El Rancho - Windows 8.1 Intro To Computers Final Exam

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Karen Noriega
K
Karen Noriega
Community Contributor
Quizzes Created: 13 | Total Attempts: 2,726
| Attempts: 432 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. Files saved within cloud storage may be accessed from any computer connected to the internet.

Explanation

Files saved within cloud storage can be accessed from any computer connected to the internet because cloud storage allows users to store their files on remote servers, which can be accessed through an internet connection. This means that users can access their files from any device with an internet connection, providing convenience and flexibility. Additionally, cloud storage often offers synchronization features, ensuring that any changes made to the files are updated across all devices. Hence, the statement is true.

Submit
Please wait...
About This Quiz
Final Exam Quizzes & Trivia

This is the Final exam for the class Introduction to Computers

2. The Home Page is the first page you see when you start the Internet

Explanation

The home page is indeed the first page that appears when you start the internet. It is the default page that opens up in your web browser and serves as a starting point for navigating the internet. It usually displays a search bar, commonly used websites, news, or other personalized content.

Submit
3. Microsoft SkyDrive is a cloud storage service.

Explanation

Microsoft SkyDrive is indeed a cloud storage service. It allows users to store and access their files, documents, photos, and other data from any device with an internet connection. Users can also share files and collaborate with others using SkyDrive.

Submit
4. Saving files within a public library results in these files being visible to other users of the same PC.

Explanation

When files are saved within a public library, they are stored in a location that is accessible to other users of the same PC. This means that anyone using the computer can see and access these files. Therefore, the statement "Saving files within a public library results in these files being visible to other users of the same PC" is true.

Submit
5. Backing up a file is another way of saying that it has been saved to a second location.

Explanation

Backing up a file means creating a copy of it and storing it in a different location. This is done to ensure that the file is protected in case the original location becomes inaccessible or the file gets accidentally deleted. By saving a file to a second location, it reduces the risk of losing important data and provides a way to recover the file if needed. Therefore, the statement "Backing up a file is another way of saying that it has been saved to a second location" is true.

Submit
6. The 2 things you have to remember when you save a file is
1) where you put and
2) what you call it

Explanation

This statement is true because when saving a file, it is important to remember the location where you save it and the name you give to the file. The location determines where the file will be stored on your computer or device, making it easier for you to find and access it later. The name you give to the file should be relevant and descriptive, allowing you to quickly identify its contents. By remembering these two things, you can easily organize and manage your saved files.

Submit
7. Files may be saved on each of the following except ______

Explanation

A keyboard drive is not a valid storage device for saving files. A keyboard is an input device used for typing, and it does not have the capability to store files. On the other hand, an internal drive refers to the hard drive or solid-state drive installed within a computer, which can be used to save files. A USB flash drive and an external drive are both external storage devices that can be connected to a computer and used for saving files.

Submit
8. A URL (web address) always includes a domain name.

Explanation

A URL (Uniform Resource Locator) is a web address that is used to locate and access resources on the internet. It consists of various components, including a domain name. The domain name is a unique identifier that represents a specific website or web page. It is an essential part of a URL and is always included in it. Therefore, the statement that a URL always includes a domain name is true.

Submit
9. Folders can have subfolders within them.

Explanation

Folders can indeed have subfolders within them. Subfolders are folders that are contained within a parent folder. This allows for a hierarchical organization of files and folders, making it easier to manage and navigate through a large amount of data. Subfolders can be created within folders to further categorize and organize files based on specific criteria or themes. This feature is commonly found in computer operating systems and file management systems.

Submit
10. A drive transfers information?

Explanation

A drive transfers information by reading and writing data to and from storage devices such as hard drives, solid-state drives, or optical drives. This process involves retrieving data from the storage medium and sending it to the computer's memory or vice versa. Drives can be internal or external and are essential for storing and accessing data on a computer system. Therefore, the statement "A drive transfers information" is true.

Submit
11. A shoe box, flash drive,  Ziploc bag and the hard drive are examples of a storage device.

Explanation

The given statement is true because a shoe box, flash drive, Ziploc bag, and hard drive are all examples of storage devices. A shoe box can store items, a flash drive can store digital data, a Ziploc bag can store various objects, and a hard drive can store large amounts of digital data. Therefore, all of these items can be considered as storage devices.

Submit
12. Windows updates must be performed manually.

Explanation

Windows updates do not have to be performed manually. Windows operating system is designed to automatically download and install updates to ensure that the system is up to date with the latest security patches, bug fixes, and improvements. This automated process helps to keep the system secure and running smoothly without requiring manual intervention from the user. Therefore, the correct answer is False.

Submit
13.  You can deselect a file after it's been selected for moving or copying.

