Intro To PC Final Exam

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jevavee
J
Jevavee
Community Contributor
Quizzes Created: 4 | Total Attempts: 6,164
| Attempts: 61
SettingsSettings
Please wait...
  • 1/68 Questions

    ________________ are rated by the maximum power (in watts) that they can provide.  It is important to keep in mind that the ________________ must produce at least enough energy to operate all the components of the system at the same time.  During the initial startup of the computer,  many components require additional power to get going.

Please wait...
About This Quiz

The 'Intro to PC Final Exam' assesses knowledge on PC hardware components, focusing on Intel chipsets, power supplies, static electricity effects, and memory types. It evaluates understanding of dual-core technology, major heat sources in PCs, and the functionality of DDR SDRAM.

Intro To PC Final Exam - Quiz

Quiz Preview

  • 2. 

    The _____________________ is the first Intel desktop CPU to put two CPU's in the same package, called dual-core.

    Explanation
    The Pentium D is the correct answer because it was the first Intel desktop CPU to feature two CPU's in the same package, which is known as dual-core. This means that the Pentium D processor had two separate processing units within a single chip, allowing for improved multitasking and overall performance compared to single-core processors.

    Rate this question:

  • 3. 

    The _______________ is the prime heat source within a PC.

    Explanation
    The CPU, or Central Processing Unit, is the main component responsible for executing instructions and performing calculations in a computer. It is often referred to as the "brain" of the computer and generates a significant amount of heat during operation. The CPU is equipped with multiple cores and a high clock speed, allowing it to handle complex tasks efficiently. Due to its high power consumption and heat generation, proper cooling mechanisms such as fans or liquid cooling systems are necessary to prevent overheating and ensure the CPU operates optimally.

    Rate this question:

  • 4. 

    _____________________________ or ____________________, is a newer type od SDRAM.  As its name implies, it transfers data at double the speed of regular SDRAM.

    Explanation
    Double Data Rate SDRAM, also known as DDR SDRAM, is a newer type of SDRAM that transfers data at double the speed of regular SDRAM. This means that it can provide faster and more efficient data transfer, resulting in improved performance for computer systems. DDR SDRAM has become widely used in modern computing devices due to its enhanced speed and reliability compared to traditional SDRAM.

    Rate this question:

  • 5. 

    _____________________ are designed to be used in notebook or laptop computers.  They are physically smaller than standard DIMMS, but electrically similar, and are available in EDO and SDRAM types.

    Explanation
    SO-DIMMs, or Small Outline Dual In-Line Memory Modules, are specifically designed for use in notebook or laptop computers. They are physically smaller than standard DIMMs but have similar electrical characteristics. SO-DIMMs are available in both EDO (Extended Data Output) and SDRAM (Synchronous Dynamic Random Access Memory) types, making them compatible with a wide range of computer systems.

    Rate this question:

  • 6. 

    The biggest technical difference between Windows and MS-DOS is the _______________.  The _______________ is a database that keeps track of hardware and software configuration and setup information.

    Explanation
    The biggest technical difference between Windows and MS-DOS is the Registry. The Registry is a database that keeps track of hardware and software configuration and setup information.

    Rate this question:

  • 7. 

    The objects in the COntents window are viewed in one of several formats.  You can use the View menu bar or the View icon on the tool bar to change the view (Icon, Tile, List, Details, and the Thumbnail).  The _________view is the default but is difficult to use if you are concerned with file sizes, the dates they were modified, or if you have a list of files that could be sorted for easier viewing.  We recommend switching to the _____________view.

    Explanation
    The Tile view is the default but is difficult to use if you are concerned with file sizes, the dates they were modified, or if you have a list of files that could be sorted for easier viewing. We recommend switching to the Detailed view.

    Rate this question:

  • 8. 

    ______________________ is generally used to describe any memory that does not lose data when the power is removed.  Its opposite is _______________, which lose data when power is removed.  ____________ is the physical memory package, usually a large IC on the motherboard.

    Explanation
    ROM is generally used to describe any memory that does not lose data when the power is removed. Its opposite, RAM, loses data when power is removed. ROM is the physical memory package, usually a large IC on the motherboard.

    Rate this question:

  • 9. 

