commonly used for long-term storage and have the advantage of being able to retain data even when powered off. Optical storage devices, on the other hand, use lasers to read and write data, while solid-state storage devices use flash memory. Remote storage refers to storing data on a remote server or cloud-based storage system.

    Rate this question:

  • 7. 

    When you scan the barcode of an item into the computer, which step in the information cycle is being performed?

    • A. 

      Inputting data

    • B. 

      Processing data

    • C. 

      Outputting information

    • D. 

      Sorting data

    Correct Answer
    A. Inputting data
    Explanation
    When you scan the barcode of an item into the computer, you are essentially inputting data into the system. This is the first step in the information cycle, where raw data is collected and entered into the computer for further processing and analysis. Scanning the barcode allows the computer to capture the specific information associated with that item, such as its name, price, and other relevant details. This data can then be used for various purposes, such as inventory management, sales tracking, or generating reports.

    Rate this question:

  • 8. 

    Most of the keyboards provided with desktop computers are__.

    • A. 

      Flexible

    • B. 

      Enhanced

    • C. 

      Virtual

    • D. 

      Wireless

    Correct Answer
    B. Enhanced
    Explanation
    Most of the keyboards provided with desktop computers are enhanced. This means that they have additional features and functionalities compared to basic keyboards. Enhanced keyboards often include multimedia keys, shortcut keys, and additional ports for connecting USB devices. These keyboards are designed to provide a more convenient and efficient user experience, allowing users to perform tasks more easily and quickly.

    Rate this question:

  • 9. 

    Which type of mouse uses a laser to detect the mouse's movement?

    • A. 

      Mechanical

    • B. 

      Optomechanical

    • C. 

      Optical

    • D. 

      Wireless

    Correct Answer
    C. Optical
    Explanation
    An optical mouse uses a laser to detect the mouse's movement. The laser illuminates the surface beneath the mouse, and the sensor detects the reflection of the light to track the movement. This allows for more precise tracking compared to mechanical or optomechanical mice, which use a rolling ball or a combination of a ball and optical sensors. Wireless mice, on the other hand, refer to the method of connectivity and do not determine the type of sensor used.

    Rate this question:

  • 10. 

    Which type of monitor produces an image by manipulating light within a layer of liquid crystal cells?

    • A. 

      CRT

    • B. 

      LCD

    • C. 

      Gas plasma

    • D. 

      All of the above

    Correct Answer
    B. LCD
    Explanation
    An LCD (Liquid Crystal Display) monitor produces an image by manipulating light within a layer of liquid crystal cells. Unlike CRT (Cathode Ray Tube) monitors, which use electron beams to generate images, LCD monitors rely on liquid crystals to control the passage of light through the cells. Gas plasma monitors, on the other hand, use a different technology altogether, where tiny cells of ionized gas emit ultraviolet light to create the image. Therefore, the correct answer is LCD, as it specifically mentions the type of monitor that uses liquid crystal cells to produce images.

    Rate this question:

  • 11. 

    Which of the following is used to produce a hard copy of the processing results?

    • A. 

      CPU

    • B. 

      Monitor

    • C. 

      Printer

    • D. 

      Speaker

    Correct Answer
    C. Printer
    Explanation
    A printer is used to produce a hard copy of the processing results. A CPU is responsible for processing data and executing instructions, a monitor is used to display the processed information visually, and a speaker is used to output audio. However, a printer is specifically designed to generate physical copies of documents or images, making it the correct choice for producing a hard copy of the processing results.

    Rate this question:

  • 12. 

    Printing speed is measured in __.

    • A. 

      RAM

    • B. 

      Characters per second

    • C. 

      Pages per minute

    • D. 

      Dots per inch

    Correct Answer
    C. Pages per minute
    Explanation
    Printing speed is measured in pages per minute because it indicates how many pages a printer can print in one minute. This metric is commonly used to compare the efficiency and productivity of different printers. It provides a clear measurement of the speed at which a printer can produce output, allowing users to make informed decisions based on their printing needs.

    Rate this question:

  • 13. 

    By using a USB hub, you could connect up to __ different peripherals with a single connector

    • A. 

      8

    • B. 

      40

    • C. 

      63

    • D. 