Explanation

This statement is true because in most operating systems, including Windows and macOS, you have the ability to deselect a file after it has been selected for moving or copying. This means that if you accidentally selected a file or changed your mind about moving or copying it, you can simply click on it again to deselect it. This feature allows for greater flexibility and control when managing files.

Submit
14. If you receive an attachment from someone you don't know, you should never open it.

Explanation

Opening attachments from unknown senders can pose serious security risks. It is common for cybercriminals to use email attachments as a method to spread malware or viruses. By opening an attachment from an unknown sender, you may inadvertently install malicious software on your device, which can compromise your personal information, damage your system, or allow unauthorized access to your device. It is always best to exercise caution and avoid opening attachments from unfamiliar sources to protect your digital security.

Submit
15. The microprocessor is the brains of the computer.

Explanation

The microprocessor is indeed the central processing unit (CPU) of a computer, which serves as the brain of the system. It is responsible for executing instructions, performing calculations, and coordinating the activities of all other hardware components. Without a microprocessor, a computer would not be able to function as it is the key component that carries out all the necessary computations and operations. Therefore, the statement "The microprocessor is the brains of the computer" is true.

Submit
16. If you can hold it in your hand, then the computer system component is hardware.

Explanation

The given statement suggests that if a computer system component can be physically held in one's hand, then it is considered hardware. This is because hardware refers to the physical components of a computer system, such as the keyboard, mouse, or monitor, that can be touched and manipulated. Therefore, the correct answer is true.

Submit
17. When using System Restore, the user may choose from a number of available Restore Points. 

Explanation

When using System Restore, the user is indeed able to choose from a number of available Restore Points. This feature allows the user to select a specific point in time to restore their computer's settings and system files to, effectively undoing any recent changes or issues that may have occurred. By having multiple Restore Points to choose from, the user has the flexibility to select the most appropriate one based on their needs and the state of their computer at different points in time.

Submit
18. Once you name a folder, you cannot change it.

Explanation

You can change the name of a folder after it has been named.

Submit
19. The best way to shut down Windows is to hold down the power button for three seconds.

Explanation

Holding down the power button for three seconds is not the best way to shut down Windows. This method is considered a forceful shutdown and can potentially lead to data loss or system errors. The recommended way to shut down Windows is to use the start menu or the power options in the settings to initiate a proper shutdown process.

Submit
20. Saving a new document requires _____.

Explanation

not-available-via-ai

Submit
21. An example of screen resolution is 1360 x 768.

Explanation

Screen resolution refers to the number of pixels displayed on a screen. In this case, the screen resolution is given as 1360 x 768, which means there are 1360 pixels horizontally and 768 pixels vertically on the screen. This is a valid example of a screen resolution, so the answer is true.

Submit
22. Libraries do not contain their own folders, but instead point to existing folders housed elsewhere.

Explanation

Libraries in computer systems are virtual folders that do not physically contain files and folders. Instead, they act as pointers or shortcuts to existing folders located elsewhere on the system. When files are added or removed from a library, they are actually being added or removed from the original folder, and the library simply reflects those changes. Therefore, the statement that libraries do not contain their own folders and instead point to existing folders housed elsewhere is true.

Submit
23. The amount of RAM in the computer can affect the speed of multitasking.

Explanation

The amount of RAM in a computer directly impacts its multitasking speed. RAM (Random Access Memory) is a crucial component that allows the computer to store and access data quickly. When multitasking, the computer needs to allocate memory for multiple tasks simultaneously. If the RAM is limited, the computer may struggle to handle multiple tasks efficiently, resulting in slower performance. Therefore, having more RAM can enhance multitasking speed by providing sufficient memory for smooth task switching and data processing.

Submit
24. Internet Explorer allows you to set more than one homepage to appear when you start the program.

Explanation

Internet Explorer does allow users to set multiple homepages to appear when the program is started. This feature allows users to customize their browsing experience by having multiple websites open simultaneously, making it convenient to access frequently visited sites. By setting multiple homepages, users can save time and quickly access their preferred websites upon launching Internet Explorer.

Submit
25. Which finger do you use on a right click?

Explanation

The middle finger is used for a right click. This is because the right-click button on a mouse is typically located on the right side, making it easier to access with the middle finger while the index finger is used for the left-click button. Additionally, using the middle finger for a right click allows for a comfortable and natural hand position while using the mouse.

Submit
26. A byte is essentially a single character of data

Explanation

A byte is a unit of digital information that typically consists of 8 bits. Each byte represents a single character of data in computer systems. Therefore, the statement "A byte is essentially a single character of data" is true.

Submit
27. Where can you store files?

Explanation

All of the options listed - USB flash drive, CD, and hard drive - are valid storage options for files. A USB flash drive is a portable storage device that can be easily plugged into a computer's USB port. A CD is an optical storage medium that can be used to store files. A hard drive is a permanent storage device that is installed inside a computer or an external enclosure. Therefore, all of these options can be used to store files.