    The _______________________ contains information that points to the location of the operating system. In DOS and WIndows 95/98 that file was __________________.  In Windows NT/2000/XP that file is _______________.  In earlier operating systems the key files were ____________ and __________________. In Windows NT, 2000, and XP, _________________ is the key file.

    Explanation
    The system partition contains information that points to the location of the operating system. In DOS and Windows 95/98, that file was IO.SYS. In Windows NT/2000/XP, that file is NTLDR. In earlier operating systems, the key files were IO.SYS and COMMAND.COM. In Windows NT, 2000, and XP, NTLDR is the key file.

    Rate this question:

  • 10. 

    Microsoft recommends that you only used _______________ drivers, which also come with a special Windows logo stating they are designed for Windows. 

    Explanation
    Microsoft recommends that users only use signed drivers. Signed drivers have undergone a verification process by Microsoft and come with a special Windows logo indicating that they are designed specifically for Windows. These drivers are considered to be more reliable and secure compared to unsigned drivers, as they have been tested and approved by Microsoft.

    Rate this question:

  • 11. 

    The ___________________ and _________________ are an attempt to verify that you are the authentic intended user, and not an imposter.  The process of verifying that the person typing is the actual authorized user is called ____________________.

    Explanation
    The login and password are used as a means to verify the identity of the user and ensure that they are the intended user and not an imposter. This process of verifying the user's identity is called authentication.

    Rate this question:

  • 12. 

    One final approach takes a bit of work upfront but it works very quickly.  You can make a copy of your entire system partition and put it on CD or another hard drive.  This copy is called _______________, and is an exact duplicate of your drive.

    Explanation
    A disk image is a copy of the entire system partition that is stored on a CD or another hard drive. It is an exact duplicate of the original drive, including all files, folders, and settings. This approach requires some initial effort to create the disk image, but it allows for quick restoration of the system in case of any issues or failures.

    Rate this question:

  • 13. 

    With ___________________ drives, You connect a single drive to a port on the motherboard, and that's it.

    Explanation
    With SATA drives, you connect a single drive to a port on the motherboard, and that's it. SATA (Serial Advanced Technology Attachment) is a type of interface used to connect storage devices, such as hard drives and solid-state drives, to the motherboard of a computer. It is a simple and straightforward method of connecting a drive, as it only requires plugging in a single cable to the SATA port on the motherboard. SATA drives have become the standard for most modern computers due to their ease of use and faster data transfer speeds compared to older interfaces like IDE.

    Rate this question:

  • 14. 

    DVD capacity table: DVD Type = Max Capacity; Single-layer, single-sided = _______________GB; Single-layer, double sided = _____________GB; Dual-layer, single sided = ______________________ GB; Double layer, double sided = ___________GB.

    Explanation
    The answer 4.7, 9.4, 8.5, 17 represents the maximum capacity in gigabytes (GB) for each type of DVD mentioned in the table. The single-layer, single-sided DVD has a capacity of 4.7 GB, the single-layer, double-sided DVD has a capacity of 9.4 GB, the dual-layer, single-sided DVD has a capacity of 8.5 GB, and the double-layer, double-sided DVD has a capacity of 17 GB.

    Rate this question:

  • 15. 

    The problem is how does the CPU know when a device needs attention?  It works the same way a student gets the attention of the instructor.  Each device will "raise its hand" and wait for the CPU to respond.  Each device will use the raising its hand  version known as, a _____________________.

    Explanation
    Each device in a computer system uses a hardware interrupt to get the attention of the CPU. Similar to a student raising their hand to get the attention of an instructor, the device "raises its hand" by sending a signal to the CPU. This signal is known as a hardware interrupt, which prompts the CPU to stop its current task and handle the request from the device. By using hardware interrupts, the CPU can efficiently manage multiple devices and respond to their needs in a timely manner.

    Rate this question:

  • 16. 

    A ___________________ works having an electron gun at the long narrow end which is heated and emits a stream of high-speed electrons in the direction of the large end of the tube.

    Explanation
    A CRT (Cathode Ray Tube) works by using an electron gun at one end of the tube that is heated and emits a stream of high-speed electrons. These electrons are then directed towards the larger end of the tube, where they hit a phosphor-coated screen, creating the images that we see on a CRT display.

    Rate this question:

  • 17. 

