Everything Computer: Advanced Trivia Quiz

64 Questions

Settings
Please wait...
Everything Computer: Advanced Trivia Quiz

Below is an everything Computer: Advanced Trivia. Do you think that you have adequate knowledge of computers to tackle it? Well do give it a try and if you don’t pass at least, you will have a lot of things that you can learn from it. All the best and look out for other quizzes just like it. Feel free to take it more than one time.


Questions and Answers
  • 1. 
    Why were magnetic tapes used to replace punch cards in second generation computers?
    • A. 

      Increased computer memory

    • B. 

      Increased cost of production

    • C. 

      Increased manual labor

    • D. 

      Increased reliability Increased reliability

  • 2. 
    The information posted on the Social Security Administration website for public view and access is in compliance with which legislation?
    • A. 

      Electronic Communications Privacy Act of 1986

    • B. 

      Electronic Freedom of Information Act of 1996

    • C. 

      Privacy Act of 1974

    • D. 

      Safety and Freedom through Encryption Act of 1999

  • 3. 
    Which act gives individuals the right to see information maintained about them?
    • A. 

      Electronic Communications Privacy Act of 1986

    • B. 

      Federal Information Security Management Act of 2002

    • C. 

      Consumer Credit Reporting Reform Act of 1996

    • D. 

      Privacy Act of 1974

  • 4. 
    Which describes a program designed to reproduce itself by copying itself into other programs without the user’s knowledge?
    • A. 

      A bug

    • B. 

      A reproduction

    • C. 

      A virus

    • D. 

      An infection

  • 5. 
    What is the primary numbers system used in computers?
    • A. 

      Base

    • B. 

      Binary

    • C. 

      Decimal

    • D. 

      Hexadecimal

  • 6. 
    How would a programming language that allows programs to run on any operating system be classified?
    • A. 

      High level

    • B. 

      Low level

    • C. 

      Medium level

    • D. 

      Very low level

  • 7. 
    The need to perform what tasks led to the development of the first mechanical devices?
    • A. 

      Mathematical computations

    • B. 

      Decision structures

    • C. 

      Logic

    • D. 

      Sequencing

  • 8. 
    Using a program to record transactions, phone calls and other personal information is what type of ethical consideration?
    • A. 

      Netiquette

    • B. 

      Online Profiling

    • C. 

      Phishing

    • D. 

      Privacy

  • 9. 
    Which statement best describes why the binary system is one of the four numbering systems used in computers?
    • A. 

      Computers can only process electronic pulses which are equivalent to on and off pulses of electricity.

    • B. 

      Computers do not have a brain so programmers must keep it simple in making conversions.

    • C. 

      Four digits can be used to show a large range of information by using the power of 2.

    • D. 

      The most significant digit to a computer is 0 so it is open to the flow of electricity.

  • 10. 
    The use of a hexadecimal numbering system in computers allows the computer to:
    • A. 

      Convert small numbers quickly.

    • B. 

      Represent small amounts of information in a large database.

    • C. 

      Store data with little room for error.

    • D. 

      Use less disk space in storing data.

  • 11. 
    Which law requires that a government authority have a subpoena, summons, or search warrant to access an individual’s financial records?
    • A. 

      Fair Use Act of 2007

    • B. 

      Right to Financial Privacy Acts of 1978

    • C. 

      Electronic Freedom of Information Act of 1996

    • D. 

      Fair Credit Reporting Act of 1970

  • 12. 
    Which act requires commercial websites that collect personal information from children under the age of 13 to obtain parental consent?
    • A. 

      Electronic Communications Privacy Act of 1986

    • B. 

      Children’s Online Privacy Protection Act of 1988 (COPPA)

    • C. 

      Right to Financial Privacy Act of 1978

    • D. 

      Consumer Credit Reporting Reform Act of 1996

  • 13. 
    What language does the code in this example represent?  fib: mov edx, [esp+8] cmp edx, 0 ja @f move ax, 0
    • A. 

      Assembly language

    • B. 

      C#

    • C. 

      Machine Language

    • D. 

      Visual Basic

  • 14. 
    What characteristic of electro-mechanical devices positively impacted their success?
    • A. 

      Binary numbers

    • B. 

      Electricity use

    • C. 

      Logic patterns

    • D. 

      Magnetic tape use

  • 15. 
    What did Ada Byron mean when she said that the Analytical Engine could never “originate anything”?
    • A. 

      A machine could not do calculations.

    • B. 

      A machine could not talk.

    • C. 

      A machine could not think.

    • D. 

      A machine could not make decisions.