Submit
28. Which terms apply to using the mouse?

Explanation

The terms "click," "double-click," "drag," "right-click," and "point" all apply to using the mouse. "Click" refers to pressing and releasing the left mouse button once, "double-click" refers to quickly pressing and releasing the left mouse button twice in succession, "drag" refers to holding down the left mouse button while moving the mouse, "right-click" refers to pressing and releasing the right mouse button, and "point" refers to moving the mouse cursor to a specific location on the screen.

Submit
29. What does the Close button do?

Explanation

The Close button is used to exit the program being run. When the user clicks on the Close button, it terminates the program and closes the window. This action is different from minimizing the window or hiding it, as it completely ends the program's execution.

Submit
30. A gigabyte (GB) is larger than a megabyte (MB).

Explanation

A gigabyte (GB) is indeed larger than a megabyte (MB). In terms of data storage, a gigabyte is equal to 1,024 megabytes. Therefore, it contains a greater amount of data compared to a megabyte.

Submit
31. Which of the following can be categorized as spam?

Explanation

All of the options listed, including jokes, chain letters, and bogus virus warnings, can be categorized as spam. Spam refers to unsolicited or unwanted messages, often sent in bulk, that are typically promotional or deceptive in nature. Jokes, chain letters, and bogus virus warnings are commonly used tactics by spammers to deceive or manipulate recipients. Therefore, all of the options mentioned can be classified as spam.

Submit
32. You can switch between program windows using the keyboard.

Explanation

The statement implies that it is possible to switch between program windows using the keyboard. This means that instead of using the mouse to click on different windows, the keyboard can be used to navigate and switch between open programs. This is a common feature in operating systems and can be achieved by using specific keyboard shortcuts or combinations of keys. Therefore, the answer "True" indicates that it is indeed possible to switch between program windows using the keyboard.

Submit
33. The process of copying a file from the Internet to your own computer is called _____.

Explanation

The process of copying a file from the Internet to your own computer is called downloading. This involves retrieving data or files from a remote server and saving them onto your local device. Uploading refers to the opposite process, where you transfer files from your computer to a remote server. Synching refers to the process of synchronizing data between different devices. Phishing, on the other hand, is a malicious activity where individuals attempt to deceive others into revealing sensitive information.

Submit
34. Each of the following is an option for sharing files on the share tab of file explorer except______.

Explanation

The share tab in file explorer provides options for sharing files, such as zipping them, burning them to a disk, and faxing them. However, the option to duplicate files is not available on the share tab. This means that users cannot create a duplicate copy of a file directly from the share tab.

Submit
35. Favorite locations appear within which portion of the file explorer window

Explanation

The favorite locations appear within the Navigation Pane of the file explorer window. The Navigation Pane is typically located on the left side of the window and provides quick access to frequently used folders and locations. This allows users to easily navigate to their favorite locations without having to search for them in the file explorer.

Submit
36. Which of the following is the strongest password?

Explanation

The password "MyP@55Word" is the strongest among the given options because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This combination makes it more difficult for hackers to guess or crack the password, increasing its strength and security.

Submit
37. What does the Maximize button do?

Explanation

The Maximize button is used to make the window fill the entire screen. This means that the window will expand to occupy the full size of the screen, allowing the user to view and work with the content in a larger space. This is particularly useful when the user wants to focus on a specific application or task and needs more screen real estate to do so effectively.

Submit
38. Hard drive capacity is typically measured in gigabytes and terabytes.

Explanation

Hard drive capacity is indeed typically measured in gigabytes and terabytes. These units represent the amount of data that can be stored on a hard drive. Gigabytes (GB) and terabytes (TB) are used because they provide a large enough scale to measure the vast storage capacities of modern hard drives.

Submit
39. Folders are tools for organizing ______.

Explanation

Folders are tools for organizing files. They provide a way to group and categorize related files, making it easier to locate and access them. By organizing files into folders, users can maintain a structured and systematic arrangement of their digital content, improving efficiency and productivity. Tool-bars and menus, on the other hand, are user interface elements that provide access to various functions and features within software applications, but they are not specifically designed for organizing files. Therefore, the correct answer is files.

Submit
40. Windows manages _____.

Explanation

Windows manages all of the above. Windows operating system is responsible for managing files, organizing them in a hierarchical structure, and providing access to them. It also manages RAM, allocating memory to different programs and processes, ensuring efficient utilization. Additionally, Windows manages programs, allowing users to install, run, and terminate applications, providing a user-friendly interface for interaction. Therefore, the correct answer is "All of the above."

Submit
41. What happens to a deleted file from the computer?

