Kazen 1st 6 Weeks Exam 2010

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Gbriseno
G
Gbriseno
Community Contributor
Quizzes Created: 15 | Total Attempts: 6,618
Questions: 36 | Attempts: 174

SettingsSettingsSettings
Kazen 1st 6 Weeks Exam 2010 - Quiz

This exam is the 1st 6 weeks exam that covered: cyberbullying, social networking, online safety and internet predators, blogs and wikis, technology overload, digital etiquette, malware, phishing, wireless safety, email, network applications, domain extensions, internet search engines, software file formats, hardware components, copyright/ethics, webpage creation and microsoft word. Use all your resources to find and answers the questions.


Questions and Answers
  • 1. 

    You just opened a savings account at a bank. Every week you are going to put part of your allowance into this account. You want to use the computer to keep track of the balance of the account. Which type of software program would you use to track your money in Excel?

    • A.

      Text

    • B.

      Spreadsheet

    • C.

      Sound

    • D.

      Compressed

    Correct Answer
    B. Spreadsheet
    Explanation
    You would use a spreadsheet software program to track your money in Excel. Spreadsheets are designed to organize and manipulate numerical data, making them ideal for tracking and calculating balances in accounts. With Excel, you can create formulas, input income and expenses, and easily update and track your savings account balance over time.

    Rate this question:

  • 2. 

    Your best friend just moved across the country. You've promised to write at least once a week. If you decided NOT to mail him/her a letter but to type one up on your computer and electronically mail it to them, what type of network application would you use?

    • A.

      Online chat

    • B.

      Email

    • C.

      Groupware

    • D.

      Webinar

    Correct Answer
    B. Email
    Explanation
    If you decided to type up a letter on your computer and electronically mail it to your friend, the type of network application you would use is email. Email allows you to send messages and files electronically over the internet, making it a convenient and efficient way to communicate with someone who is far away.

    Rate this question:

  • 3. 

    An application can only open a document if that document is in a format that is compatible with the application.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    This statement is true because an application is designed to work with specific file formats. If a document is not in a format that is compatible with the application, the application will not be able to open or read the document correctly. Therefore, for successful opening and functioning of a document, it must be in a format that is supported by the application being used.

    Rate this question:

  • 4. 

    File types of jpg, jpeg, bmp, gif, tiff and pict are formats for what type of file?

    • A.

      Spreadsheets

    • B.

      Texts

    • C.

      Graphics/pictures

    • D.

      Compressed

    Correct Answer
    C. Graphics/pictures
    Explanation
    The file types jpg, jpeg, bmp, gif, tiff, and pict are commonly used for storing and displaying graphics and pictures. These formats are specifically designed to efficiently store and represent visual content, making them ideal for images. They are not typically used for spreadsheets, texts, or compressed files. Therefore, the correct answer is graphics/pictures.

    Rate this question:

  • 5. 

    Fair Use allows students to cite ideas and quotations from copyrighted works for educational purposes.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Fair Use is a legal doctrine that allows for the limited use of copyrighted material without permission from the copyright owner. It is intended to promote the sharing of knowledge and ideas, particularly in educational settings. Students are allowed to cite ideas and quotations from copyrighted works as long as it is for educational purposes and meets the criteria of Fair Use, such as being transformative, limited in scope, and not negatively impacting the market for the original work. Therefore, the statement that Fair Use allows students to cite ideas and quotations from copyrighted works for educational purposes is true.

    Rate this question:

  • 6. 

    You must get written permission from the copyright owner before using someone else's work in your own product.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    This statement is true because using someone else's work without their permission is a violation of copyright law. Copyright gives the owner exclusive rights to reproduce, distribute, and display their work. In order to use someone else's work legally, you must obtain written permission from the copyright owner, unless your use falls under fair use or another exception to copyright law.

    Rate this question:

  • 7. 

    Plagiarizing is using someone else's work and is illegal and can result in penalties at school and at work.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Plagiarizing refers to the act of using someone else's work without giving them proper credit. It is considered illegal and unethical as it violates copyright laws and intellectual property rights. Plagiarism can have serious consequences, including penalties at school and work. Therefore, the statement that plagiarizing is illegal and can result in penalties at school and work is true.

    Rate this question:

  • 8. 

    Online chats are private communications between you and the person you are talking with.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Online chats are not always private communications between you and the person you are talking with. Depending on the platform or service being used, online chats can be monitored or accessed by third parties, such as the platform administrators or law enforcement agencies. Additionally, there is always a risk of someone intercepting or hacking into the chat, compromising its privacy. Therefore, it is important to be cautious and mindful of the potential lack of privacy in online chats.

