Operating A Personal Computer - Icau1128b

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Annaj
A
Annaj
Community Contributor
Quizzes Created: 1 | Total Attempts: 298
Questions: 20 | Attempts: 298

SettingsSettingsSettings
Operating A Personal Computer - Icau1128b - Quiz

This quiz is to enable students to demonstrate their understandings of personal computer operations and provide physical evidence of their competency level.


Questions and Answers
  • 1. 

    Computer software is divided into two types, application software and

    • A.

      Running software

    • B.

      Microsoft software

    • C.

      System software

    • D.

      Apple software

    Correct Answer
    C. System software
    Explanation
    System software refers to the programs and operating systems that manage and control the computer hardware and other software applications. It provides a platform for running application software and ensures the smooth functioning of the computer system. Examples of system software include operating systems like Windows, macOS, and Linux, as well as device drivers and utility programs. In contrast, application software is designed for specific tasks and is used by users to perform various functions on a computer. Therefore, the answer "system software" is the correct choice as it accurately represents one of the two types of computer software mentioned in the question.

    Rate this question:

  • 2. 

    In order to access a secure network a user must have a

    • A.

      Password

    • B.

      User name

    • C.

      Pin number

    • D.

      User name and password

    Correct Answer
    D. User name and password
    Explanation
    To access a secure network, a user must have both a username and password. This is because a username identifies the user, while a password verifies their identity. By requiring both, the network ensures that only authorized individuals can gain access. A username alone is not sufficient as it can be easily guessed, while a password alone does not provide any information about the user. Therefore, the combination of a username and password is necessary for secure network access.

    Rate this question:

  • 3. 

    Occasionally files are accidentally deleted. If this occurs it may be possible to retrieve it from the

    • A.

      School student drive

    • B.

      The student swaps folder

    • C.

      the trash (Macintosh computer) recycling bin (Windows computer)

    • D.

      It is not possible

    Correct Answer
    C. the trash (Macintosh computer) recycling bin (Windows computer)
    Explanation
    When files are accidentally deleted on a Macintosh computer, they are moved to the trash bin. Similarly, on a Windows computer, deleted files are moved to the recycling bin. Therefore, if files are accidentally deleted, they can be retrieved from the trash or recycling bin depending on the operating system being used.

    Rate this question:

  • 4. 

    Program short-cuts can increase efficiency. Which of the following is NOT a short-cut that can be used to place a file in more than one location?

    • A.

      Ctrl-C

    • B.

      Left click - copy

    • C.

      CTRL -V

    • D.

      Right click - copy

    Correct Answer
    B. Left click - copy
    Explanation
    The left click - copy option is not a shortcut that can be used to place a file in more than one location. This option is typically used to select or highlight a file or text, but it does not have the capability to copy and place the file in multiple locations. On the other hand, Ctrl-C is a shortcut for copying, Ctrl-V is a shortcut for pasting, and right click - copy is a shortcut for copying a file or text. These shortcuts allow for quick and efficient file management by allowing users to duplicate files in different locations.

    Rate this question:

  • 5. 

    The initials RAM represent

    • A.

      Royal Australian Mail

    • B.

      Read Always Memory

    • C.

      Random Alert Memory

    • D.

      Random Access Memory

    Correct Answer
    D. Random Access Memory
    Explanation
    RAM stands for Random Access Memory. This is a type of computer memory that allows data to be stored and accessed in any order, rather than sequentially. It is called "random access" because the computer can directly access any memory location, regardless of its position in the memory. RAM is volatile memory, meaning that its contents are lost when the computer is turned off or restarted. It is used by the computer to temporarily store data that is actively being used, such as program instructions and data being processed.

    Rate this question:

  • 6. 

    There are many types of storage devices on the market. Which of the following is NOT commonly used today?

    • A.

      Floppy Disk

    • B.

      USB

    • C.

      DVD

    • D.

      External Hard Drive

    Correct Answer
    A. Floppy Disk
    Explanation
    Floppy disks are not commonly used today. They were popular in the past for storing and transferring data, but they have become obsolete due to their limited storage capacity and slow data transfer speeds. USB drives, DVDs, and external hard drives are all commonly used storage devices in modern times due to their larger storage capacities, faster data transfer speeds, and compatibility with various devices.