Explanation

When a file is deleted from a computer, it is not permanently deleted right away. Instead, it is moved to the Recycle Bin. The Recycle Bin acts as a temporary storage location for deleted files. The file remains in the Recycle Bin until the user manually selects the option to permanently delete it. Until that command is given, the file can still be restored and accessed from the Recycle Bin.

Submit
42. What is the purpose of a phishing scam?

Explanation

The purpose of a phishing scam is to trick users into revealing personal information. Phishing scams typically involve sending fraudulent emails or creating fake websites that appear legitimate, in order to deceive individuals into providing sensitive data such as passwords, credit card numbers, or social security numbers. The scammers then use this information for various malicious purposes, such as identity theft, financial fraud, or unauthorized access to accounts. By posing as trustworthy entities, phishing scammers exploit human vulnerability and trust to deceive unsuspecting victims into divulging their personal information.

Submit
43. The parts of the computer you can touch are called _____,
and the programs are called ______.

Explanation

The parts of the computer that can be physically touched are referred to as hardware, while the programs and applications that run on the computer are known as software.

Submit
44. What is Malware?

Explanation

Malware refers to malicious software that is designed to harm or exploit a computer system. It can include various types of harmful programs such as viruses, worms, Trojans, ransomware, and spyware. Unlike the other options that focus on protecting or updating the computer system, malware is specifically designed to cause damage or unauthorized access to a computer, compromising its security and functionality.

Submit
45. Rachel is concerned because her Automatic Updates are scheduled for 3:00 am but her computer is never turned on at this time. Is this a problem?

Explanation

The correct answer is No; Automatic Updates will run the next time her computer is on. This is because the computer will automatically run the updates the next time it is turned on, even if it is not turned on at the scheduled time of 3:00 am. Therefore, Rachel does not need to manually install the updates or change the scheduled time.

Submit
46. The physical part of the computer is called _____, and the logical part is called ______.

Explanation

The physical part of the computer refers to the tangible components such as the monitor, keyboard, and motherboard, which are collectively known as hardware. On the other hand, the logical part of the computer refers to the intangible programs, data, and instructions that enable the computer to perform tasks, known as software.

Submit
47. Which unit in the list below is the largest unit of measure?

Explanation

The correct answer is Terabyte. A Terabyte is the largest unit of measure in the given list. It is equal to 1,000 Gigabytes or 1,000,000 Megabytes. Kilobyte is the smallest unit of measure, followed by Megabyte, Gigabyte, and then Terabyte.

Submit
48. Kilobyte, megabyte, and gigabyte refer to _____________, respectively.

Explanation

Kilobyte refers to a thousand bytes, megabyte refers to a million bytes, and gigabyte refers to a billion bytes.

Submit
49. What is Phishing?

Explanation

Phishing refers to a scam where individuals or organizations use deceptive tactics, such as fake emails or websites, to trick people into revealing their confidential information, such as passwords, credit card numbers, or social security numbers. The purpose of phishing is to obtain this sensitive information for malicious purposes, such as identity theft or financial fraud. It is important to be cautious and vigilant while browsing the internet to avoid falling victim to phishing attacks.

Submit
50. What is the most harmful result of falling victim to a phishing scam?

Explanation

The most harmful result of falling victim to a phishing scam is becoming a victim of identity theft. Phishing scams are designed to trick individuals into revealing their personal and sensitive information, such as passwords, credit card numbers, or social security numbers. This information can then be used by cybercriminals to steal the victim's identity and commit various fraudulent activities, such as opening accounts in their name, making unauthorized purchases, or even accessing their financial accounts. Identity theft can have severe consequences, including financial loss, damage to credit scores, and the need to spend significant time and effort to restore one's identity and reputation.

Submit
51. Folders are tools for organizing ______.

Explanation

Folders are tools for organizing files. Folders provide a way to group and categorize related files, making it easier to locate and manage them. By organizing files into folders, users can create a hierarchical structure that reflects the organization of their data, making it more efficient to navigate and find specific files when needed. Folders can be created and named according to the user's preferences and can be nested within each other to further organize and classify files. Therefore, the correct answer is "Files".

Submit
52. What is Windows?

Explanation

Windows is an operating system. It is a software program that manages computer hardware and software resources, provides common services for computer programs, and allows users to interact with the computer. Windows is one of the most widely used operating systems in the world, developed by Microsoft. It provides a graphical user interface (GUI), multitasking capabilities, file management, and various other features that enable users to perform tasks on their computers efficiently.

Submit
53. What happens when you delete a file or folder from a USB flash drive?

Explanation

When you delete a file or folder from a USB flash drive, it is permanently deleted. Unlike deleting from a computer's hard drive, there is no Recycle Bin or Recoverable Files folder on a USB flash drive. Once you delete a file or folder from a USB flash drive, it is immediately removed and cannot be recovered unless you have a backup copy.