      127

    Correct Answer
    D. 127
    Explanation
    A USB hub allows for the expansion of USB ports on a device, allowing multiple peripherals to be connected simultaneously. The maximum number of peripherals that can be connected depends on the type of USB hub being used. The answer of 127 suggests that the USB hub being referred to is a USB 2.0 hub, as it supports up to 127 devices. USB 3.0 hubs, on the other hand, can support up to 40 devices. Therefore, with a USB hub, it is possible to connect up to 127 different peripherals using a single connector.

    Rate this question:

  • 14. 

    When you plug in a device and the computer system configures it automatically, this is referred to as __

    • A. 

      Plug-and-play

    • B. 

      FireWire

    • C. 

      A serial port

    • D. 

      Bluetooth

    Correct Answer
    A. Plug-and-play
    Explanation
    When you plug in a device and the computer system configures it automatically, this is referred to as plug-and-play. Plug-and-play is a feature that allows devices to be connected to a computer system without the need for manual configuration or installation of drivers. It simplifies the process of adding new devices to a computer system, as the system automatically detects and configures the device, making it ready for immediate use.

    Rate this question:

  • 15. 

    The __ process make data unreadable unless or until it is decrypted

    • A. 

      Back up

    • B. 

      Troubleshooting

    • C. 

      Connectivity

    • D. 

      Encryption

    Correct Answer
    D. Encryption
    Explanation
    Encryption is the process of converting data into a form that is unreadable unless it is decrypted. This ensures that unauthorized individuals cannot access or understand the data. Encryption is commonly used to protect sensitive information such as personal data, financial transactions, and communication channels. It adds an extra layer of security to prevent data breaches and unauthorized access.

    Rate this question:

  • 16. 

    People who use remote software on stolen systems to connect to the organization's network and bypass the company's security measures are called

    • A. 

      Firewalls

    • B. 

      Hackers

    • C. 

      Spikers

    • D. 

      Bugs

    Correct Answer
    B. Hackers
    Explanation
    Hackers are individuals who use remote software on stolen systems to connect to an organization's network and bypass the company's security measures. They exploit vulnerabilities in the system to gain unauthorized access and potentially cause harm, steal sensitive information, or disrupt operations. By using remote software on stolen systems, hackers can hide their identity and location, making it difficult for organizations to trace and prevent their malicious activities.

    Rate this question:

  • 17. 

    Data on a hard drive is stored in small __ dots on the disk

    • A. 

      Water-proof

    • B. 

      Magnetic

    • C. 

      Removable

    • D. 

      Battery-powered

    Correct Answer
    B. Magnetic
    Explanation
    Data on a hard drive is stored in small magnetic dots on the disk. Hard drives use a magnetic storage technology where the data is written and read using magnetic fields. These magnetic dots are arranged in a pattern on the disk, representing the binary data. The magnetic nature of the dots allows for the data to be stored and retrieved accurately, making magnetic the correct answer.

    Rate this question:

  • 18. 

    If media is damaged by water, first __

    • A. 

      Restart the computer

    • B. 

      Place it in an airtight plastic bag

    • C. 

      Dry it

    • D. 

      Any of the above

    Correct Answer
    C. Dry it
    Explanation
    If media is damaged by water, the first step would be to dry it. This is because water can cause damage to electronic components and circuits, leading to malfunction or permanent damage. By drying the media, the moisture can be removed, reducing the risk of further damage and increasing the chances of it functioning properly again. Restarting the computer or placing it in an airtight plastic bag may not address the issue of water damage directly, so drying it would be the most appropriate initial action.

    Rate this question:

  • 19. 

    If the printed image is faded, this could indicate__.

    • A. 

      The toner is low

    • B. 

      The print density is set too low

    • C. 

      Economy mode printing is turned on

    • D. 

      Any of the above

    Correct Answer
    D. Any of the above
    Explanation
    If the printed image is faded, it could indicate that the toner is low, the print density is set too low, or economy mode printing is turned on. In any of these cases, the result would be a faded image.

    Rate this question:

  • 20. 

    You would use the DOS ping command to test for which issue?

    • A. 

      Display problems

    • B. 

      Connectivity

    • C. 

      Paper jams

    • D. 

      Crashed hard drive

    Correct Answer
    B. Connectivity
    Explanation
    The DOS ping command is used to test for connectivity issues. It sends a network request to a specific IP address or domain name and measures the response time. If there is a successful response, it indicates that the device is connected to the network. Therefore, using the ping command can help identify any connectivity problems between devices or networks.

    Rate this question:

  • 21. 

    To protect agains power spikes, you would use a(n)

    • A. 

