Everything Computer: Advanced Trivia Quiz

64 Questions | Attempts: 751
Share

SettingsSettingsSettings
Everything Computer: Advanced Trivia Quiz - Quiz

Below is an everything Computer: Advanced Trivia. Do you think that you have adequate knowledge of computers to tackle it? Well do give it a try and if you don’t pass at least, you will have a lot of things that you can learn from it. All the best and look out for other quizzes just like it. Feel free to take it more than one time.


Questions and Answers
  • 1. 

    Why were magnetic tapes used to replace punch cards in second generation computers?

    • A.

      Increased computer memory

    • B.

      Increased cost of production

    • C.

      Increased manual labor

    • D.

      Increased reliability Increased reliability

    Correct Answer
    D. Increased reliability Increased reliability
  • 2. 

    The information posted on the Social Security Administration website for public view and access is in compliance with which legislation?

    • A.

      Electronic Communications Privacy Act of 1986

    • B.

      Electronic Freedom of Information Act of 1996

    • C.

      Privacy Act of 1974

    • D.

      Safety and Freedom through Encryption Act of 1999

    Correct Answer
    B. Electronic Freedom of Information Act of 1996
  • 3. 

    Which act gives individuals the right to see information maintained about them?

    • A.

      Electronic Communications Privacy Act of 1986

    • B.

      Federal Information Security Management Act of 2002

    • C.

      Consumer Credit Reporting Reform Act of 1996

    • D.

      Privacy Act of 1974

    Correct Answer
    C. Consumer Credit Reporting Reform Act of 1996
  • 4. 

    Which describes a program designed to reproduce itself by copying itself into other programs without the user’s knowledge?

    • A.

      A bug

    • B.

      A reproduction

    • C.

      A virus

    • D.

      An infection

    Correct Answer
    C. A virus
  • 5. 

    What is the primary numbers system used in computers?

    • A.

      Base

    • B.

      Binary

    • C.

      Decimal

    • D.

      Hexadecimal

    Correct Answer
    B. Binary
  • 6. 

    How would a programming language that allows programs to run on any operating system be classified?

    • A.

      High level

    • B.

      Low level

    • C.

      Medium level

    • D.

      Very low level

    Correct Answer
    A. High level
  • 7. 

    The need to perform what tasks led to the development of the first mechanical devices?

    • A.

      Mathematical computations

    • B.

      Decision structures

    • C.

      Logic

    • D.

      Sequencing

    Correct Answer
    A. Mathematical computations
  • 8. 

    Using a program to record transactions, phone calls and other personal information is what type of ethical consideration?

    • A.

      Netiquette

    • B.

      Online Profiling

    • C.

      Phishing

    • D.

      Privacy

    Correct Answer
    D. Privacy
  • 9. 

    Which statement best describes why the binary system is one of the four numbering systems used in computers?

    • A.

      Computers can only process electronic pulses which are equivalent to on and off pulses of electricity.

    • B.

      Computers do not have a brain so programmers must keep it simple in making conversions.

    • C.

      Four digits can be used to show a large range of information by using the power of 2.

    • D.

      The most significant digit to a computer is 0 so it is open to the flow of electricity.

    Correct Answer
    A. Computers can only process electronic pulses which are equivalent to on and off pulses of electricity.
  • 10. 

    The use of a hexadecimal numbering system in computers allows the computer to:

    • A.

      Convert small numbers quickly.

    • B.

      Represent small amounts of information in a large database.

    • C.

      Store data with little room for error.

    • D.

      Use less disk space in storing data.

    Correct Answer
    D. Use less disk space in storing data.
  • 11. 

    Which law requires that a government authority have a subpoena, summons, or search warrant to access an individual’s financial records?

    • A.

      Fair Use Act of 2007

    • B.

      Right to Financial Privacy Acts of 1978

    • C.

      Electronic Freedom of Information Act of 1996

    • D.

      Fair Credit Reporting Act of 1970

    Correct Answer
    B. Right to Financial Privacy Acts of 1978
  • 12. 

    Which act requires commercial websites that collect personal information from children under the age of 13 to obtain parental consent?

    • A.

      Electronic Communications Privacy Act of 1986

    • B.

      Children’s Online Privacy Protection Act of 1988 (COPPA)

    • C.

      Right to Financial Privacy Act of 1978

    • D.