Submit
54. The process of sending a file from your local computer to the Internet is called uploading.

Explanation

The process of sending a file from your local computer to the Internet is commonly referred to as uploading. This involves transferring the file data from the local storage to a remote server or website, making it accessible to others over the Internet. Therefore, the statement is true.

Submit
55. You can run a computer without application software but not without operating system software

Explanation

The statement is true because the operating system is a fundamental software that manages all the hardware and software resources of a computer. It acts as an intermediary between the user and the computer hardware, allowing the user to interact with the computer and run various applications. Without an operating system, the computer would not be able to function properly and execute any tasks. However, it is possible to have a computer without specific application software installed, as applications are additional programs that serve specific purposes and are not essential for the basic operation of the computer.

Submit
56. Folder windows have Forward and Back buttons.

Explanation

Folder windows typically have Forward and Back buttons to allow users to navigate through their file directories. These buttons enable users to easily move forward or backward within the folder hierarchy, making it convenient to access different folders or files without having to manually navigate through each level. The presence of these buttons enhances the user experience and provides a quick and efficient way to navigate within folder windows.

Submit
57. What percentage of hard drives eventually fails?

Explanation

Hard drives are mechanical devices that have a limited lifespan. Over time, the components of a hard drive can wear out or fail, leading to data loss or complete failure of the drive. Therefore, it is inevitable that all hard drives will eventually fail, making the correct answer 100 percent.

Submit
58. What does the Minimize button do?

Explanation

The Minimize button is used to remove the window from the screen while still keeping the program running. This allows the user to switch to other windows or tasks without closing the program completely.

Submit
59.      What are the two types of software?

Explanation

The correct answer is Operating system, application programs. Operating system is a type of software that manages computer hardware and software resources and provides common services for computer programs. Application programs are software programs designed to perform specific tasks or functions for the user. Both operating systems and application programs are essential types of software that work together to enable the functioning of a computer system.

Submit
60. What is a virus?

Explanation

A virus is a type of software that attaches itself to another file and is activated when the file is opened. Once activated, the virus can cause damage to the computer system or the files stored on it. This type of software is designed to replicate and spread to other files, often without the knowledge or consent of the user. The purpose of a virus is to disrupt the normal functioning of a computer system and potentially steal or destroy data.

Submit
61. Which of the following may result in a malware infection?

Explanation

All of the mentioned actions can potentially result in a malware infection. Opening an email attachment can introduce malware if the attachment is infected. Downloading a file from a website can lead to malware infection if the file itself is malicious. Clicking on an infected link can redirect the user to a website that hosts malware. Therefore, all three actions carry a risk of malware infection.

Submit
62. The names of the window quick sizing buttons are _____.

Explanation

The correct answer is "Close, Maximize, Restore, Minimize". These are the names of the window quick sizing buttons commonly found in the title bar of a window. The "Close" button is used to close the window, the "Maximize" button is used to enlarge the window to full screen, the "Restore" button is used to restore the window to its previous size after being maximized, and the "Minimize" button is used to minimize the window and send it to the taskbar.

Submit
63. What is the basic function of the Title bar?

Explanation

The basic function of the Title bar is to display the document title. It provides information about the currently open document, allowing the user to easily identify and distinguish between multiple documents or windows. The Title bar typically appears at the top of the window and is an essential component of the user interface.

Submit
64. Word, Excel, and Internet Explorer are examples of ______.

Explanation

Word, Excel, and Internet Explorer are examples of application software. Application software refers to programs or software applications that are designed to perform specific tasks or functions for users. In this case, Word and Excel are applications used for creating and editing documents and spreadsheets, while Internet Explorer is a web browser application used for accessing the internet. Therefore, these examples fall under the category of application software.

Submit
65. The _____ type of malware collects personal information and sends it to a third party.

Explanation

Spyware is a type of malware that secretly collects personal information from a user's computer or device without their knowledge or consent and sends it to a third party. This information can include sensitive data such as passwords, credit card details, browsing habits, and more. Spyware is designed to operate stealthily in the background, making it difficult for users to detect its presence. Once the personal information is collected, it is often used for malicious purposes such as identity theft, fraud, or targeted advertising.

Submit
66. The extension on a file name, ex .docx, .xlsx, .mp3, .ppt, indicates the _____.

Explanation

The extension on a file name, such as .docx, .xlsx, .mp3, .ppt, indicates the program used to create the file. Each file extension is associated with a specific file format and is recognized by the operating system or software as being compatible with a particular program. For example, a .docx file extension is typically associated with Microsoft Word, indicating that the file was created using this program. Similarly, a .xlsx extension indicates that the file was created using Microsoft Excel. The file extension helps the operating system or software identify the appropriate program to open and handle the file.

Submit
67. What is a patch?