    Rate this question:

  • 7. 

    Computers have a number of ports which enable connection to a variety of devices

    • A.

      Parallel port

    • B.

      PS/2Port

    • C.

      Video card port

    • D.

      Power port

    Correct Answer
    D. Power port
    Explanation
    The power port on a computer is used to connect the device to a power source, such as a wall outlet or a power strip. This port allows the computer to receive the necessary electrical power to operate. Without a power port, the computer would not be able to turn on or function properly.

    Rate this question:

  • 8. 

    In many programs short-cuts use the same settings, on a Windows computer the short-cut CTRL-P will initiate the following action

    • A.

      Print the document

    • B.

      Print the screen

    • C.

      Paste the text

    • D.

      Paste the numbers

    Correct Answer
    A. Print the document
    Explanation
    The correct answer is "Print the document." In many programs, the shortcut CTRL-P is commonly used to initiate the printing action. This shortcut allows users to quickly and easily print the current document they are working on.

    Rate this question:

  • 9. 

    Electrical storms can adversely affect computers. During an electrical storm all computer hardware must be

    • A.

      Left running

    • B.

      Shutdown and disconnected from any power or communications sources

    • C.

      Just the monitor should be turned off

    • D.

      The system box should be turned off and all the other hardware left running

    Correct Answer
    B. Shutdown and disconnected from any power or communications sources
    Explanation
    During an electrical storm, there is a risk of power surges or lightning strikes that can damage computer hardware. Therefore, it is necessary to shut down the computer and disconnect it from any power or communication sources to protect it from potential damage.

    Rate this question:

  • 10. 

    When you have finished a session on a computer you must always

    • A.

      Shut down the computer

    • B.

      Log-off the computer

    • C.

      Log-in to the computer

    • D.

      Lock the computer

    Correct Answer
    B. Log-off the computer
    Explanation
    When you have finished a session on a computer, you should log-off the computer. Logging off ensures that you end your session and all your programs and files are closed properly. It also protects your personal information and prevents unauthorized access to your account. Logging off is different from shutting down the computer, as shutting down completely turns off the computer, while logging off allows other users to log in and use the computer without losing any unsaved work.

    Rate this question:

  • 11. 

    There are a number of computer operating systems Which of the following is NOT and operating system

    • A.

      Mac OSX

    • B.

      Unix

    • C.

      Tehan

    • D.

      Windows 7

    Correct Answer
    C. Tehan
    Explanation
    Tehan is not an operating system. Mac OSX, Unix, and Windows 7 are all examples of operating systems commonly used in computers. However, Tehan is not a recognized operating system in the field of computer science.

    Rate this question:

  • 12. 

    A monitor can also be referred to as

    • A.

      TV

    • B.

      VDU

    • C.

      Display Board

    • D.

      Screen

    Correct Answer
    B. VDU
    Explanation
    A monitor can also be referred to as a VDU, which stands for Visual Display Unit. This term is commonly used in the computer industry to describe the device that displays visual output from a computer or other electronic device. The term "monitor" is often used interchangeably with VDU, as they both refer to the same thing. Other terms listed, such as TV, Display Board, and Screen, can also be used to describe a monitor, but VDU is the most specific and commonly used term in this context.

    Rate this question:

  • 13. 

    When processing information with a computer there are four main actions undertaken, which is the correct order

    • A.

      Input, Output, Processing, Storage

    • B.

      Output, Processing, Storage, Input

    • C.

      Input, Storage, Output, Processing

    • D.

      Input, Processing, Storage, Output

    Correct Answer
    D. Input, Processing, Storage, Output
    Explanation
    The correct order of the four main actions undertaken when processing information with a computer is input, processing, storage, and output. This order makes logical sense as input refers to the data or information that is entered into the computer, processing involves manipulating or analyzing the input data, storage is where the processed data is stored for future use, and finally, output refers to the result or display of the processed data.

    Rate this question:

  • 14. 

