Omti IT Maintenence Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Dementedgiant
D
Dementedgiant
Community Contributor
Quizzes Created: 1 | Total Attempts: 47
Questions: 20 | Attempts: 47

SettingsSettingsSettings
Omti IT Maintenence Quiz - Quiz


This quiz is designed to test those who have taken my IT maintence class at Oaks Millennium. It covers Upgrading, Malware, Online security and fixing problems including blue screens of death.
Please feel free to take this quiz even if you have not attended the course :)


Questions and Answers
  • 1. 

     What internal computer component requires a heatsink and fan to prevent it from overheating

    • A.

      CPU

    • B.

      RAM

    • C.

      Motherboard

    • D.

      Hard Disk Drive

    • E.

      Graphics Card

    Correct Answer
    A. CPU
    Explanation
    The CPU (Central Processing Unit) is the internal computer component that requires a heatsink and fan to prevent it from overheating. The CPU generates a significant amount of heat during operation, and the heatsink and fan combination helps to dissipate this heat and maintain the CPU's temperature within safe limits. Without proper cooling, the CPU can overheat, leading to performance issues, system instability, and potential damage to the component.

    Rate this question:

  • 2. 

    1 Gigabyte is the equivilent of how many Megabytes?

    • A.

      100

    • B.

      124

    • C.

      1000

    • D.

      1024

    • E.

      1 Million

    Correct Answer
    D. 1024
    Explanation
    The correct answer is 1024 because 1 gigabyte is equal to 1024 megabytes. This is because computers use binary system for data storage, where each unit is a power of 2. Therefore, 1 gigabyte is equal to 2^10 megabytes, which equals 1024.

    Rate this question:

  • 3. 

    What does ROM Stand for?

    • A.

      Really Old Memory

    • B.

      Read On Memory

    • C.

      Retrievable Online Memory

    • D.

      Random Overun Memory

    • E.

      Read Only Memory

    Correct Answer
    E. Read Only Memory
    Explanation
    ROM stands for Read Only Memory. This type of memory is non-volatile, meaning it retains its data even when the power is turned off. It contains permanent instructions that the computer uses during startup. The data stored in ROM cannot be modified or erased, hence the term "Read Only." ROM is commonly used to store firmware, such as the BIOS in a computer, which provides the basic instructions for the hardware to function correctly.

    Rate this question:

  • 4. 

    Which slot on the motherboard would you place an up to date graphics card?

    • A.

      PCI Slot

    • B.

      PCI - E Slot

    • C.

      RAM Slot

    • D.

      SATA Slot

    • E.

      IDE Slot

    Correct Answer
    B. PCI - E Slot
    Explanation
    The correct answer is PCI-E Slot. This is because the PCI-E (Peripheral Component Interconnect Express) slot is specifically designed to accommodate high-performance graphics cards. It provides faster data transfer rates and more bandwidth compared to other slots like PCI or AGP. Therefore, to ensure optimal performance and compatibility, an up-to-date graphics card should be placed in the PCI-E slot on the motherboard.

    Rate this question:

  • 5. 

    Which of the following is NOT a form of malware?

    • A.

      Virus

    • B.

      Worm

    • C.

      Beetle

    • D.

      Trojan horse

    • E.

      Rogue dialler

    Correct Answer
    C. Beetle
    Explanation
    The given options are all types of malware except for "Beetle". A virus is a malicious program that can replicate and spread to other computers. A worm is a self-replicating program that can spread across networks. A Trojan horse is a program that appears harmless but actually contains malicious code. A rogue dialler is a type of malware that dials premium-rate phone numbers without the user's knowledge. However, "Beetle" is not a recognized form of malware.

    Rate this question:

  • 6. 

    Which of the following is NOT a brand of antivirus software?

    • A.

      Norton

    • B.

      McAfee

    • C.

      Kapersky

    • D.

      ZAP!

    • E.

      AVG

    Correct Answer
    D. ZAP!
    Explanation
    ZAP! is not a brand of antivirus software. The other options, Norton, McAfee, Kaspersky, and AVG, are well-known brands in the antivirus software industry. ZAP! does not have a presence in the antivirus software market and is not recognized as a reputable brand for providing antivirus protection.

    Rate this question:

  • 7. 

    A "keylogger" is what type of malware

    • A.

      Spyware

    • B.

      Adware

    • C.

      Virus

    • D.

      Worm

    • E.