  • 16. 
    What is the binary representation of the decimal 42?
    • A. 

      101011

    • B. 

      1000011

    • C. 

      110011

    • D. 

      101010

  • 17. 
    Jamie is careful to use non-offensive language and to be considerate of the feelings of others when she sends email messages. What does this behavior exemplify?
    • A. 

      Information age

    • B. 

      Netiquette

    • C. 

      Online Profiling

    • D. 

      Privacy

  • 18. 
    A computer program that stores the names of 5,000 customers for business would most likely be written in what language?
    • A. 

      BASIC

    • B. 

      COBOL

    • C. 

      Pascal

    • D. 

      SQL

  • 19. 
    Which statement best describes how World War II impacted computer development?
    • A. 

      The need for accuracy of military calculations for the trajectory of artillery shells led government to develop a computer.

    • B. 

      The need for navigational systems to steer troops to landings led to the development of sophisticated computers.

    • C. 

      The use of vacuum tubes in visual displays during WWI led to the use of tubes in computers.

    • D. 

      The use of wiring in WWI communication instruments led to a development of computers with wire houses.

  • 20. 
    What are the advantages of the Visual Basic language?
    • A. 

      Derived directly from COBOL and BASIC

    • B. 

      Hexadecimal code understood by the computer

    • C. 

      Runs only on Apple computers

    • D. 

      Simple, general-purpose, object-oriented

  • 21. 
    What is the decimal representation of the binary number 10001?
    • A. 

      15

    • B. 

      17

    • C. 

      16

    • D. 

      18

  • 22. 
    The Stepped Reckoner was never mass-produced because:
    • A. 

      No investor saw a need for these types of devices.

    • B. 

      The raw materials in mechanical devices were hard to find.

    • C. 

      It broke when used causing cost production issues.

    • D. 

      It frequently jammed or malfunctioned, causing data reliability issues.

  • 23. 
    Which act requires federal agencies to develop, document, and implement an agency-wide program to provide information security?
    • A. 

      Electronic Communications Privacy Act of 1986

    • B. 

      Federal Information Security Management Act of 2002

    • C. 

      Identity Theft Penalty Enhancement Act of 2004

    • D. 

      Privacy Act of 1974

  • 24. 
    What is the hexadecimal number 1A in binary form?
    • A. 

      10111

    • B. 

      11010

    • C. 

      11100

    • D. 

      11110

  • 25. 
    What is the decimal representation of the binary number 1100?
    • A. 

      12

    • B. 

      9

    • C. 

      10

    • D. 

      11

  • 26. 
    Which statement best explains the conversion of the binary number 1010 to a decimal number?
    • A. 

      1010 in binary equals 20 because 10 plus 10 equals 20 and binary means the value of every two numbers added together gives the decimal number.

    • B. 

      1010 in binary requires you to take the digits and add them together and raise them to the 10th power to get a decimal value so 210 is 1024 in decimal value.

    • C. 

      Moving from left to right, the first 1 is 23; the first 0 is 22; the second 1 is 21 and second 0 is 20 therefore the binary number is equal to the decimal number 10 because 23 = 8 and 21 = 2 and 8 plus 2 equals 10.

    • D. 

      Moving from left to right, the first 1 is 24; the first 0 is 23; the second 1 is 22 and second 0 is 21 therefore the binary number equals to the decimal number 10 because 24 = 16 and 22 = 2 and 16 plus 4 equals 20.

  • 27. 
    The best way to compare a binary number to a hexadecimal number is to convert:
    • A. 

      The binary number to a decimal number and then compare that to the hexadecimal number.

    • B. 

      The binary number to a hexadecimal number and compare that to the hexadecimal number.

    • C. 

      The hexadecimal number to a binary number and then to a decimal value to compare.

    • D. 

      The hexadecimal number to a decimal number and compare that to the binary number.

  • 28. 
    Which is a netiquette guideline?
    • A. 

      Never change your password.

    • B. 

      Access the account of another user.

    • C. 

      Do not attempt to access the account of another user without authorization.

    • D. 

      Share your password.

  • 29. 
    Which act gives law enforcement the ability to monitor individual’s email and web activity?
    • A. 

      Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001

    • B. 

      Right to Financial Privacy Act of 1978

    • C. 

      Consumer Credit Reporting Reform Act of 1996

    • D. 

      Privacy Act of 1974

  • 30. 
    When comparing third and fourth generation computers, which statement best summarizes the comparison?
    • A. 

      Fourth generation computers completely overhauled the third generation use of vacuum tubes.

    • B. 