Explanation

A patch is a solution or update that is applied to a software program to fix a specific bug or software problem. It is a way to address issues or improve the functionality of the software. It is not a software virus, a security criteria, or a cover up for a hardware device.

Submit
68. What is the smallest unit of information on a computer?

Explanation

A bit is the smallest unit of information on a computer. It represents a binary value, either 0 or 1. It is the fundamental building block of all digital data and is used to store and transmit information in computers. A byte, character, and word are all larger units of information that are composed of multiple bits. Therefore, the correct answer is bit.

Submit
69. Backspace deletes characters to the right of the insertion point and deletes characters to the left.

Explanation

Backspace is a keyboard key that is used to delete characters to the left of the insertion point, not to the right. It allows users to correct mistakes by removing characters that were previously typed. Therefore, the statement that backspace deletes characters to the right of the insertion point is incorrect.

Submit
70. The _____ type of malware is code attached to another file. The malicious code automatically makes copies of itself and drops its payload when the host file is opened.

Explanation

A virus is a type of malware that attaches itself to another file and can replicate itself. When the host file is opened, the virus activates and drops its payload, which can be any malicious action or code. Unlike worms, viruses require a host file to spread and cannot replicate independently. Keystroke loggers and toolbars are different types of malware that do not necessarily rely on attaching themselves to other files.

Submit
71. What damage can be caused by malware?

Explanation

Malware can cause various damages, including computer crashes, compromising personal information, and permanent deletion. Computer crashes can occur when malware interferes with the system's normal functioning, leading to instability and crashes. Malware can also compromise personal information, such as passwords, credit card details, and social security numbers, which can then be used for identity theft. Additionally, some malware is designed to permanently delete or corrupt files, rendering them irretrievable. Therefore, all of the mentioned damages can be caused by malware.

Submit
72. Most Windows file names have a period at the end followed by a(n) ______ of letters..

Explanation

Most Windows file names have a period at the end followed by a(n) extension of letters. This is because the file extension is used to identify the file type and determine which program should be used to open it. The file extension is typically three or four letters long and is separated from the file name by a period.

Submit
73. A USB flash drive gets the same drive letter on any computer you plug it into.

Explanation

A USB flash drive does not always get the same drive letter on any computer it is plugged into. The drive letter assigned to a USB flash drive can vary depending on the computer's configuration and the order in which other storage devices are connected. Therefore, the statement is false.

Submit
74. Tabbed browsing is a feature that allows you to _____.

Explanation

Tabbed browsing is a feature that allows you to open multiple web pages in the same browser window. This means that instead of opening each webpage in a separate window, tabbed browsing allows you to have multiple web pages open within a single window, making it easier to switch between them and organize your browsing experience.

Submit
75. The title bar of a program window normally displays _____.

Explanation

The title bar of a program window normally displays all of the above options. It includes quick sizing buttons, which allow users to minimize, maximize, or close the window. It also displays the program name, which helps users identify the application they are using. Additionally, in some cases, the title bar may display the filename of the document or file currently open in the program window. Therefore, all of these options can be seen in the title bar of a program window.

Submit
76. What is the basic function of the Quick Sizing Buttons?

Explanation

The basic function of the Quick Sizing Buttons is to allow you to change the window size and location. These buttons provide a convenient way to resize and reposition the window according to your preferences. By clicking on these buttons, you can easily adjust the size and position of the window without having to manually resize or move it. This feature enhances user experience by providing a quick and effortless way to customize the window layout.

Submit
77. A microprocessor's speed is usually measured in _____.

Explanation

A microprocessor's speed is typically measured in billions of cycles per second (GHz). This is because modern microprocessors operate at very high frequencies, with each cycle representing a single operation or instruction that the processor can perform. By measuring the speed in GHz, it provides an indication of how many cycles the processor can execute within a second, giving an idea of its processing power and performance.

Submit
78. The most important single component in a computer system is its _____.

Explanation

The processor is the most important single component in a computer system because it is responsible for executing instructions and performing calculations. It acts as the brain of the computer, controlling all the operations and ensuring that tasks are completed efficiently and accurately. Without a powerful and efficient processor, the computer system would not be able to perform tasks or run programs effectively.

Submit
79. What does the Restore Down button do?

Explanation

The Restore Down button is used to minimize a window that is currently maximized or in full-screen mode. It reduces the window size to a smaller, resizable form, allowing it to occupy only a portion of the screen while still remaining open and active. This button is commonly found in the top-right corner of a window, next to the close button.

Submit
80. Which set of commands moves files and folders?

Explanation

Cut, then Paste is the correct answer because when you cut a file or folder, it is removed from its original location and stored in the clipboard. Then, when you paste it, the file or folder is placed in the desired location. This allows for the movement of files and folders from one location to another. Copy, then Paste would create a duplicate of the file or folder instead of moving it. Select, then Paste or Select, then Cut are not valid commands for moving files and folders.

