El Rancho - Windows 8.1 Intro To Computers Final Exam

100 Questions | Total Attempts: 422

SettingsSettingsSettings
Final Exam Quizzes & Trivia

This is the Final exam for the class Introduction to Computers


Questions and Answers
  • 1. 
    The parts of the computer you can touch are called _____, and the programs are called ______.
    • A. 

      Software, Hardware

    • B. 

      Memory, Mainframe

    • C. 

      Hardware, Software

    • D. 

      Desktop, Software

  • 2. 
    Kilobyte, megabyte, and gigabyte refer to _____________, respectively.
    • A. 

      Thousand bytes, billion bytes, million bytes

    • B. 

      Thousand bytes, million bytes, billion bytes

    • C. 

      Million bytes, billion bytes, thousand bytes

    • D. 

      Billion bytes, thousand

  • 3. 
    What is RAM?
    • A. 

      RAM is temporary memory

    • B. 

      When the computer powers down, RAM loses its data

    • C. 

      Random Access Memory

    • D. 

      All of the above

  • 4. 
    A microprocessor's speed is usually measured in _____.
    • A. 

      Millions of cycles per second (MHz)

    • B. 

      RAM cycles

    • C. 

      Circuitry cycles

    • D. 

      Billions of cycles per second (GHz)

  • 5. 
    Word, Excel, and Internet Explorer are examples of ______.
    • A. 

      User files

    • B. 

      Operating systems

    • C. 

      Application software

    • D. 

      Researching software

  • 6. 
    Saving a new document requires _____.
    • A. 

      Printing the document

    • B. 

      Copying the document

    • C. 

      Sending the document to an email address

    • D. 

      Naming the document

  • 7. 
    Where can you store files?
    • A. 

      USB flash drive

    • B. 

      CD

    • C. 

      Harddrive

    • D. 

      All of the above

  • 8. 
    Folders are tools for organizing ______.
    • A. 

      Tool-bars

    • B. 

      Menus

    • C. 

      Files

    • D. 

      All of the above

  • 9. 
    A gigabyte (GB) is larger than a megabyte (MB).
    • A. 

      True

    • B. 

      False

  • 10. 
    An example of screen resolution is 1360 x 768.
    • A. 

      True

    • B. 

      False

  • 11. 
    If you can hold it in your hand, then the computer system component is hardware.
    • A. 

      True

    • B. 

      False

  • 12. 
    The most important single component in a computer system is its _____.
    • A. 

      RAM

    • B. 

      Hard drive

    • C. 

      Processor

    • D. 

      Monitor

  • 13. 
          Which of the following is not a role of an operating system?
    • A. 

      Controlling hardware

    • B. 

      Preventing computer virus infections

    • C. 

      Running application programs

    • D. 

      None of the above

  • 14. 
       Random access memory (RAM) serves as the computer's _____.
    • A. 

      Brain

    • B. 

      Storage vault

    • C. 

      File system

    • D. 

      Workbench

  • 15. 
         What are the two types of software?
    • A. 

      Operating system, application programs

    • B. 

      Windows, Word

    • C. 

      Operating system, storage drives

    • D. 

      Operating system, Excel

  • 16. 
    What is a virus?
    • A. 

      Software that attaches itself to another file and when the file is opened it runs and causes damage.

    • B. 

      Software that runs independently doing damage to your computer

    • C. 

      Software that masquerades as something it isn’t in an effort to trick the user

    • D. 

      Software that sends information about you to someone else

  • 17. 
    What is Malware?
    • A. 

      Software that protects your computer from viruses

    • B. 

      Software that protects your computer from spyware and adware infections

    • C. 

      Software that updates your computers operating system

    • D. 

      Software that may harm your computer

  • 18. 
    What is Phishing?
    • A. 

      Web pages you have visited that are stored on your hard drive

    • B. 

      Text files some websites use to identify users

    • C. 

      A scam to get confidential information

    • D. 

      A form where you type confidential information

  • 19. 
    What is the purpose of a phishing scam?
    • A. 

      To install malware

    • B. 

      To trick users into revealing personal information

    • C. 

      To flood networks with spam

    • D. 

      To collect signatures for bogus petitions

  • 20. 
    What is a patch?
    • A. 

      A fix to a specific bug, or software problem

    • B. 

      A software virus

    • C. 

      A security criteria allowing only users with authorization to use program

    • D. 

      A cover up for hardware device

  • 21. 
    What is an update?
    • A. 

      The latest information

    • B. 

      The latest version of software to fix a bug or software problem

    • C. 

      Major feature additions

    • D. 

      Software that provides more features and is bigger and better

  • 22. 
    Which of the following can be categorized as spam?
    • A. 

      Jokes

    • B. 

      Chain letters

    • C. 

      Bogus virus warnings

    • D. 

      All of the above

  • 23. 
    What damage can be caused by malware?
    • A. 

      Computer crashes

    • B. 

      The compromising personal information, which may lead to identity theft

    • C. 

      Permanent deletion

    • D. 

      All of the above

  • 24. 
    Which of the following is not effective in preventing malware infections?
    • A. 

      Opening email attachments

    • B. 

      Turning on Windows Automatic Updates

    • C. 

      Installing anti-virus software

    • D. 

      Setting Internet Explorer's security setting to medium-high

  • 25. 
    Which of the following may result in a malware infection?
    • A. 

      Opening an email attachment

    • B. 

      Downloading a file from a website

    • C. 

      Clicking on an infected link

    • D. 

      All of the above

Back to Top Back to top