    ______________ displays are known for their sharp image quality, low power usage, light weight, and thin profile.  

    Explanation
    LCD displays, or Liquid Crystal Displays, are known for their sharp image quality due to their ability to produce high-resolution images. They also have low power usage compared to other display technologies, making them energy-efficient. LCD displays are lightweight and have a thin profile, making them suitable for portable devices such as laptops, tablets, and smartphones.

    Rate this question:

  • 18. 

    Because of the level of complexity and the millions of microscopic transistors that need to be printed onto the LCD substrate,  LCDs are fairly expensive and difficult to manufacture.  In a standard 1,024 x 768 color laptop screen, there are more than __________________ transistors.  If a single transistor doesn't operate properly,  the associated pixel loses its sub-pixel color.

    Explanation
    LCD screens are expensive and difficult to manufacture due to their complexity and the large number of microscopic transistors that need to be printed onto the LCD substrate. In a standard 1,024 x 768 color laptop screen, there are more than 2 million transistors. If even a single transistor fails to operate properly, the corresponding pixel loses its sub-pixel color.

    Rate this question:

  • 19. 

    Microsoft and Intel jointly developed the ______________________ (APM) specification.  These specifications define the _____________________ between the hardware and the operating system.  In order for a computer to provide power management it must comply with both of these standards, DPMS for monitors, APM on the computer side.

    Explanation
    Microsoft and Intel collaborated to create the Advanced Power Management (APM) specification. This specification outlines the standards for power management between the hardware and the operating system. To enable power management on a computer, it must adhere to both the DPMS standard for monitors and the APM standard on the computer side. The APM specification provides a bios-level interface for managing power settings and optimizing energy usage.

    Rate this question:

  • 20. 

    In some peer-to-peer networks,  a single machine is assigned to be the ________________________.

    Explanation
    In some peer-to-peer networks, a single machine is designated as the main storage depot. This means that this particular machine is responsible for storing and managing the majority of the network's data. Other machines in the network can access and retrieve data from this main storage depot when needed. Having a centralized storage location helps to streamline data management and ensure that important files are easily accessible to all network participants.

    Rate this question:

  • 21. 

    The next step-up is the ________________________.  This network requires that one computer,  the server, is dedicated to acting as a central repository of account and login information, and usually files and applications.

    Explanation
    A client-server network is the next step-up in networking. In this type of network, one computer, known as the server, is dedicated to storing and managing account and login information, as well as files and applications. Other computers, called clients, connect to the server to access these resources. This setup allows for centralized control and management of data and resources, making it efficient and secure.

    Rate this question:

  • 22. 

    ___________________________ establish the rules on how computers talk to and understand each other.

    Explanation
    Protocols are a set of rules that define how computers communicate and understand each other. They establish the standards and procedures for data transmission, ensuring that information is exchanged accurately and efficiently between devices. By following these protocols, computers can effectively communicate over networks, enabling seamless data transfer and interoperability.

    Rate this question:

  • 23. 

    In a ________________________, all devices are connected to a single linear cable.

    Explanation
    A bus network is a type of network where all devices are connected to a single linear cable. This cable, known as the bus, serves as a communication pathway for all devices on the network. Each device on the bus network can transmit data onto the bus, and all other devices can receive and interpret that data. This type of network is commonly used in small to medium-sized networks where simplicity and cost-effectiveness are important factors.

    Rate this question:

  • 24. 

    In a _______________________,  all workstations and servers are connected in a closed loop.

    Explanation
    A ring network is a type of computer network where all workstations and servers are connected in a closed loop. In this network topology, each device is connected to two other devices, forming a ring-like structure. Data travels in one direction around the ring, passing through each device until it reaches its destination. This type of network is known for its simplicity and efficiency in transmitting data, as it eliminates the need for a central hub or switch.

    Rate this question:

  • 25. 

    _______________________ (NICs) link the computer to the network cable systems.

    Explanation
    Network Interface Cards (NICs) are hardware devices that connect a computer to a network cable system. They provide the necessary interface for the computer to send and receive data over the network. NICs are essential for establishing a connection between the computer and the network, allowing the computer to communicate with other devices and access resources on the network. Without NICs, the computer would not be able to connect to the network cable systems and participate in network communication.

    Rate this question:

  • 26. 