      Standby power system (SPS)

    • B. 

      Driver

    • C. 

      Surge suppressor

    • D. 

      Separate thermostat

    Correct Answer
    C. Surge suppressor
    Explanation
    A surge suppressor is used to protect against power spikes by diverting excess voltage away from sensitive electronic devices. When a power spike occurs, the surge suppressor detects the increase in voltage and redirects it to the grounding wire, preventing it from reaching and damaging connected devices. This helps to safeguard electronic equipment from potential damage caused by sudden surges in power, such as during lightning storms or when there is a fluctuation in the power supply.

    Rate this question:

  • 22. 

    One of the best ways to cut down on computer repair is __.

    • A. 

      By using cable management kits

    • B. 

      By perchasing an ergonomic keyboard

    • C. 

      Through preventative maintenance

    • D. 

      To replace the power supply regularly

    Correct Answer
    C. Through preventative maintenance
    Explanation
    Preventative maintenance refers to regularly performing maintenance tasks on a computer system to prevent potential issues and problems from occurring. This includes tasks such as cleaning the computer, updating software, checking for malware, and backing up data. By regularly performing preventative maintenance, the chances of encountering major computer problems are reduced, leading to a decrease in the need for computer repairs.

    Rate this question:

  • 23. 

    Which of the following should be considered when selecting a keyboard?

    • A. 

      Design

    • B. 

      Performance

    • C. 

      Comfort

    • D. 

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    When selecting a keyboard, all of the mentioned factors should be considered. Design is important as it determines the aesthetics and visual appeal of the keyboard. Performance is crucial as it affects the responsiveness and accuracy of keystrokes. Comfort is also a significant factor as it determines the ergonomics and ease of use, especially during long typing sessions. Therefore, considering all three factors, i.e., design, performance, and comfort, is essential in selecting an appropriate keyboard.

    Rate this question:

  • 24. 

    You would most likely find a touchpad on __.

    • A. 

      A laser printer

    • B. 

      The motherboard

    • C. 

      A notebook computer

    • D. 

      An ergonomic keyboard

    Correct Answer
    C. A notebook computer
    Explanation
    A touchpad is a common input device found on notebook computers, allowing users to control the cursor and perform various functions by moving their fingers on the surface. While touchpads can also be found on some ergonomic keyboards, they are most commonly associated with notebook computers. Therefore, the correct answer is a notebook computer.

    Rate this question:

  • 25. 

    Generally you access the Recycle Bin through an icon located __.

    • A. 

      On the desktop

    • B. 

      On the hard drive

    • C. 

      On the shortcut menu

    • D. 

      In the Properties dialog box

    Correct Answer
    A. On the desktop
    Explanation
    The Recycle Bin is generally accessed through an icon located on the desktop. This icon provides a convenient way for users to access and manage their deleted files. By placing the Recycle Bin on the desktop, it is easily visible and accessible, allowing users to quickly restore or permanently delete their deleted files.

    Rate this question:

  • 26. 

    Which purchase would provide you the best value for increasing overall computer performance?

    • A. 

      A cable management kit

    • B. 

      A touchpad

    • C. 

      Additional computer memory

    • D. 

      Corona wires

    Correct Answer
    C. Additional computer memory
    Explanation
    Additional computer memory would provide the best value for increasing overall computer performance. This is because increasing the amount of memory in a computer allows it to handle more data and programs simultaneously, resulting in improved speed and performance. A cable management kit and touchpad may enhance convenience, but they do not directly impact the computer's performance. Corona wires are used in laser printers and have no relevance to improving computer performance.

    Rate this question:

  • 27. 

    To delete temporary file and other files that are not needed, you would use_____?

    • A. 

      Disk Cleanup

    • B. 

      The Recycle Bin

    • C. 

      The deframentation utility

    • D. 

      The self cleaning mode

    Correct Answer
    A. Disk Cleanup
    Explanation
    Disk Cleanup is the correct answer because it is a utility tool in Windows that allows users to delete unnecessary files and free up disk space. It scans the computer for temporary files, system files, and other items that can be safely removed. This helps improve the performance of the computer and allows for better organization of files. The Recycle Bin is used to store deleted files temporarily before permanently deleting them, not for cleaning up unnecessary files. The defragmentation utility is used to reorganize fragmented files on the hard drive, not for deleting files. There is no such thing as "self cleaning mode" in this context.

    Rate this question:

  • 28. 