      Consumer Credit Reporting Reform Act of 1996

    Correct Answer
    B. Children’s Online Privacy Protection Act of 1988 (COPPA)
  • 13. 

    What language does the code in this example represent?  fib: mov edx, [esp+8] cmp edx, 0 ja @f move ax, 0

    • A.

      Assembly language

    • B.

      C#

    • C.

      Machine Language

    • D.

      Visual Basic

    Correct Answer
    A. Assembly language
  • 14. 

    What characteristic of electro-mechanical devices positively impacted their success?

    • A.

      Binary numbers

    • B.

      Electricity use

    • C.

      Logic patterns

    • D.

      Magnetic tape use

    Correct Answer
    B. Electricity use
  • 15. 

    What did Ada Byron mean when she said that the Analytical Engine could never “originate anything”?

    • A.

      A machine could not do calculations.

    • B.

      A machine could not talk.

    • C.

      A machine could not think.

    • D.

      A machine could not make decisions.

    Correct Answer
    C. A machine could not think.
  • 16. 

    What is the binary representation of the decimal 42?

    • A.

      101011

    • B.

      1000011

    • C.

      110011

    • D.

      101010

    Correct Answer
    D. 101010
  • 17. 

    Jamie is careful to use non-offensive language and to be considerate of the feelings of others when she sends email messages. What does this behavior exemplify?

    • A.

      Information age

    • B.

      Netiquette

    • C.

      Online Profiling

    • D.

      Privacy

    Correct Answer
    B. Netiquette
  • 18. 

    A computer program that stores the names of 5,000 customers for business would most likely be written in what language?

    • A.

      BASIC

    • B.

      COBOL

    • C.

      Pascal

    • D.

      SQL

    Correct Answer
    D. SQL
  • 19. 

    Which statement best describes how World War II impacted computer development?

    • A.

      The need for accuracy of military calculations for the trajectory of artillery shells led government to develop a computer.

    • B.

      The need for navigational systems to steer troops to landings led to the development of sophisticated computers.

    • C.

      The use of vacuum tubes in visual displays during WWI led to the use of tubes in computers.

    • D.

      The use of wiring in WWI communication instruments led to a development of computers with wire houses.

    Correct Answer
    A. The need for accuracy of military calculations for the trajectory of artillery shells led government to develop a computer.
  • 20. 

    What are the advantages of the Visual Basic language?

    • A.

      Derived directly from COBOL and BASIC

    • B.

      Hexadecimal code understood by the computer

    • C.

      Runs only on Apple computers

    • D.

      Simple, general-purpose, object-oriented

    Correct Answer
    D. Simple, general-purpose, object-oriented
  • 21. 

    What is the decimal representation of the binary number 10001?

    • A.

      15

    • B.

      17

    • C.

      16

    • D.

      18

    Correct Answer
    B. 17
  • 22. 

    The Stepped Reckoner was never mass-produced because:

    • A.

      No investor saw a need for these types of devices.

    • B.

      The raw materials in mechanical devices were hard to find.

    • C.

      It broke when used causing cost production issues.

    • D.

      It frequently jammed or malfunctioned, causing data reliability issues.

    Correct Answer
    D. It frequently jammed or malfunctioned, causing data reliability issues.
  • 23. 

    Which act requires federal agencies to develop, document, and implement an agency-wide program to provide information security?

    • A.

      Electronic Communications Privacy Act of 1986

    • B.

      Federal Information Security Management Act of 2002

    • C.

      Identity Theft Penalty Enhancement Act of 2004

    • D.

      Privacy Act of 1974

    Correct Answer
    B. Federal Information Security Management Act of 2002
  • 24. 

    What is the hexadecimal number 1A in binary form?

    • A.

      10111

    • B.

      11010

    • C.

      11100

    • D.

      11110

    Correct Answer
    B. 11010
  • 25. 

    What is the decimal representation of the binary number 1100?

    • A.

      12

    • B.

      9

    • C.

      10

    • D.

      11

    Correct Answer
    A. 12
  • 26. 

    Which statement best explains the conversion of the binary number 1010 to a decimal number?

    • A.

      1010 in binary equals 20 because 10 plus 10 equals 20 and binary means the value of every two numbers added together gives the decimal number.

    • B.

      1010 in binary requires you to take the digits and add them together and raise them to the 10th power to get a decimal value so 210 is 1024 in decimal value.