      Trojan Horse

    Correct Answer
    A. Spyware
    Explanation
    A keylogger is a type of malware that secretly records keystrokes on a computer or mobile device. It is often used by hackers to steal sensitive information such as passwords, credit card numbers, and personal messages. Unlike adware, which displays unwanted advertisements, or viruses, worms, and Trojan horses, which can cause damage to a computer system, a keylogger primarily focuses on capturing keystrokes without the user's knowledge. Therefore, the correct answer is spyware.

    Rate this question:

  • 8. 

    What is the only LEGAL form of Malware?

    • A.

      Virus

    • B.

      Worm

    • C.

      Spyware

    • D.

      Adware

    • E.

      Trojan Horse

    Correct Answer
    D. Adware
    Explanation
    Adware is considered the only legal form of malware because it is a type of software that displays advertisements on a user's device. While it can be annoying and intrusive, it is not inherently malicious. Adware is often bundled with other software and installed without the user's knowledge, leading to its classification as malware. However, it is legal as long as it follows certain guidelines and obtains the user's consent for displaying advertisements.

    Rate this question:

  • 9. 

    What is SPAM?

    • A.

      A virus

    • B.

      An unwanted email

    • C.

      Spyware

    • D.

      A fatal error

    • E.

      A type of canned meat

    Correct Answer
    B. An unwanted email
    Explanation
    SPAM refers to unsolicited or unwanted emails sent in bulk to a large number of recipients. These emails are typically promotional or advertising in nature and are often sent without the consent of the recipients. SPAM emails can be annoying, time-consuming, and potentially harmful as they may contain phishing attempts or malicious links. Therefore, the correct answer is "An unwanted email."

    Rate this question:

  • 10. 

    Which of the following should NOT arouse suspicion that an email may be phish?

    • A.

      The email is not addressed to you

    • B.

      The email is from an organisation you have never dealt with

    • C.

      There is a threat to close your account

    • D.

      You are being asked to update your details

    • E.

      There is a link taking you to a site starting https://

    Correct Answer
    E. There is a link taking you to a site starting https://
    Explanation
    The use of HTTPS (Hypertext Transfer Protocol Secure) in a link indicates that the website is secure and encrypted, which helps protect sensitive information. Therefore, a link starting with HTTPS should not arouse suspicion that an email may be a phishing attempt. Phishing emails typically try to trick users into clicking on malicious links or providing personal information, so the presence of a secure link does not align with typical phishing tactics.

    Rate this question:

  • 11. 

    What is the type of software is used to repel hackers?

    • A.

      Waterwall

    • B.

      Airwall

    • C.

      Firewall

    • D.

      Earthwall

    • E.

      Wonderwall

    Correct Answer
    C. Firewall
    Explanation
    A firewall is a type of software that is used to repel hackers. It acts as a barrier between a trusted internal network and an untrusted external network, such as the internet. It monitors and controls incoming and outgoing network traffic based on predetermined security rules. By analyzing the data packets, a firewall can identify and block unauthorized access attempts, preventing hackers from gaining access to the network and compromising sensitive information.

    Rate this question:

  • 12. 

    If you send confidential information down an unsecured network, what should you do first?

    • A.

      Make a backup

    • B.

      Send information down a private connection

    • C.

      Encrypt it

    • D.

      Contact the intended recipient first

    • E.

      Send it with a timebomb program

    Correct Answer
    C. Encrypt it
    Explanation
    When sending confidential information down an unsecured network, the first step should be to encrypt the data. Encryption converts the information into a coded form that can only be deciphered with the appropriate decryption key. This ensures that even if the data is intercepted, it will be unreadable and protected from unauthorized access. Encrypting the information adds an extra layer of security and helps to safeguard sensitive data during transmission.

    Rate this question:

  • 13. 

    What should you clean internal components of a computer with?

    • A.

      Air Duster

    • B.

      Water

    • C.

      Damp cloth

    • D.

      Bleach

    • E.

      Metal polish

    Correct Answer
    A. Air Duster
    Explanation
    Air duster is the correct answer because it is specifically designed to clean internal components of a computer. It uses compressed air to blow away dust and debris from hard-to-reach areas without causing any damage. Water, damp cloth, bleach, and metal polish are not suitable for cleaning internal computer components as they can cause corrosion, short circuits, and damage to delicate electronic parts.

    Rate this question:

  • 14. 

    What is the purpose of Defragmenting your hard disk drive?

    • A.

      To make a back up

    • B.

      To get rid of viruses

    • C.

      To speed up your hard disk drive

    • D.

      To recover files you have deleted by accident

    • E.