    You can use the Delete Browsing History dialog box to delete_______?

    • A. 

      Files from the Recycle Bin

    • B. 

      Fragmented files

    • C. 

      Cookies

    • D. 

      System properties

    Correct Answer
    C. Cookies
    Explanation
    The Delete Browsing History dialog box can be used to delete cookies. Cookies are small files that websites store on a user's computer to remember information about them, such as login credentials or preferences. Deleting cookies can help improve privacy and security by removing stored information from the browser.

    Rate this question:

  • 29. 

    If you identify more than one possible solution , critique and test each one to determine____?

    • A. 

      If you can reproduce the problem

    • B. 

      If a problem actually exists

    • C. 

      Its likely outcome

    • D. 

      Refer to the notes you already took

    Correct Answer
    C. Its likely outcome
    Explanation
    The question is asking about the process of identifying multiple possible solutions and determining their likely outcome. By critiquing and testing each solution, one can assess whether the problem can be reproduced and if it actually exists. This evaluation helps in understanding the likely outcome of each solution. Additionally, referring to the notes already taken can provide further insights and information to make an informed decision.

    Rate this question:

  • 30. 

    After putting a selected solution into place, the next step is to ______?

    • A. 

      Document the prooblem and solution

    • B. 

      Consult the hardware of software documentation

    • C. 

      Evaluate its performance

    • D. 

      Call a service professional and explain to them the problem

    Correct Answer
    C. Evaluate its performance
    Explanation
    After implementing a selected solution, the next step is to evaluate its performance. This involves assessing how well the solution is working and whether it is achieving the desired outcomes. By evaluating the performance, one can determine if any adjustments or improvements are needed to optimize the solution's effectiveness. This step helps in ensuring that the solution is meeting the intended goals and objectives.

    Rate this question:

  • 31. 

    To help your grandmother select which computer to purchase, your fist task should be to ____?

    • A. 

      Let grandma try your computer

    • B. 

      Ask her what she will be using the computer for

    • C. 

      Find out how much money she has to spend

    • D. 

      Discuss backup proceedures with her

    Correct Answer
    B. Ask her what she will be using the computer for
    Explanation
    To assist your grandmother in selecting the appropriate computer, it is important to ask her about the purpose for which she intends to use it. This will allow you to understand her specific needs and requirements, such as whether she plans to use it for basic tasks like browsing the internet and email, or if she needs it for more advanced activities like photo editing or gaming. By determining her usage, you can provide her with tailored recommendations and ensure that the computer she purchases meets her specific requirements.

    Rate this question:

  • 32. 

    Your Mother is leaning toward a Macintosh computer, you point out what potential disadvantage of this choice.

    • A. 

      You must me a knowledgeable IT pro to use it

    • B. 

      It runs only on Linux and UNIX operating systems

    • C. 

      You might have difficulty exchanging data with a PC type computer

    • D. 

      It does not come with software or a warranty

    Correct Answer
    C. You might have difficulty exchanging data with a PC type computer
    Explanation
    The potential disadvantage of choosing a Macintosh computer is that you might have difficulty exchanging data with a PC type computer. This means that if you need to share files or collaborate with someone who uses a PC, there could be compatibility issues and difficulties in transferring data between the two systems.

    Rate this question:

  • 33. 

    Keyboards, scanners, and microphones are examples of ____?

    • A. 

      Software programs

    • B. 

      Input devices

    • C. 

      Output devices

    • D. 

      Utilities

    Correct Answer
    B. Input devices
    Explanation
    Keyboards, scanners, and microphones are examples of input devices. Input devices are hardware devices that allow users to input data or commands into a computer system. Keyboards are used to input text and commands, scanners are used to input physical documents or images, and microphones are used to input audio. These devices are essential for users to interact with and provide input to the computer system.

    Rate this question:

  • 34. 

    Another word for software is___?

    • A. 

      Input

    • B. 

      Output

    • C. 

      System

    • D. 

      Program

    Correct Answer
    D. Program
    Explanation
    The word "software" refers to the programs and other operating information used by a computer. Therefore, "program" is a synonym for software, as it also refers to a set of instructions that tell a computer what to do.

    Rate this question:

  • 35. 

    Word processors and database systems are types of ______?

    • A. 

      Application software

    • B. 

      System software

    • C. 

      Utilities

    • D. 