    • C.

      Moving from left to right, the first 1 is 23; the first 0 is 22; the second 1 is 21 and second 0 is 20 therefore the binary number is equal to the decimal number 10 because 23 = 8 and 21 = 2 and 8 plus 2 equals 10.

    • D.

      Moving from left to right, the first 1 is 24; the first 0 is 23; the second 1 is 22 and second 0 is 21 therefore the binary number equals to the decimal number 10 because 24 = 16 and 22 = 2 and 16 plus 4 equals 20.

    Correct Answer
    C. Moving from left to right, the first 1 is 23; the first 0 is 22; the second 1 is 21 and second 0 is 20 therefore the binary number is equal to the decimal number 10 because 23 = 8 and 21 = 2 and 8 plus 2 equals 10.
  • 27. 

    The best way to compare a binary number to a hexadecimal number is to convert:

    • A.

      The binary number to a decimal number and then compare that to the hexadecimal number.

    • B.

      The binary number to a hexadecimal number and compare that to the hexadecimal number.

    • C.

      The hexadecimal number to a binary number and then to a decimal value to compare.

    • D.

      The hexadecimal number to a decimal number and compare that to the binary number.

    Correct Answer
    B. The binary number to a hexadecimal number and compare that to the hexadecimal number.
  • 28. 

    Which is a netiquette guideline?

    • A.

      Never change your password.

    • B.

      Access the account of another user.

    • C.

      Do not attempt to access the account of another user without authorization.

    • D.

      Share your password.

    Correct Answer
    C. Do not attempt to access the account of another user without authorization.
  • 29. 

    Which act gives law enforcement the ability to monitor individual’s email and web activity?

    • A.

      Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001

    • B.

      Right to Financial Privacy Act of 1978

    • C.

      Consumer Credit Reporting Reform Act of 1996

    • D.

      Privacy Act of 1974

    Correct Answer
    A. Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001
  • 30. 

    When comparing third and fourth generation computers, which statement best summarizes the comparison?

    • A.

      Fourth generation computers completely overhauled the third generation use of vacuum tubes.

    • B.

      Fourth generation computers function primarily the same way as third generation computers with the exception of the larger size of computing boards.

    • C.

      The inventions of integrated circuits in third generation computers led to the development of microprocessors in the fourth generation computers.

    • D.

      Third generation computer’s silicon wafers led to a waffle housing of computers and reduced heat generation in fourth generation computers.

    Correct Answer
    C. The inventions of integrated circuits in third generation computers led to the development of microprocessors in the fourth generation computers.
  • 31. 

    How would a programming language composed of hexadecimal numbers that will only run on an IBM computer be classified?

    • A.

      High level

    • B.

      Low level

    • C.

      Medium level

    • D.

      Very high level

    Correct Answer
    B. Low level
  • 32. 

    To determine the level of the computer language, compare the language used to the:

    • A.

      Abstractions the language contains from machine code of 0s and 1s

    • B.

      Computer hardware being used.

    • C.

      Modifications the language will handle.

    • D.

      Number of variables in the language.

    Correct Answer
    A. Abstractions the language contains from machine code of 0s and 1s
  • 33. 

    How does Visual Basic differ from BASIC?

    • A.

      BASIC is a high-level language and Visual Basic is low-level.

    • B.

      BASIC is a newer language than Visual Basic.

    • C.

      Visual Basic is an object-oriented language and BASIC is not

    • D.

      Visual Basic is easy to learn and BASIC is not.

    Correct Answer
    C. Visual Basic is an object-oriented language and BASIC is not
  • 34. 

    Which project type is a desktop application run directly by the end user via forms appearing on the desktop?

    • A.

      Common application

    • B.

      Forms application

    • C.

      User application

    • D.

      Windows application

    Correct Answer
    D. Windows application
  • 35. 

    The interaction between the actor and the system can be best described as:

    • A.

      Select Case.

    • B.

      Use Case.

    • C.

      User Case.

    • D.

      User Application.

    Correct Answer
    B. Use Case.
  • 36. 

    What does the example below represent?  1. Obtain two numbers from the user   2. Add the two numbers together   3. Print the two numbers

    • A.

      Algorithm

    • B.

      Coding

    • C.

      Flowchart

    • D.

      Pseudocode

    Correct Answer
    A. Algorithm
  • 37. 

