ICT CIS 11 / 12 - Quiz #1 - Thursday, October 8, 2009

50 Questions | Attempts: 92
Share

SettingsSettingsSettings
ICT CIS 11 / 12 - Quiz #1 - Thursday, October 8, 2009 - Quiz

This will be your 50 point quiz covering the various computer aspects presented during the class Power Point presentations.


Questions and Answers
  • 1. 
    The first operational computer network was called_________
    • A. 

      G.hn

    • B. 

      HANs

    • C. 

      ALPHANET

    • D. 

      ARPANET

  • 2. 
    The first computer network was used in _____________
    • A. 

      School

    • B. 

      Military

    • C. 

      Government

    • D. 

      University

  • 3. 
    Wireless LAN technology uses _____ as transmission signals
    • A. 

      Radio waves only

    • B. 

      Infrared signals only

    • C. 

      Radio waves and infrared signals

    • D. 

      Gravitational wave signal and radio waves

  • 4. 
    Secure Servers use _______________
    • A. 

      SLS Protocol

    • B. 

      TSS Protocol

    • C. 

      HBO Protocol

    • D. 

      SSL Protocol

  • 5. 
    A little icon is displayed on your web browser if it has been secure by a Secure Server. The icon is_______
    • A. 

      A lock

    • B. 

      A monitor

    • C. 

      A fan

    • D. 

      A Keyboard

  • 6. 
    ______ is a software package that downloads automatically and displays unwanted advertisements to the user
    • A. 

      Worms

    • B. 

      Adware

    • C. 

      Spyware

    • D. 

      Pop-Ups

  • 7. 
    ______ deals with the sale of products and service over the Internet
    • A. 

      E-Bay

    • B. 

      E-Distribution

    • C. 

      E-Commerce

    • D. 

      E-Commercial

  • 8. 
    What does LAN stand for?
    • A. 

      Large Accessible Network

    • B. 

      Local Area Network

    • C. 

      Legalized Apple Nectar

    • D. 

      Linguistic Aptitude Neo-Service

  • 9. 
    What does ‘IP Address’ stand for? What is it made of?
    • A. 

      Internet Protocol Address, made of letters and numbers.

    • B. 

      Intranet Perfunctory Address, made of numbers and decimals.

    • C. 

      Internet Protocol Address, made of numbers and decimals.

    • D. 

      Interned Pillar Address made of symbols and octahedrons.

  • 10. 
    What are the two main purposes of the IP Address?
    • A. 

      To identify the hacker and the host.

    • B. 

      To locate the host and address the location.

    • C. 

      To pinpoint the first and last.

    • D. 

      To locate the beginning and end.

  • 11. 
    What is a network?
    • A. 

      A bundle of cables to connect you to the internet

    • B. 

      A net for working

    • C. 

      Group of interconnected computers

    • D. 

      A system to keep in touch with others

  • 12. 
    Regarding the steps of how a network works, choose the correct order of steps (first to last).
    • A. 

      Hub, Cable, NIC(Computer B), NIC (Computer A)

    • B. 

      NIC(Computer A), Hub, Cable, NIC(Computer B)

    • C. 

      Protocol, NIC(Computer A), Cable, Hub, NIC(Computer B)

  • 13. 
    How can we keep our computers running smoothly?
    • A. 

      Defragmentation

    • B. 

      Registry Cleaning

    • C. 

      Deleting Cache files

    • D. 

      All of above

  • 14. 
    Defragmentation is……
    • A. 

      A software utility that attempt to remove configuration data from the Windows Registry that is no longer in use or that is unwanted on the system.

    • B. 

      The process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.

    • C. 

      Deleting files that are not necessary for the computer.

    • D. 

      Untangling all the wires on the inside of the computer case.

  • 15. 
    What is a good way to clean out excess dirt and dust from inside the computers case?
    • A. 

      Pressure Washer

    • B. 

      Use a product like Windex

    • C. 

      Spray compressed air into it

    • D. 

      Use a damp cloth

  • 16. 
    What is spyware?
    • A. 

      Secret listening device planted in your computer

    • B. 

      Is a type of malware that is installed on computers and that collects information about users without their knowledge

    • C. 

      The latest fashion trend in the spy world

    • D. 

      A type of Trojan that infiltrates your system via unsecured connections

  • 17. 
    What is a firewall?
    • A. 

      A program that attacks viruses and catches them before they do any damage.

    • B. 

      A product that protects your computer from overheating

    • C. 

      A device that guards the entrance to a private network and keeps out unauthorized or unwanted traffic

    • D. 

      Something to hide behind in case there is a fire

  • 18. 
    The 3 major operating systems are:
    • A. 

      Linux, Windows, Ubuntu

    • B. 

      Windows, Apple, Lanux

    • C. 

      Snow Leopard, DOS, Linux

    • D. 

      Windows, Apple, Linux

  • 19. 
    Apple’s operating system is cheaper and more popular than windows.
    • A. 

      True

    • B. 

      False

  • 20. 
    What is the next Windows o/s called?
    • A. 

      Windows 2010

    • B. 

      Microsoft Infinity

    • C. 

      Windows 7

    • D. 

      Windows Professional

  • 21. 
    The Apple operating system is based in which original operating system.
    • A. 

      Winux

    • B. 

      Unix

    • C. 

      Seanix

    • D. 

      Zenith

  • 22. 
    Which one of these companies manufactures graphic cards?
    • A. 

      ATI

    • B. 

      Microsoft

    • C. 

      Dell

    • D. 

      HP

  • 23. 
    Which device input goes into the pink connector on the audio card?
    • A. 

      Headphones

    • B. 

      Stereo

    • C. 

      Speaker

    • D. 

      Microphone

  • 24. 
    Almost all PC systems use SDRAM
    • A. 

      True

    • B. 

      False

  • 25. 
    _____ keyboards have the appearance of keyboard pianos and send musical notes as signals to the computer.
    • A. 

      Braille

    • B. 

      MIDI

    • C. 

      Musical

    • D. 

      Synthesizer

Related Topics

Back to Top Back to top