      Operating systems

    Correct Answer
    A. Application software
    Explanation
    Word processors and database systems are examples of application software. Application software refers to programs that are designed to perform specific tasks for users, such as creating documents or managing data. These programs are distinct from system software, which includes operating systems and utilities that help manage and control the computer's hardware and software resources. Therefore, the correct answer is application software.

    Rate this question:

  • 36. 

    ________software includes authoring, animation, music, and virtual reality.

    • A. 

      Education, home, and personal

    • B. 

      Multimedia

    • C. 

      Workgroup

    • D. 

      System

    Correct Answer
    B. Multimedia
    Explanation
    Multimedia software refers to applications that encompass various forms of media such as authoring, animation, music, and virtual reality. It is used in various fields including education, home, and personal use. This software allows users to create, edit, and manipulate different types of media content, resulting in interactive and engaging experiences. Therefore, the correct answer is "Multimedia."

    Rate this question:

  • 37. 

    ______________ provides a graphical user interface (GUI) you use to control the computer

    • A. 

      An input device

    • B. 

      An operating system

    • C. 

      Application software

    • D. 

      A flowchart

    Correct Answer
    B. An operating system
    Explanation
    An operating system provides a graphical user interface (GUI) that allows users to interact with and control the computer. It acts as an intermediary between the hardware and software, managing resources and providing a platform for running applications. The GUI provided by the operating system includes windows, icons, menus, and buttons that allow users to navigate and control the computer system easily. Therefore, the operating system is responsible for providing the GUI that enables users to control the computer.

    Rate this question:

  • 38. 

    Which software modification generally involves radical changes to the product______?

    • A. 

      Upgrade

    • B. 

      Patch

    • C. 

      Update

    • D. 

      Service Pack

    Correct Answer
    A. Upgrade
    Explanation
    An upgrade generally involves radical changes to the product. It typically includes significant improvements in features, functionality, and performance. Upgrades often introduce new versions of the software with substantial changes to the user interface or underlying technology. This can include major updates to the software's architecture, design, or core functionality. Upgrades are typically more extensive and impactful than patches, updates, or service packs, which usually focus on fixing bugs, improving security, or adding minor enhancements to the existing software.

    Rate this question:

  • 39. 

    To giver her company the right to install a program on a server than can be accessed by a specific number of computers, You would need to acquire a ____________?

    • A. 

      Network license

    • B. 

      Single use liscence

    • C. 

      Service Pack

    • D. 

      Upgraded Web Application

    Correct Answer
    A. Network license
    Explanation
    To give her company the right to install a program on a server that can be accessed by a specific number of computers, a network license would be required. A network license allows multiple users to access and use the program simultaneously from different computers within the network. This type of license is ideal for companies or organizations that need to provide access to software for multiple users within their network infrastructure.

    Rate this question:

  • 40. 

    You follow rules for how words are used together, this is called___________?

    • A. 

      Input

    • B. 

      Syntax

    • C. 

      Logic

    • D. 

      Protocol

    Correct Answer
    B. Syntax
    Explanation
    Syntax refers to the set of rules that govern how words are organized and combined to form meaningful sentences in a language. It includes rules for word order, sentence structure, and grammatical rules. Therefore, the correct answer is syntax.

    Rate this question:

  • 41. 

    __________ programs allow you to save a document in Rich Text Format?

    • A. 

      Word processing

    • B. 

      Spreadsheet

    • C. 

      Presentation

    • D. 

      Database

    Correct Answer
    A. Word processing
    Explanation
    Word processing programs, such as Microsoft Word or Google Docs, allow users to save documents in Rich Text Format (RTF). RTF is a file format that preserves formatting, such as font styles, colors, and sizes, while also being compatible with different word processing software. This allows users to share documents across different platforms and ensure that the formatting remains consistent. Spreadsheet, presentation, and database programs typically do not have the functionality to save documents in RTF format.

    Rate this question:

  • 42. 

    Which is not a View option in Word   ____?

    • A. 

      Print Layout

    • B. 

      Slide Show

    • C. 

      Full Screen

    • D. 

      Draft

    Correct Answer
    B. Slide Show
    Explanation
    The question asks for the option that is not available in Word as a view option. The options "Print Layout," "Full Screen," and "Draft" are all valid view options in Word. However, "Slide Show" is not a view option in Word. This view option is typically available in presentation software such as PowerPoint, but not in Word.

    Rate this question:

  • 43. 

    Which Word feature automatically moves the insertion point to the next line when one line is filled with text?

    • A. 