    _________________________ consists of two insulated strands of wire twisted around each other to form a pair.

    Explanation
    Twisted-pair cable is a type of cable that is made up of two insulated strands of wire that are twisted around each other to form a pair. This twisting helps to reduce electromagnetic interference and crosstalk between the wires, making it suitable for transmitting data signals. Twisted-pair cables are commonly used in Ethernet networks and telephone systems.

    Rate this question:

  • 27. 

    Twisted-pair cable is limited to a maximum lenght of _________________, and it requires a hub or a switch to connect more than two computers.  __________________ is by far the most popular type of cabling, even with its length limitation.

    Explanation
    Twisted-pair cable is limited to a maximum length of 100 meters. It requires a hub or a switch to connect more than two computers. UTP (Unshielded Twisted Pair) is the most popular type of cabling, despite its length limitation.

    Rate this question:

  • 28. 

    As with any technology,  the ____________________ has its downside.  For one thing it has limited throughput.  The theoretical maximum speed of today's fastest wireless technology is __________________Mbps.

    Explanation
    Wireless LAN technology, also known as Wi-Fi, has its limitations. One of these limitations is its limited throughput, meaning it can only handle a certain amount of data at a time. The theoretical maximum speed of the fastest wireless LAN technology currently available is 54 Mbps (megabits per second). This means that in ideal conditions, the wireless LAN can transmit data at a maximum speed of 54 Mbps.

    Rate this question:

  • 29. 

    The ______________________________________________ has specified several categories of twisted-pair cable.  Not all of these are approved for data communications.

    Explanation
    The Electronics Industries Association/Telecommunications Industry Association (EIA/TIA) has specified several categories of twisted-pair cable. These categories are used for different purposes and not all of them are approved for data communications.

    Rate this question:

  • 30. 

    Operating in the same 2.4Ghz range as the 802.11B,  the newer __________________ standard offers the same speed as 802.11A at 54Mbps, but is backward-compatible with 802.11B.  As of today this is the most widely used system.

    Explanation
    The correct answer is 802.11G. This standard operates in the same 2.4Ghz range as 802.11B and offers the same speed as 802.11A at 54Mbps. It is also backward-compatible with 802.11B, making it a popular choice among users. As of today, 802.11G is the most widely used system.

    Rate this question:

  • 31. 

    ______________________ is a fast, full time connection to the internet, and does not tie up a telephone line as it can operate at the same time as a telephone call.  Speed is between ___________________Kbps; depending on the type and how far you are from the nearest substation.

    Explanation
    DSL (Digital Subscriber Line) is a fast, full-time connection to the internet that does not require tying up a telephone line. It can operate simultaneously with a telephone call. The speed of DSL can vary between 354 Kbps to 3000 Kbps, depending on the type of DSL and the distance from the nearest substation.

    Rate this question:

  • 32. 

    The Intel chipset system uses the ___________ device to control the transfer data into and out of the SATA ports.

    • CPU

    • GMCH

    • ICH

    Correct Answer
    A. ICH
    Explanation
    The correct answer is ICH. ICH stands for Input/Output Controller Hub and it is a part of the Intel chipset system. The ICH device is responsible for controlling the transfer of data into and out of the SATA ports. It acts as a bridge between the CPU and the SATA ports, facilitating the communication between the two and ensuring smooth data transfer.

    Rate this question:

  • 33. 

    It is important to know that ___________________________ itself does not cause electrical damage.  The damage occurs when these extremely high voltages are discharged in an uncontrolled manner, typically through a semiconductor such as an integrated circuit.

    Correct Answer
    static electricity
    Static Electricity
    Explanation
    Static electricity itself does not cause electrical damage. The damage occurs when these extremely high voltages are discharged in an uncontrolled manner, typically through a semiconductor such as an integrated circuit. Static electricity refers to the buildup of electric charges on the surface of objects. It can be generated by friction, contact, or separation of materials. While static electricity can cause discomfort or minor shocks, it is the uncontrolled discharge of this built-up charge that can potentially damage electronic components.

    Rate this question:

  • 34. 

    A time - tested way to increase system performance is to __________________________.  However,  when upgrading memory there are several precautions that must be observed to insure a smooth upgrade.

    Correct Answer
    increase memory capacity
    Increase memory capacity
    Explanation
    Increasing the memory capacity of a system is a proven method to enhance its performance. By adding more memory, the system can handle larger amounts of data and run multiple applications simultaneously without slowing down. However, when upgrading memory, it is crucial to follow certain precautions to ensure a seamless upgrade process. This may include checking compatibility with the existing hardware, ensuring proper installation techniques, and verifying the system's ability to support the increased memory capacity.

