Computer Trivia: MCQ Quiz!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Cambronbill3
C
Cambronbill3
Community Contributor
Quizzes Created: 2496 | Total Attempts: 1,062,768
Questions: 15 | Attempts: 264

SettingsSettingsSettings
Computer Trivia: MCQ Quiz! - Quiz

.


Questions and Answers
  • 1. 

    What device regenerates a wireless network signal to extend the range of the network?

    • A.

      Repeater

    • B.

      Revolver

    • C.

      Port Cloner

    • D.

      Packet Duplicator

    Correct Answer
    A. Repeater
    Explanation
    A repeater is a device that amplifies and retransmits a wireless signal, extending the range of a network. It receives the weak signal from the router and then boosts it to increase the coverage area. This allows devices that are located farther away from the router to connect to the network and access the internet. A repeater is commonly used in large homes, offices, or outdoor areas where the wireless signal needs to reach a greater distance.

    Rate this question:

  • 2. 

    What name is given to the practice of giving a deceptive IP original in a transmission?

    • A.

      Munging

    • B.

      Wardriving

    • C.

      Phreaking

    • D.

      Spoofing

    Correct Answer
    D. Spoofing
    Explanation
    Spoofing is the correct answer because it refers to the practice of giving a deceptive IP original in a transmission. It involves disguising the true source or identity of a communication to deceive the recipient. Spoofing can be used for various malicious purposes, such as phishing attacks, email scams, or impersonating legitimate websites. It is a common technique employed by hackers to gain unauthorized access or deceive users into providing sensitive information.

    Rate this question:

  • 3. 

    In network security, "VPN" refers to what type of setup?

    • A.

      Very Private Network

    • B.

      Virtual Private Network

    • C.

      Vector Privacy Network

    • D.

      Virtual Port Normalization

    Correct Answer
    B. Virtual Private Network
    Explanation
    A VPN refers to a Virtual Private Network. This type of setup allows for secure and private communication over a public network, such as the internet. It creates a virtual tunnel that encrypts data and protects it from unauthorized access. This is commonly used by individuals and organizations to ensure their online activities and sensitive information are kept private and secure.

    Rate this question:

  • 4. 

    In 2008, programmers got busy creating content for which iPhone vendor's App Store?

    • A.

      Microsoft's

    • B.

      IBM's

    • C.

      Apple's

    • D.

      Intel's

    Correct Answer
    C. Apple's
    Explanation
    In 2008, programmers were busy creating content for Apple's App Store. This is because the question specifically mentions the iPhone vendor's App Store, and Apple is the vendor of the iPhone. Apple's App Store was launched in 2008, and it quickly became a popular platform for developers to create and distribute their applications for iPhone users.

    Rate this question:

  • 5. 

    Which of these terms refers to high-bandwidth, always-on internet connections?

    • A.

      Widgets

    • B.

      WYSIWYG

    • C.

      Broadband

    • D.

      Bluetooth

    Correct Answer
    C. Broadband
    Explanation
    Broadband refers to high-bandwidth, always-on internet connections. It is a term used to describe the type of internet connection that provides fast and continuous access to the internet. Unlike dial-up connections, broadband connections allow for the simultaneous transmission of multiple data signals, resulting in faster and more efficient internet browsing, downloading, and streaming. Bluetooth, widgets, and WYSIWYG are not related to high-bandwidth internet connections.

    Rate this question:

  • 6. 

    What term refers to a bare-bones, small-scale laptop primarily intended for internet use?

    • A.

      YugoLaptop

    • B.

      Netware

    • C.

      Netbook

    • D.

      SparePart

    Correct Answer
    C. Netbook
    Explanation
    A netbook is a term used to describe a bare-bones, small-scale laptop that is primarily designed for internet use. It is a lightweight and compact device that typically has limited processing power and storage capacity. Netbooks were popular in the early 2000s as a more affordable and portable alternative to traditional laptops. However, with the rise of tablets and smartphones, the popularity of netbooks has declined in recent years.

    Rate this question:

  • 7. 

    Which university was the first to offer a degree in computer science?

    • A.

      Cal Tech

    • B.