    Rate this question:

  • 9. 

    What type of network application uses video cameras, microphones and other items to allow people in different locations to hold meetings in which they can see and hear one another?

    • A.

      Videoconferencing

    • B.

      Instant messaging

    • C.

      Email

    • D.

      Web browser

    Correct Answer
    A. Videoconferencing
    Explanation
    Videoconferencing is the correct answer because it is a type of network application that utilizes video cameras, microphones, and other devices to enable individuals in different locations to hold meetings where they can see and hear each other. This technology allows for real-time communication and collaboration, making it possible for people to have virtual face-to-face interactions despite being physically separated.

    Rate this question:

  • 10. 

    .COM is the most popular and desirable extension for domain names.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    ".COM" is indeed the most popular and desirable extension for domain names. This is because it is the original and most widely recognized top-level domain (TLD) on the internet. It is commonly associated with commercial websites and has become synonymous with businesses and organizations. Additionally, it is easier for users to remember and type ".COM" compared to other TLDs. As a result, many individuals and businesses prefer to have a ".COM" domain name for their website.

    Rate this question:

  • 11. 

    .ORG is reserved for chartered nonprofit organizations, such as trade associations and charities.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The .ORG domain extension is specifically reserved for chartered nonprofit organizations, including trade associations and charities. This means that only these types of organizations are eligible to register a domain name with the .ORG extension. Therefore, the statement "True" is correct as it accurately reflects the purpose and eligibility criteria for the .ORG domain.

    Rate this question:

  • 12. 

    Which domain extension is reserved for degree granting academic institutions?

    • A.

      .com

    • B.

      .net

    • C.

      .mobi

    • D.

      .edu

    Correct Answer
    D. .edu
    Explanation
    The domain extension .edu is reserved for degree-granting academic institutions. This extension is specifically designated for educational institutions such as universities, colleges, and research institutions. It helps to identify and differentiate these institutions from other types of websites.

    Rate this question:

  • 13. 

    Which domain extension is commonly used for small businesses?

    • A.

      .net

    • B.

      .tv

    • C.

      .biz

    • D.

      .com

    Correct Answer
    C. .biz
    Explanation
    The domain extension .biz is commonly used for small businesses. It is a top-level domain (TLD) specifically designed for businesses and is often chosen by small businesses to establish their online presence. The .biz extension is short, easy to remember, and signifies that the website belongs to a business. It is a popular choice for small businesses looking for a professional and recognizable domain name.

    Rate this question:

  • 14. 

    Which domain extension is specifically designed for personal use and is commonly used for easy to remember e-mail addresses and personal web sites that display photos or personal information about an individual.

    • A.

      .name

    • B.

      .org

    • C.

      .com

    • D.

      .cc

    Correct Answer
    A. .name
    Explanation
    The .name domain extension is specifically designed for personal use and is commonly used for easy to remember e-mail addresses and personal websites that display photos or personal information about an individual. It is a suitable choice for individuals who want to create a personal online presence and showcase their personal information or portfolio.

    Rate this question:

  • 15. 

    Which area of the computer is the "brain" of the computer and controls the rest of the computer?

    • A.

      Cpu

    • B.

      Printer

    • C.

      Fan

    • D.

      Ram

    Correct Answer
    A. Cpu
    Explanation
    The CPU (Central Processing Unit) is often referred to as the "brain" of the computer because it is responsible for executing instructions and performing calculations. It controls the operations of the entire computer system, including coordinating input and output devices, managing memory, and processing data. The CPU is where most of the computing tasks take place, making it the central component that controls and directs the operations of the rest of the computer.

    Rate this question:

  • 16. 

    What part of the computer is contained on a large electronic chip that is plugged into the motherboard?

    • A.

      Ram

    • B.

      Fan

    • C.

      Cd-rom

    • D.

      Cpu

    Correct Answer
    D. Cpu
    Explanation
    The CPU, or Central Processing Unit, is the part of the computer that is contained on a large electronic chip and is plugged into the motherboard. It is often referred to as the "brain" of the computer, as it carries out most of the computer's processing tasks. The CPU is responsible for executing instructions, performing calculations, and managing the flow of data within the computer system.

    Rate this question:

  • 17. 

    What type of hardware are the following devices: printers, monitors, speakers and sometimes scanners?

    • A.

      Output

    • B.

      Input

    • C.

      Storage

    • D.