    Rate this question:

  • 35. 

    Most experienced system administrators will ____________________________, which effectively closes a potential security hole.  An amazing number of people use the default administrator account with their first name as password...and the hackers know this.

    Correct Answer
    change the Administrator account name
    change the name of the Administrator account
    Explanation
    The correct answer is to change the Administrator account name or change the name of the Administrator account. This is because using the default administrator account with a common password (such as the user's first name) is a common practice among many users. Hackers are aware of this and can exploit it to gain unauthorized access to the system. By changing the name of the Administrator account, it becomes harder for hackers to guess the username and therefore adds an additional layer of security to the system.

    Rate this question:

  • 36. 

    ______________________ is most often defined as the act of playing a ruse to entice you to give up personal information.

    Correct Answer
    Phishing
    Explanation
    Phishing is most often defined as the act of playing a ruse to entice you to give up personal information. Phishing scams typically involve sending fraudulent emails or messages that appear to be from reputable sources, such as banks or online services, in order to trick individuals into revealing sensitive information like passwords or credit card details. These scams often employ tactics like creating a sense of urgency or using convincing fake websites to deceive victims. It is important to be cautious and verify the authenticity of any requests for personal information to protect oneself from falling victim to phishing attacks.

    Rate this question:

  • 37. 

    Installing an optical drive is similar to installing a ___________________.

    Correct Answer
    hard drive
    Explanation
    Installing an optical drive is similar to installing a hard drive because both require physically connecting the drive to the computer's motherboard using cables, securing it in the appropriate drive bay, and configuring the computer's BIOS to recognize the new drive. Additionally, both types of drives store and retrieve data, although they use different methods - optical drives use lasers to read and write data on optical discs, while hard drives use magnetic storage to store data on spinning platters.

    Rate this question:

  • 38. 

    ______________________ are used to connect devices to the motherboard and therefore allow the flow of data between that device and other devices in the computer.

    Correct Answer
    Expansion Buses
    Expansion buses
    Explanation
    Expansion buses are used to connect devices to the motherboard and allow the flow of data between that device and other devices in the computer. These buses provide a pathway for communication and data transfer, enabling devices such as graphics cards, sound cards, and network adapters to be connected and interact with the rest of the computer system. Without expansion buses, devices would not be able to communicate with each other or with the motherboard, limiting the functionality and expandability of the computer.

    Rate this question:

  • 39. 

    _____________________ uses a serial data transfer method rather than parallel.

    Correct Answer
    PCIe
    Explanation
    PCIe (Peripheral Component Interconnect Express) uses a serial data transfer method rather than parallel. This means that data is transmitted one bit at a time, sequentially, instead of multiple bits simultaneously. This allows for faster and more efficient data transfer, as it eliminates the need for synchronization between multiple parallel data channels. PCIe also provides higher bandwidth and scalability compared to parallel interfaces, making it the preferred choice for connecting devices such as graphics cards, network cards, and storage devices to a computer's motherboard.

    Rate this question:

  • 40. 

    The best source of information to check before obtaining memory is the _____________________ that comes with the computer or motherboard.  This source will generally list the type of memory required,  how many modules are possible,  and how to install them on the motherboard. 

    Correct Answer
    documentation
    Explanation
    The best source of information to check before obtaining memory is the documentation that comes with the computer or motherboard. This documentation typically includes all the necessary information about the type of memory required, the number of modules that can be installed, and instructions on how to install them on the motherboard. Therefore, referring to the documentation is crucial to ensure compatibility and proper installation of memory.

    Rate this question:

  • 41. 

    Beyond the remote workstation sits the __________________ network.  As its name implies,  this network is a collection of similar computers with a common connection.  This is the type of network created when several computers in an office are interconnected.

    Correct Answer
    peer-to-peer
    Explanation
    The correct answer is peer-to-peer. In a peer-to-peer network, computers are interconnected and share resources without the need for a central server. This type of network is commonly found in small offices or homes where computers are connected directly to each other. Each computer in the network can act as both a client and a server, allowing users to share files, printers, and other resources easily.

    Rate this question:

  • 42. 