      Fourth generation computers function primarily the same way as third generation computers with the exception of the larger size of computing boards.

    • C. 

      The inventions of integrated circuits in third generation computers led to the development of microprocessors in the fourth generation computers.

    • D. 

      Third generation computer’s silicon wafers led to a waffle housing of computers and reduced heat generation in fourth generation computers.

  • 31. 
    How would a programming language composed of hexadecimal numbers that will only run on an IBM computer be classified?
    • A. 

      High level

    • B. 

      Low level

    • C. 

      Medium level

    • D. 

      Very high level

  • 32. 
    To determine the level of the computer language, compare the language used to the:
    • A. 

      Abstractions the language contains from machine code of 0s and 1s

    • B. 

      Computer hardware being used.

    • C. 

      Modifications the language will handle.

    • D. 

      Number of variables in the language.

  • 33. 
    How does Visual Basic differ from BASIC?
    • A. 

      BASIC is a high-level language and Visual Basic is low-level.

    • B. 

      BASIC is a newer language than Visual Basic.

    • C. 

      Visual Basic is an object-oriented language and BASIC is not

    • D. 

      Visual Basic is easy to learn and BASIC is not.

  • 34. 
    Which project type is a desktop application run directly by the end user via forms appearing on the desktop?
    • A. 

      Common application

    • B. 

      Forms application

    • C. 

      User application

    • D. 

      Windows application

  • 35. 
    The interaction between the actor and the system can be best described as:
    • A. 

      Select Case.

    • B. 

      Use Case.

    • C. 

      User Case.

    • D. 

      User Application.

  • 36. 
    What does the example below represent?  1. Obtain two numbers from the user   2. Add the two numbers together   3. Print the two numbers
    • A. 

      Algorithm

    • B. 

      Coding

    • C. 

      Flowchart

    • D. 

      Pseudocode

  • 37. 
    Why is a comment used in Visual Basic?
    • A. 

      Allows the programmer to add documentation to a program

    • B. 

      Serves as a user guide

    • C. 

      Checks for logic errors

    • D. 

      Explains logic to the users

  • 38. 
    Which is not a characteristic of commenting?
    • A. 

      Comments can be on their own line or after a line of code

    • B. 

      Comments begin with a '.

    • C. 

      Comments begin with a ".

    • D. 

      Comments will turn the text green.

  • 39. 
    In flowchart symbols, which symbol shows the input/output?
    • A. 

      Parallelogram

    • B. 

      Rectangle

    • C. 

      Oval

    • D. 

      Diamond

  • 40. 
    What are the methods to show the steps to solve a problem?
    • A. 

      Algorithm, drawings, sequence

    • B. 

      Algorithm, flowcharts, pseudocode

    • C. 

      Algorithm, program code, structure

    • D. 

      Labels, flowcharts, pseudocode

  • 41. 
    How do algorithms and cooking recipes compare?
    • A. 

      Algorithms are long and recipes are short.

    • B. 

      Both are always easy to follow

    • C. 

      Both are sequences of instructions.

    • D. 

      Recipes are detailed and algorithms are not.

  • 42. 
    Which expresses the step-by-step instructions of an algorithm by using keywords, while depicting logical groupings or structures using indentation?
    • A. 

      A flowchart

    • B. 

      A StoryBoard

    • C. 

      Methods

    • D. 

      Pseudocode

  • 43. 
    What are multi-line comments called?
    • A. 

      Multiple line

    • B. 

      Block

    • C. 

      Single line

    • D. 

      Line

  • 44. 
    Why is a flowchart used to design a programming solution?
    • A. 

      To eliminate possible syntax errors in the program solution

    • B. 

      To input all code needed for programming the problem solution

    • C. 

      To minimize logic errors by graphically showing steps in the solution

    • D. 

      To show a list of all statements needed to solve the problem

  • 45. 
    Which of the choices below is not a Basic Control Structure?
    • A. 

      Simple sequence control structure

    • B. 

      Conditional control structure

    • C. 

      Iteration control structure

    • D. 

      Pseudocode control structure

  • 46. 
    The purpose of the Use Case is to:
    • A. 

      Define the interaction between the user and the program.

    • B. 

      Define the requirements that the software is intended to perform.

    • C. 

      Describe the operation of a block of code.

    • D. 

      Provide documentation to the next programmer.

  • 47. 
    What is a list of instructions that contain data for a computer to follow called?
    • A. 

      Computer program

    • B. 

      Algorithm

    • C. 

      Flowchart

    • D. 

      Pseudocode

  • 48. 
    What is a set of steps that create an ordered approach to a problem solution called?
    • A. 