      Memory

    Correct Answer
    A. Output
    Explanation
    Printers, monitors, speakers, and sometimes scanners are all examples of output devices. Output devices are hardware components that display or present information from a computer system to the user. They take data from the computer and convert it into a form that can be easily understood or interpreted by humans. In this case, printers produce hard copies of documents, monitors display visual information, and speakers produce audio output. Scanners can also be considered output devices when they are used to display or present scanned documents or images.

    Rate this question:

  • 18. 

    What type of hardware are the following devices: keyboards, mouse devices, microphones, scanners, digital cameras, and video cameras?

    • A.

      Input

    • B.

      Output

    • C.

      Memory

    • D.

      Storage

    Correct Answer
    A. Input
    Explanation
    The devices mentioned in the question, such as keyboards, mouse devices, microphones, scanners, digital cameras, and video cameras, are all examples of input hardware. Input hardware refers to devices that allow users to input data or commands into a computer system. These devices enable users to interact with the computer and provide input in the form of text, audio, images, or video, which the computer then processes and responds to accordingly.

    Rate this question:

  • 19. 

    What type of hardware are the following devices: hard disk drives, floppy disk drives, CD-ROM drives, DVD-ROM drives, and flash drives?

    • A.

      Input

    • B.

      Output

    • C.

      Ram

    • D.

      Storage

    Correct Answer
    D. Storage
    Explanation
    The devices mentioned in the question, such as hard disk drives, floppy disk drives, CD-ROM drives, DVD-ROM drives, and flash drives, are all types of storage hardware. They are used to store and retrieve data, whether it is permanently stored like in hard disk drives or removable like in floppy disk drives, CD-ROM drives, DVD-ROM drives, and flash drives. These devices play a crucial role in storing and accessing data on computers and other electronic devices.

    Rate this question:

  • 20. 

    Modems allow data to be sent and received over ordinary telephone lines.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Modems are devices that enable computers to transmit and receive data over ordinary telephone lines. They convert digital data from the computer into analog signals that can be transmitted through the telephone lines, and then convert the analog signals back into digital data at the receiving end. This allows for the transmission of data over long distances using existing telephone infrastructure. Therefore, the statement that modems allow data to be sent and received over ordinary telephone lines is true.

    Rate this question:

  • 21. 

    A wiki is a sort of blog that holds information from a group of people that can then be accessed by all members so that they can all have the same information instead of emailing back and forth.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A wiki is a collaborative website that allows multiple users to contribute and edit content. It serves as a platform for sharing information and knowledge among a group of people. Unlike traditional methods like emailing, a wiki provides a centralized and accessible source of information for all members. Therefore, the statement that a wiki holds information from a group of people that can be accessed by all members is true.

    Rate this question:

  • 22. 

    Wikipedia is an online encyclopedia that gathers information from users worldwide but some information could be false, so you must read it and use it cautiously.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement is true because Wikipedia is an online encyclopedia that relies on user-generated content. While it is a valuable source of information, it is important to exercise caution because anyone can contribute to it, and there is a possibility of false or misleading information. Therefore, it is necessary to read and verify the information obtained from Wikipedia before using it as a reliable source.

    Rate this question:

  • 23. 

    Social media and networking allows people to have more virtual friends from all over the world.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Social media and networking platforms provide individuals with the opportunity to connect and interact with people from different parts of the world. These platforms enable users to make virtual friends, expanding their social circles beyond geographical boundaries. Through social media, people can engage in conversations, share experiences, and build relationships with individuals they may not have had the chance to meet in person. Therefore, the statement that social media and networking allow people to have more virtual friends from all over the world is true.

    Rate this question:

  • 24. 

    Facebook and MySpace are examples of social networking sites.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Facebook and MySpace are indeed examples of social networking sites. Both platforms allow users to create profiles, connect with friends, share content, and engage in online communities. They provide a space for individuals to interact, communicate, and share information with others, making them prime examples of social networking sites.

    Rate this question:

  • 25. 

    After reviewing the screenshot above, which letter (A, B, C, or D) is pointing to the Zoom Slider on the Word Screen?

    • A.

      A

    • B.

      B

    • C.

      C

    • D.

      D

    Correct Answer
    D. D
    Explanation
    Based on the screenshot provided, the letter D is pointing to the Zoom Slider on the Word Screen. The Zoom Slider is a tool that allows users to adjust the zoom level of the document, making it larger or smaller for easier viewing.

    Rate this question:

  • 26. 

    After reviewing the screenshot above, which letter (A,B,C,or D) is pointing to the Status Bar?

    • A.

      A

    • B.

      B

    • C.