    The key aspects of a peer-to-peer network are that no single computer is in charge of the others, and each computer is independent of the others.

    • True

    • False

    Correct Answer
    A. True
    Explanation
    A peer-to-peer network is a type of network where all the computers are equal and there is no central authority or hierarchy. Each computer in the network can act as both a client and a server, allowing them to share resources and communicate directly with each other. This means that no single computer has control over the others, and they can operate independently. Therefore, the statement that the key aspects of a peer-to-peer network are that no single computer is in charge of the others, and each computer is independent of the others, is true.

    Rate this question:

  • 43. 

    The server runs a special operating system, the __________________.  Typically this is Windows NT server, Windows 200x Server, Netware, or a server version of Linux.

    Correct Answer
    NOS
    Explanation
    The correct answer is NOS, which stands for Network Operating System. This is a specialized operating system designed to manage and coordinate network resources and provide services to client devices. Common examples of NOS include Windows NT server, Windows 200x Server, Netware, and server versions of Linux.

    Rate this question:

  • 44. 

    ______________________ are widely used in large organizations where security must be managed and many users will be connected to a network.

    Correct Answer
    Client-server networks
    Explanation
    Client-server networks are widely used in large organizations where security must be managed and many users will be connected to a network. In a client-server network, multiple clients (computers or devices) connect to a central server, which manages and controls access to resources, data, and services. This architecture allows for centralized security measures to be implemented, such as user authentication and authorization, data encryption, and firewall protection. It also enables efficient management and distribution of resources, as the server can handle multiple requests from clients simultaneously.

    Rate this question:

  • 45. 

    On older Windows 9x systems, you might see login screens where you can optionally enter a _______________ and ____________ - the key being optional.  WIth Windows NT, 2000, XP, and Vista, the ________________ and _____________ are required.

    Correct Answer
    username, password
    Username, Password
    Explanation
    On older Windows 9x systems, the login screens may have an option to enter a username and password, but it is not mandatory. However, with Windows NT, 2000, XP, and Vista, both the username and password are required to be entered in order to log in.

    Rate this question:

  • 46. 

    The __________________________ process eliminates most of the device drivers on the Internet that load malware along with running a device.

    Correct Answer
    digital signature
    Explanation
    The digital signature process is a method used to verify the authenticity and integrity of digital data. In the context of the given question, the digital signature process can be used to eliminate device drivers on the Internet that may contain malware. By using digital signatures, users can ensure that the device drivers they download and install are from trusted sources and have not been tampered with. This helps to protect their devices from malware that may be loaded along with the device drivers.

    Rate this question:

  • 47. 

    Most commonly, you use the tools on the _____________________ to partition the drive when you first install Windows.

    Correct Answer
    Windows installation CDs
    Windows Installation CDs
    Explanation
    When installing Windows, the tools on the Windows installation CDs are commonly used to partition the drive. These tools allow users to divide the hard drive into separate sections, known as partitions, which can be used to organize and manage data more efficiently. By using the Windows installation CDs, users can easily access these partitioning tools and set up the desired partitions during the installation process.

    Rate this question:

  • 48. 

    The latest technology for storing data belongs to the ______________________________.  Most of us are familiar with the CD-ROMs and DVD ROMs that we use for playing audio, video, or installing software.  The advantages of these drives are that they can store large amounts of data, are inexpensive to produce, and are unaffected by environmental influences.

    Correct Answer
    family of optical drives
    Explanation
    The correct answer is the "family of optical drives". Optical drives, such as CD-ROMs and DVD-ROMs, are a type of storage technology that uses lasers to read and write data on optical discs. They have the advantage of being able to store large amounts of data, being cost-effective to produce, and being resistant to environmental factors.

    Rate this question:

  • 49. 

    In optical diskes (CD, DVDs) the disk is made up of 3 different parts.  The _________________, the __________________, is molded from a master disk.  

    Correct Answer
    bottom part, polycarbonate layer
    Explanation
    The correct answer is the bottom part, polycarbonate layer. In optical disks such as CDs and DVDs, the disk is composed of three different parts. The bottom part refers to the lower section of the disk, while the polycarbonate layer is a material that is molded from a master disk. This layer is responsible for protecting the data stored on the disk and is transparent to allow the laser beam to read the data.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 26, 2011
    Quiz Created by
    Jevavee
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.