      Pseudocode

    • B. 

      Flowcharting

    • C. 

      Algorithm

    • D. 

      Modularization

  • 49. 
    What is an acceptable comment for second line of the Visual Basic program below?  Private Sub Form_Load()      MessageBox.Show("Hello World!")   End Sub 
    • A. 

      !Execute a simple message box that will say "Hello, World!"

    • B. 

      //Execute a simple message box that will say "Hello, World!"

    • C. 

      ‘Execute a simple message box that will say "Hello, World!"

    • D. 

      Execute a simple message box that will say "Hello, World!"

  • 50. 
    Which is not an expectation for commenting?
    • A. 

      Not every line should be commented, but any line that performs an operation should be.

    • B. 

      Any line that causes confusion should be commented.

    • C. 

      Comment every line.

    • D. 

      At the top of the program, there should be comments on the purpose and scope of the program.

  • 51. 
    The text below is an example of what?Leave classroomTurn right out of school buildingWalk 1.2 milesTurn right on streetGo to 4th house
    • A. 

      Algorithm for driving to school from home

    • B. 

      Algorithm for walking from school to home

    • C. 

      Pseudocode for driving to school from home

    • D. 

      Pseudocode for walking from school to home

  • 52. 
    What best describes the output for the program designed below?Begin    sum= number1 + number2 + number3 + number4 +number5     avg= sum/5    Print avg End
    • A. 

      The average of six numbers

    • B. 

      The average of five numbers

    • C. 

      The comparison of five numbers

    • D. 

      The total sum of five numbers

  • 53. 
    Which design approach should be considered when several programs all require similar functionality?
    • A. 

      Menu

    • B. 

      Object-oriented

    • C. 

      Procedural

    • D. 

      Subclass

  • 54. 
    Why is documentation of programs important?
    • A. 

      It is required for successful compiling.

    • B. 

      Programs may not make sense without proper documentation.

    • C. 

      It turns the code blue.

    • D. 

      The compiler reads it and adds the documentation to the code.

  • 55. 
    What would best replace the “?” on Line 4 in the figure?  Begin     get x     get y     ?     sum= x + y + z     print sum   End 
    • A. 

      Get x + z

    • B. 

      Get z

    • C. 

      Print x

    • D. 

      Print y

  • 56. 
    What does the example below represent?  1. Obtain two numbers from the user      2. Add the two numbers together  3. Print the two numbers
    • A. 

      Algorithm

    • B. 

      Coding

    • C. 

      Flowchart

    • D. 

      Pseudocode

  • 57. 
    In flowchart symbols, which symbol represents the start and the end process?
    • A. 

      Parallelogram

    • B. 

      Rectangles

    • C. 

      Ovals

    • D. 

      Diamonds

  • 58. 
    Which step should not be taken when planning an application?
    • A. 

      Code the user interface.

    • B. 

      Design the user interface.

    • C. 

      Identify the events required to trigger an object into performing its assigned tasks.

    • D. 

      Identify the tasks the application needs to perform and the objects to which you will assign the tasks

  • 59. 
    In flowchart symbols, which symbol is used to show processes?
    • A. 

      Parallelogram

    • B. 

      Rectangle

    • C. 

      Oval

    • D. 

      Diamond

  • 60. 
    In flowchart symbols, which symbol is used to show decisions?
    • A. 

      Parallelogram

    • B. 

      Rectangle

    • C. 

      Oval

    • D. 

      Diamond

  • 61. 
    What is an advantage of using modularization in computer programming?
    • A. 

      Anyone who codes can work on the solution.

    • B. 

      Each sub-problem can be solved in a few steps.

    • C. 

      More programmers are required to solve the problem.

    • D. 

      More time can be spent programming the solution.

  • 62. 
    Tricia decided that the computer program she was designing should be coded in Visual Basic. She then began to code the program from her pseudocode. This exemplifies which stage in the programming process?
    • A. 

      Design the Solution

    • B. 

      Identify the Problem

    • C. 

      Test the Program

    • D. 

      Write the Program

  • 63. 
    The programming process begins with a meeting between the programmer and the client. Which activity would be the second step in the programming process?
    • A. 

      Designing the solution

    • B. 

      Documenting the solution

    • C. 

      Testing the solution

    • D. 

      Validating the design

  • 64. 
    The programming process begins with a meeting between the programmer and the client. Which of the following activities would be the third activity in the programming process?
    • A. 

      Test the program

    • B. 

      Write the program

    • C. 

      Design the solution

    • D. 

      Identify the problem