      C

    • D.

      D

    Correct Answer
    C. C
    Explanation
    Based on the screenshot provided, letter C is pointing to the Status Bar. The Status Bar is typically located at the bottom of the screen and displays important information such as the time, battery level, network connection, and notifications.

    Rate this question:

  • 27. 

    The header of a document will be seen at the top of a document and is constant on every page.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement is true because the header of a document is a section that appears at the top of every page consistently. It typically contains information such as the document title, author, date, and page numbers. This allows readers to easily identify the document and navigate through its pages. By remaining constant on every page, the header provides continuity and helps maintain a professional and organized appearance for the document.

    Rate this question:

  • 28. 

    Watermarks show up in the back of the text of a document and are shown to tell the owner of a document about special instructions in handling of the document.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Watermarks are indeed used in documents to convey special instructions or information to the owner or recipient. They typically appear as a faint, translucent image or text in the background of the document. This can include instructions such as "Confidential," "Draft," or "Do Not Copy." Watermarks serve as a visual reminder or warning, ensuring that the document is handled appropriately and according to the specified instructions. Therefore, the statement "Watermarks show up in the back of the text of a document and are shown to tell the owner of a document about special instructions in handling of the document" is true.

    Rate this question:

  • 29. 

    Bullets and numbers are used to show "lists" of things and can be changed to just about any symbol.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Bullets and numbers are commonly used to present lists of things, but they are not limited to just these symbols. They can be replaced with any other symbol or even customized according to personal preference. Therefore, the statement is true.

    Rate this question:

  • 30. 

    The "dog" used in text wrapping allows you to resize and move the picture around the document so it can be used in any way you need to use it.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The "dog" used in text wrapping refers to a feature in document editing software that allows users to resize and reposition an image within the document. This feature is useful as it provides flexibility in using the picture according to the user's needs. Therefore, the statement is correct, stating that the "dog" used in text wrapping allows resizing and moving the picture around the document for versatile usage.

    Rate this question:

  • 31. 

    The INSERT ribbon in Microsoft Word allows you to insert tables, pictures, headers and footers.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The INSERT ribbon in Microsoft Word provides users with the ability to add various elements to their documents, such as tables, pictures, headers, and footers. This allows for enhanced customization and organization of the document's content. Therefore, the statement "True" accurately describes the functionality of the INSERT ribbon in Microsoft Word.

    Rate this question:

  • 32. 

    The two most common types of Operating Systems (OS) are windows and mac.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The explanation for the given correct answer is that Windows and Mac are indeed the two most common types of operating systems. Windows is a widely used operating system developed by Microsoft, while Mac is the operating system developed by Apple for their Macintosh computers. These two operating systems dominate the market and are used by a majority of computer users, making the statement true.

    Rate this question:

  • 33. 

    Phishing is internal fraud in the form of emails or pop-up messages to lure users into providing usernames, passwords, and personal information

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Phishing refers to a type of internal fraud where scammers use deceptive emails or pop-up messages to trick users into revealing sensitive information such as usernames, passwords, and personal details. This is done with the intention of using this information for malicious purposes, such as identity theft or financial fraud. Therefore, the statement that phishing is internal fraud in the form of emails or pop-up messages to lure users into providing personal information is true.

    Rate this question:

  • 34. 

    A DVD can be used to record music and not movies.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    A DVD can be used to record both music and movies. DVDs have the capability to store large amounts of data, including audio and video files. Therefore, it is incorrect to say that a DVD can only be used to record music and not movies.

    Rate this question:

  • 35. 

    What is an error in a computer’s program (or software) called?

    • A.

      Bug

    • B.

      Virus

    • C.

      Printer

    • D.

      Modem

    Correct Answer
    A. Bug
    Explanation
    An error in a computer's program or software is commonly referred to as a bug. This term originated from the early days of computing when an actual insect caused a malfunction in a computer system. Nowadays, a bug refers to a flaw or mistake in the code that leads to unexpected behavior or crashes in the software. Debugging is the process of identifying and fixing these bugs to ensure the program runs smoothly.

    Rate this question:

  • 36. 

    The Motherboard stores data temporarily during processing.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The motherboard does not store data temporarily during processing. The motherboard is responsible for connecting all the components of a computer system, including the CPU, memory, storage devices, and peripherals. It provides the communication pathways for these components to interact with each other. However, the actual storage of data during processing is done by the computer's memory, such as RAM (Random Access Memory), not the motherboard itself. Therefore, the statement is false.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 15, 2010
    Quiz Created by
    Gbriseno
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.