      Accessibility options

    • B. 

      Fontface

    • C. 

      Search and Replace

    • D. 

      Word wrap

    Correct Answer
    D. Word wrap
    Explanation
    Word wrap is the correct answer because it is a feature in Word that automatically moves the insertion point to the next line when one line is filled with text. This allows for easy and convenient typing without the need for manual line breaks.

    Rate this question:

  • 44. 

    Which Office program is used to evaluate, calculate, manipulate, analyze, and present numeric data?

    • A. 

      Word

    • B. 

      Power Point

    • C. 

      Excel

    • D. 

      Access

    Correct Answer
    C. Excel
    Explanation
    Excel is the correct answer because it is a spreadsheet program that is specifically designed for evaluating, calculating, manipulating, analyzing, and presenting numeric data. It provides various functions and formulas that allow users to perform complex calculations, create charts and graphs, and organize data effectively. Excel is widely used in business, finance, accounting, and other fields where numerical data analysis is required.

    Rate this question:

  • 45. 

    The rows in an Access table are called__________?

    • A. 

      Cells

    • B. 

      Records

    • C. 

      Fields

    • D. 

      Objects

    Correct Answer
    C. Fields
    Explanation
    In an Access table, the rows are called "records". Each record represents a complete set of data, containing information about a particular entity or item. On the other hand, "fields" refer to the columns in the table, which represent specific attributes or properties of the entity. Therefore, "records" is the correct answer as it accurately describes the rows in an Access table.

    Rate this question:

  • 46. 

    ________ is a popoular photo image editing program

    • A. 

      Adobe Photoshop

    • B. 

      Corel Painter

    • C. 

      3D Studio Max

    • D. 

      QuickTime

    Correct Answer
    A. Adobe Photoshop
    Explanation
    Adobe Photoshop is a popular photo image editing program widely used by professionals and enthusiasts alike. It offers a wide range of tools and features that allow users to enhance and manipulate images with precision and creativity. With its user-friendly interface and extensive capabilities, Adobe Photoshop has become the industry standard for photo editing software.

    Rate this question:

  • 47. 

    What type of programs reduce the amount of disk space a file requires?

    • A. 

      Backup programs

    • B. 

      File compression programs

    • C. 

      Anti-virus programs

    • D. 

      Web conferencing programs

    Correct Answer
    B. File compression programs
    Explanation
    File compression programs reduce the amount of disk space a file requires by using various algorithms to compress the file's data. These programs remove redundant or unnecessary information from the file, resulting in a smaller file size. This allows for more efficient storage and transmission of files, as well as saving disk space on the computer or storage device.

    Rate this question:

  • 48. 

    You would choose Power Point if you wanted to do what--_____?

    • A. 

      Use as a text editor

    • B. 

      Prepare a budget

    • C. 

      Present information in a slide show

    • D. 

      Create a query

    Correct Answer
    C. Present information in a slide show
    Explanation
    PowerPoint is a software program specifically designed for creating and presenting slide shows. It offers a variety of tools and features that allow users to create visually appealing presentations with text, images, charts, and multimedia elements. Therefore, if someone wants to present information in a slide show format, PowerPoint would be the most suitable choice.

    Rate this question:

  • 49. 

    Keeping track of files and directories is a job performed by ____?

    • A. 

      Driver

    • B. 

      Operating System

    • C. 

      Emulation Card

    • D. 

      Application Software

    Correct Answer
    B. Operating System
    Explanation
    The correct answer is Operating System because it is responsible for managing and organizing files and directories on a computer system. It provides the necessary functions and utilities to create, delete, move, and access files and directories. The operating system also ensures that multiple users can access and modify files simultaneously without conflicts. Additionally, it handles file permissions and security to protect sensitive data. Overall, the operating system plays a crucial role in keeping track of files and directories on a computer.

    Rate this question:

  • 50. 

    Which of the following is a peripheral device?

    • A. 

      Motherboard

    • B. 

      Microprocessor

    • C. 

      Random Access Memory

    • D. 

      Printer

    Correct Answer
    D. Printer
    Explanation
    A peripheral device is an external device that connects to a computer and provides additional functionality. The motherboard, microprocessor, and random access memory are all internal components of a computer and are not considered peripheral devices. However, a printer is an external device that connects to a computer and is used to produce physical copies of documents or images. Therefore, the printer is the correct answer as it fits the definition of a peripheral device.

    Rate this question:

Back to Top Back to top