      To stop your computer from being hacked

    Correct Answer
    C. To speed up your hard disk drive
    Explanation
    Defragmenting a hard disk drive is the process of reorganizing fragmented data on the drive, which can improve the overall speed and performance of the drive. Over time, as files are added, modified, and deleted, the data on the hard drive becomes fragmented and scattered across different locations. This fragmentation can slow down the read and write speeds of the drive, causing longer load times for files and applications. By defragmenting the drive, the data is rearranged and stored in contiguous blocks, allowing for faster access and improved performance.

    Rate this question:

  • 15. 

    Which of the following is NOT a good safety measure on a public network?

    • A.

      Changing your password regularly

    • B.

      Having at least one letter and one numerical digit in your password

    • C.

      Locking your computer when you leave it

    • D.

      Allowing your screen to be within the view of others

    • E.

      Regularly checking the activity of your account

    Correct Answer
    D. Allowing your screen to be within the view of others
    Explanation
    Allowing your screen to be within the view of others is not a good safety measure on a public network because it increases the risk of unauthorized individuals seeing sensitive information. This can lead to identity theft, unauthorized access to accounts, and other security breaches. It is important to keep your screen out of view to protect your personal and confidential information.

    Rate this question:

  • 16. 

    Where can you disable programs on booting up?

    • A.

      Control panel

    • B.

      Msconfig

    • C.

      Boot menu

    • D.

      BIOS

    • E.

      Registry

    Correct Answer
    B. Msconfig
    Explanation
    Msconfig is the correct answer because it is a utility tool in Windows that allows users to manage the startup programs and services. By accessing the System Configuration window through the "msconfig" command, users can disable unnecessary programs from starting up during the boot process. This helps to improve the system's performance and reduce the time taken for the computer to start up. The other options mentioned, such as Control Panel, Boot menu, BIOS, and Registry, are not specifically designed for disabling programs on booting up.

    Rate this question:

  • 17. 

    Which information does NOT appear on a blue screen of death?

    • A.

      File name

    • B.

      Stop code

    • C.

      Error code

    • D.

      Memory dump

    • E.

      Sim code

    Correct Answer
    E. Sim code
    Explanation
    The information that does NOT appear on a blue screen of death is the "Sim code". A blue screen of death (BSOD) is a system error screen displayed on Windows operating systems when a critical error occurs. It typically includes information such as the file name, stop code, error code, and memory dump. However, the "Sim code" is not a relevant or commonly used term in the context of a BSOD, hence it does not appear on the screen.

    Rate this question:

  • 18. 

    Which of the following CANNOT be done in Windows safe mode?

    • A.

      System restore

    • B.

      MSConfig

    • C.

      Regedit

    • D.

      Defrag

    • E.

      Microsoft Word

    Correct Answer
    E. Microsoft Word
    Explanation
    Microsoft Word cannot be used in Windows safe mode because safe mode is a diagnostic mode of Windows that loads only essential system files and drivers. It disables unnecessary programs and services, including Microsoft Office applications like Word. Safe mode is primarily used for troubleshooting and fixing system issues, so running applications like Word is not possible in this mode.

    Rate this question:

  • 19. 

    What is the first option on the Windows Advanced Options Menu that should be used if you spot a problem with your computer?

    • A.

      Safe Mode

    • B.

      Safe Mode with command prompt

    • C.

      Reboot

    • D.

      Last known good configuration

    • E.

      Start Windows Normally

    Correct Answer
    D. Last known good configuration
    Explanation
    The Last known good configuration option on the Windows Advanced Options Menu should be used if you spot a problem with your computer. This option allows you to start Windows using the most recent settings that worked correctly, which can be helpful in resolving issues caused by recent changes or updates. It essentially restores the computer to a previous state where it was functioning properly, without affecting any personal files or data.

    Rate this question:

  • 20. 

    What information is required from a credit card to take money out, but not put it into your account?

    • A.

      Credit card number (on front of card)

    • B.

      Card issuer (visa, mastercard, solo, etc.)

    • C.

      Card verification value (last 3 digits on back)

    • D.

      Issue number

    • E.

      Expiry month

    Correct Answer
    C. Card verification value (last 3 digits on back)
    Explanation
    To take money out from a credit card, the card verification value (last 3 digits on the back) is required. This value is used to verify the authenticity of the card during transactions. It is not necessary to have other information such as the credit card number, card issuer, issue number, or expiry month in order to withdraw money from the account.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jun 12, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 18, 2009
    Quiz Created by
    Dementedgiant
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.