Submit
81. Which of the following is not effective in preventing malware infections?

Explanation

not-available-via-ai

Submit
82. What is RAM?

Explanation

RAM stands for Random Access Memory and it is a type of temporary memory used by computers. It allows the computer to quickly access and store data that is actively being used. When the computer powers down, the data stored in RAM is lost, as it is volatile memory. Therefore, all of the given statements are correct explanations of RAM.

Submit
83.    Random access memory (RAM) serves as the computer's _____.

Explanation

RAM serves as the computer's workbench. It is a type of computer memory that allows data to be read from and written to by the computer's processor. It is used to store and temporarily hold data that the processor needs to access quickly. Like a workbench, RAM provides a space for the processor to work with data efficiently and effectively.

Submit
84. You can change the position and shape of a maximized program window.

Explanation

The statement is false because a maximized program window cannot be changed in terms of position and shape. When a window is maximized, it occupies the entire screen and cannot be resized or moved around. The maximize button on a program window is designed to make it fill the screen, but it does not allow for any further adjustments to the window's position or shape.

Submit
85. How often is it recommended that you back up files on your flash drive?

Explanation

It is recommended to back up files on your flash drive weekly in order to ensure the safety and security of your data. This frequency strikes a balance between regularly protecting your files and not overwhelming yourself with constant backups. Weekly backups allow you to recover recent changes and minimize the risk of losing important data in case of any unforeseen events or technical issues.

Submit
86. Resolution  measures the number  of bytes

Explanation

Resolution does not measure the number of bytes. Resolution refers to the number of pixels in an image, which determines the clarity and quality of the image. It is typically measured in terms of width and height, such as 1920x1080 pixels for Full HD resolution. The number of bytes, on the other hand, refers to the amount of data storage required for an image file, which is determined by factors such as color depth and file format.

Submit
87.       Which of the following is not a role of an operating system?

Explanation

The role of preventing computer virus infections is not typically considered a role of an operating system. While an operating system may have some built-in security features to help protect against viruses, its primary function is to control hardware and run application programs. Preventing computer virus infections is usually the responsibility of antivirus software, which is separate from the operating system.

Submit
88. Save As updates your file

Explanation

The statement "Save As updates your file" is incorrect. When you use the "Save As" function, it creates a new copy of the file with a different name or format, while keeping the original file unchanged. It does not update or modify the original file in any way. Therefore, the correct answer is False.

Submit
89. What happens if you try to run more programs than your computer's RAM can support?

Explanation

If you try to run more programs than your computer's RAM can support, the computer will run more slowly. This is because the RAM is responsible for storing and accessing data that is currently being used by programs. When there is not enough RAM available, the computer will have to use the hard drive as virtual memory, which is much slower. As a result, the computer's performance will be significantly affected and it may take longer for programs to load and respond.

Submit
90. What is the basic function of the Ribbon?

Explanation

The Ribbon is a small, customizable toolbar that contains a set of commands. It offers formatting and other change options to users. This means that users can use the Ribbon to modify the appearance and layout of their documents, as well as make other changes such as adding or removing elements. The Ribbon provides a convenient and accessible way for users to access a wide range of formatting and customization options in their documents.

Submit
91. What is an update?

Explanation

An update refers to the latest version of software that is released specifically to address and fix a bug or software problem. It is a release that provides improvements and fixes to enhance the functionality and performance of the software. Updates are essential for ensuring that the software operates smoothly and efficiently by resolving any issues or glitches that may have been identified in previous versions.

Submit
92. RAM and storage drive memory perform essentially the same function.

Explanation

RAM and storage drive memory do not perform the same function. RAM (Random Access Memory) is a type of computer memory that is used to store data that is actively being used by the computer's processor. It provides fast and temporary storage for data that the processor needs to access quickly. On the other hand, storage drive memory, such as a hard drive or solid-state drive, is used for long-term storage of data. It stores files, programs, and other data even when the computer is turned off. Therefore, while both types of memory are important for a computer, they serve different purposes.

Submit
93. The address bar on a computer or folder window displays the _____.

Explanation

The address bar on a computer or folder window displays the currently viewed location. This means that it shows the path or directory of the file or folder that is currently being accessed or viewed. It helps users to easily identify the exact location of the file or folder within the computer's file system. It is different from the address bar in a web browser, which displays the address or URL of the web page being viewed.

Submit
94. Windows 8.1 is an example of an application software.

Explanation

Windows 8.1 is not an example of an application software, but rather an operating system. Application software refers to programs that are designed to perform specific tasks or functions for the user, such as word processors, web browsers, or media players. Windows 8.1, on the other hand, is an operating system developed by Microsoft that provides the platform for running application software and managing computer hardware.

Submit
95. Which of the following statements is false?