    Why is a comment used in Visual Basic?

    • A.

      Allows the programmer to add documentation to a program

    • B.

      Serves as a user guide

    • C.

      Checks for logic errors

    • D.

      Explains logic to the users

    Correct Answer
    A. Allows the programmer to add documentation to a program
  • 38. 

    Which is not a characteristic of commenting?

    • A.

      Comments can be on their own line or after a line of code

    • B.

      Comments begin with a '.

    • C.

      Comments begin with a ".

    • D.

      Comments will turn the text green.

    Correct Answer
    C. Comments begin with a ".
  • 39. 

    In flowchart symbols, which symbol shows the input/output?

    • A.

      Parallelogram

    • B.

      Rectangle

    • C.

      Oval

    • D.

      Diamond

    Correct Answer
    A. Parallelogram
  • 40. 

    What are the methods to show the steps to solve a problem?

    • A.

      Algorithm, drawings, sequence

    • B.

      Algorithm, flowcharts, pseudocode

    • C.

      Algorithm, program code, structure

    • D.

      Labels, flowcharts, pseudocode

    Correct Answer
    B. Algorithm, flowcharts, pseudocode
  • 41. 

    How do algorithms and cooking recipes compare?

    • A.

      Algorithms are long and recipes are short.

    • B.

      Both are always easy to follow

    • C.

      Both are sequences of instructions.

    • D.

      Recipes are detailed and algorithms are not.

    Correct Answer
    C. Both are sequences of instructions.
  • 42. 

    Which expresses the step-by-step instructions of an algorithm by using keywords, while depicting logical groupings or structures using indentation?

    • A.

      A flowchart

    • B.

      A StoryBoard

    • C.

      Methods

    • D.

      Pseudocode

    Correct Answer
    D. Pseudocode
  • 43. 

    What are multi-line comments called?

    • A.

      Multiple line

    • B.

      Block

    • C.

      Single line

    • D.

      Line

    Correct Answer
    B. Block
  • 44. 

    Why is a flowchart used to design a programming solution?

    • A.

      To eliminate possible syntax errors in the program solution

    • B.

      To input all code needed for programming the problem solution

    • C.

      To minimize logic errors by graphically showing steps in the solution

    • D.

      To show a list of all statements needed to solve the problem

    Correct Answer
    C. To minimize logic errors by graphically showing steps in the solution
  • 45. 

    Which of the choices below is not a Basic Control Structure?

    • A.

      Simple sequence control structure

    • B.

      Conditional control structure

    • C.

      Iteration control structure

    • D.

      Pseudocode control structure

    Correct Answer
    D. Pseudocode control structure
  • 46. 

    The purpose of the Use Case is to:

    • A.

      Define the interaction between the user and the program.

    • B.

      Define the requirements that the software is intended to perform.

    • C.

      Describe the operation of a block of code.

    • D.

      Provide documentation to the next programmer.

    Correct Answer
    A. Define the interaction between the user and the program.
  • 47. 

    What is a list of instructions that contain data for a computer to follow called?

    • A.

      Computer program

    • B.

      Algorithm

    • C.

      Flowchart

    • D.

      Pseudocode

    Correct Answer
    A. Computer program
  • 48. 

    What is a set of steps that create an ordered approach to a problem solution called?

    • A.

      Pseudocode

    • B.

      Flowcharting

    • C.

      Algorithm

    • D.

      Modularization

    Correct Answer
    C. Algorithm
  • 49. 

    What is an acceptable comment for second line of the Visual Basic program below?  Private Sub Form_Load()      MessageBox.Show("Hello World!")   End Sub 

    • A.

      !Execute a simple message box that will say "Hello, World!"

    • B.

      //Execute a simple message box that will say "Hello, World!"

    • C.

      ‘Execute a simple message box that will say "Hello, World!"

    • D.

      Execute a simple message box that will say "Hello, World!"

    Correct Answer
    C. ‘Execute a simple message box that will say "Hello, World!"
  • 50. 

    Which is not an expectation for commenting?

    • A.

      Not every line should be commented, but any line that performs an operation should be.

    • B.

      Any line that causes confusion should be commented.

    • C.

      Comment every line.

    • D.

      At the top of the program, there should be comments on the purpose and scope of the program.

    Correct Answer
    C. Comment every line.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 09, 2017
    Quiz Created by
    Edudzi4k
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.