    Computer hardware is made up of three types of hardware, which listed below is not a piece of computer hardware?

    • A.

      Internal peripherals

    • B.

      External peripherals

    • C.

      System unit

    • D.

      Software

    Correct Answer
    D. Software
    Explanation
    Software is not a piece of computer hardware because it refers to the programs, applications, and instructions that run on the hardware. While hardware refers to the physical components of a computer system, software is intangible and consists of code and data that enable the hardware to perform specific tasks. Therefore, software is not considered a type of computer hardware.

    Rate this question:

  • 15. 

    To allow easy and efficient identification of files, you should applysome basic principles when saving. Which one listed is incorrect?

    • A.

      Stores files in folders

    • B.

      Stores files in sub-folders

    • C.

      Names files appropriately

    • D.

      Accept the suggested file name the software gives you

    Correct Answer
    D. Accept the suggested file name the software gives you
    Explanation
    Accepting the suggested file name given by the software is incorrect because it may not accurately describe the content of the file or follow any naming conventions that you have established. It is important to name files appropriately so that they can be easily identified and organized. Storing files in folders and sub-folders further helps in efficient identification and retrieval of files.

    Rate this question:

  • 16. 

    If you want to close a program on A Macintosh computer

    • A.

      Click on the red box with an x at the top left of the screen

    • B.

      Click on the red box with an x at the top right of the screen

    • C.

      Click on the start icon at the bottom of the screen and choose shut down

    • D.

      Hold in the power button on the back of the computer

    Correct Answer
    A. Click on the red box with an x at the top left of the screen
    Explanation
    To close a program on a Macintosh computer, you need to click on the red box with an "x" at the top left of the screen. This is the standard location for the close button in Mac applications. By clicking on this button, you will close the active program and remove it from the screen.

    Rate this question:

  • 17. 

    Which of the following programs is a part of the Microsoft Office Suite

    • A.

      Gamemaker

    • B.

      AUTOCAD

    • C.

      Publisher

    • D.

      Movie Maker

    Correct Answer
    C. Publisher
    Explanation
    Publisher is a part of the Microsoft Office Suite. It is a desktop publishing program that allows users to create professional-looking publications such as brochures, flyers, and newsletters. It offers a wide range of templates, design tools, and formatting options to create visually appealing documents. Publisher is commonly used for marketing materials and business publications.

    Rate this question:

  • 18. 

    Data on a computer is stored in Bits and Bytes. Which is the largest unit of measurement for computer data?

    • A.

      Megabyte (MB)

    • B.

      Petabyte (PB)

    • C.

      Kilobyte (KB)

    • D.

      Gigabyte (GB)

    Correct Answer
    B. Petabyte (PB)
    Explanation
    The largest unit of measurement for computer data is the Petabyte (PB). A Petabyte is equivalent to 1,000 Terabytes or 1,000,000 Gigabytes. It is used to measure extremely large amounts of data, such as in big data analytics, scientific research, or large-scale storage systems.

    Rate this question:

  • 19. 

    Which of the following is NOT an input device

    • A.

      Mouse

    • B.

      Track-ball mouse

    • C.

      Monitor

    • D.

      Keyboard

    Correct Answer
    C. Monitor
    Explanation
    A monitor is not an input device as it is used to display output from the computer rather than to input data or commands. Input devices are used to provide input to the computer, such as the mouse, track-ball mouse, and keyboard. The monitor, on the other hand, is an output device that displays the results of the computer's processing.

    Rate this question:

  • 20. 

    Which of the following a peripheral devices can be used independently of a computer?

    • A.

      Mouse

    • B.

      Mobile phone

    • C.

      USB

    • D.

      Web cam

    Correct Answer
    B. Mobile pHone
    Explanation
    A mobile phone can be used independently of a computer because it is a standalone device that can make calls, send messages, access the internet, and perform various other functions without needing to be connected to a computer. Unlike the other options listed, a mobile phone does not require a computer as a host or a means of functioning. It has its own operating system and can operate on its own, making it a peripheral device that can be used independently.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 13, 2010
    Quiz Created by
    Annaj
Back to Top Back to top
Advertisement