Explanation

The statement "Copying pictures requires different commands from copying text" is false. In most cases, the process of copying pictures is the same as copying text. Users can typically use the same commands or methods to copy and paste both pictures and text.

Submit
96. What is the basic function of the Quick Access Toolbar?

Explanation

The Quick Access Toolbar is a small, customizable toolbar that contains a set of commands. It allows users to easily access frequently used commands in a document or program. By customizing the toolbar, users can add or remove commands according to their preferences, making it a convenient and efficient tool for accessing commonly used functions.

Submit
97. Match the following
Submit
98. Match the following
Submit
99. Match the following
Submit
100. Match the following
Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 23, 2010
    Quiz Created by
    Karen Noriega
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Files saved within cloud storage may be accessed from any computer...
The Home Page is the first page you see when you start the Internet
Microsoft SkyDrive is a cloud storage service.
Saving files within a public library results in these files being...
Backing up a file is another way of saying that it has been saved to a...
The 2 things you have to remember when you save a file is 1) where you...
Files may be saved on each of the following except ______
A URL (web address) always includes a domain name.
Folders can have subfolders within them.
A drive transfers information?
A shoe box, flash drive,  Ziploc bag and the hard drive are...
Windows updates must be performed manually.
 You can deselect a file after it's been selected for moving...
If you receive an attachment from someone you don't know, you...
The microprocessor is the brains of the computer.
If you can hold it in your hand, ...
When using System Restore, the user may choose from a number of...
Once you name a folder, you cannot change it.
The best way to shut down Windows is to hold down the power button for...
Saving a new document requires _____.
An example of screen resolution is 1360 x 768.
Libraries do not contain their own folders, but instead point to...
The amount of RAM in the computer can affect the speed of...
Internet Explorer allows you to set more than one homepage to appear...
Which finger do you use on a right click?
A byte is essentially a single character of data
Where can you store files?
Which terms apply to using the mouse?
What does the Close button do?
A gigabyte (GB) is larger than a megabyte (MB).
Which of the following can be categorized as spam?
You can switch between program windows using the keyboard.
The process of copying a file from the Internet to your own computer...
Each of the following is an option for sharing files on the share tab...
Favorite locations appear within which portion of the file explorer...
Which of the following is the strongest password?
What does the Maximize button do?
Hard drive capacity is typically measured in gigabytes and terabytes.
Folders are tools for organizing ______.
Windows manages _____.
What happens to a deleted file from the computer?
What is the purpose of a phishing scam?
The parts of the computer you can touch are called _____, and the...
What is Malware?
Rachel is concerned because her Automatic Updates are scheduled for...
The physical part of the computer is called _____, and the logical...
Which unit in the list below is the largest unit of measure?
Kilobyte, megabyte, and gigabyte refer to _____________, respectively.
What is Phishing?
What is the most harmful result of falling victim to a phishing scam?
Folders are tools for organizing ______.
What is Windows?
What happens when you delete a file or folder from a USB flash drive?
The process of sending a file from your local computer to the Internet...
You can run a computer without application software but not without...
Folder windows have Forward and Back buttons.
What percentage of hard drives eventually fails?
What does the Minimize button do?
     What are the two types of software?
What is a virus?
Which of the following may result in a malware infection?
The names of the window quick sizing buttons are _____.
What is the basic function of the Title bar?
Word, Excel, and Internet Explorer are examples of ______.
The _____ type of malware collects personal information and sends it...
The extension on a file name, ex .docx, .xlsx, .mp3, .ppt, indicates...
What is a patch?
What is the smallest unit of information on a computer?
Backspace deletes characters to the right of the insertion point and...
The _____ type of malware is code attached to another file. The...
What damage can be caused by malware?
Most Windows file names have a period at the end followed by a(n)...
A USB flash drive gets the same drive letter on any computer you plug...
Tabbed browsing is a feature that allows you to _____.
The title bar of a program window normally displays _____.
What is the basic function of the Quick Sizing Buttons?
A microprocessor's speed is usually measured in _____.
The most important single component ...
What does the Restore Down button do?
Which set of commands moves files and folders?
Which of the following is not effective in preventing malware...
What is RAM?
   Random access memory (RAM) serves as ...
You can change the position and shape of a maximized program window.
How often is it recommended that you back up files on your flash...
Resolution  measures the number  of bytes
      Which of the following is not a role ...
Save As updates your file
What happens if you try to run more programs than your computer's...
What is the basic function of the Ribbon?
What is an update?
RAM and storage drive memory perform essentially the same function.
The address bar on a computer or folder window displays the _____.
Windows 8.1 is an example of an application software.
Which of the following statements is false?
What is the basic function of the Quick Access Toolbar?
Match the following
Match the following
Match the following
Match the following
Alert!

Advertisement