      MIT

    • C.

      Purdue

    • D.

      Michigan Technological University

    Correct Answer
    C. Purdue
    Explanation
    Purdue University was the first to offer a degree in computer science. This means that they were the first university to provide a formal program of study specifically focused on computer science. Cal Tech, MIT, and Michigan Technological University may also have computer science programs, but Purdue was the first to offer a degree in this field.

    Rate this question:

  • 8. 

    In 1996, what online company did Sears own part of?

    • A.

      Prodigy

    • B.

      America Online

    • C.

      Compuserve

    • D.

      Microsoft Network

    Correct Answer
    A. Prodigy
    Explanation
    In 1996, Sears owned part of Prodigy, an online company. Prodigy was one of the early pioneers in the internet industry, offering dial-up internet access and a range of online services such as email, news, and shopping. By investing in Prodigy, Sears aimed to tap into the growing online market and expand its reach in the digital space. However, Prodigy faced stiff competition from other online companies like America Online, Compuserve, and Microsoft Network, which eventually led to its decline in the late 1990s.

    Rate this question:

  • 9. 

    From which school did 1989's infamous "Internet Worm" originate?

    • A.

      Carnegie Mellon University

    • B.

      Cornell University

    • C.

      CalTech

    • D.

      MIT

    Correct Answer
    B. Cornell University
    Explanation
    The 1989 "Internet Worm" originated from Cornell University.

    Rate this question:

  • 10. 

    How do Nostradamus and Michelangelo influence computers?

    • A.

      They Are Two Companies Named After The Historical Personalities

    • B.

      They Are Both Names Of Viruses That Crash The Computer

    • C.

      They Both Predicted The Invention Of Computers

    • D.

      They Both Sketched Pictures That Babbage Used To Build The Analytical Engine

    Correct Answer
    B. They Are Both Names Of Viruses That Crash The Computer
    Explanation
    Nostradamus and Michelangelo are both names of viruses that crash the computer. This means that these two names are associated with computer viruses that can cause the computer to malfunction or crash.

    Rate this question:

  • 11. 

    What is the name of the organization that registers internet addresses?

    • A.

      Department Of Defense

    • B.

      FCC

    • C.

      InterNIC

    • D.

      CERN

    Correct Answer
    C. InterNIC
    Explanation
    InterNIC is the correct answer because it was the organization responsible for registering internet addresses during the early years of the internet. InterNIC, short for Internet Network Information Center, was a collaborative project between the National Science Foundation (NSF), the Defense Advanced Research Projects Agency (DARPA), and Network Solutions, Inc. It played a crucial role in managing domain names, IP addresses, and other internet resources. While the Department of Defense and FCC have important roles in internet regulation and oversight, they are not directly involved in registering internet addresses. CERN, on the other hand, is a European research organization focused on particle physics and is not involved in internet address registration.

    Rate this question:

  • 12. 

    Who invented HTML?

    • A.

      Bill Gates

    • B.

      Dennis Ritchie

    • C.

      Tim Berners-Lee

    • D.

      Bjarne Stroustrup

    Correct Answer
    C. Tim Berners-Lee
    Explanation
    Tim Berners-Lee is the correct answer for the question. He is credited with inventing HTML (Hypertext Markup Language) in the late 1980s while working at CERN. HTML is the standard markup language used for creating web pages and is the backbone of the World Wide Web. Berners-Lee's invention revolutionized the way information is shared and accessed on the internet, making it accessible to a wide audience.

    Rate this question:

  • 13. 

    What was the acronym used to refer to the first large-scale electronic computer?

    • A.

      Commodore

    • B.

      UNIVAC

    • C.

      ENIAC

    • D.

      VAC370

    Correct Answer
    C. ENIAC
    Explanation
    ENIAC was the acronym used to refer to the first large-scale electronic computer. It stands for Electronic Numerical Integrator and Computer. ENIAC was developed in the 1940s and was one of the earliest general-purpose computers. It was designed to solve complex mathematical calculations, and its development marked a significant milestone in the history of computing. ENIAC was massive in size, occupying a large room, and used vacuum tubes for its electronic components. It paved the way for future advancements in computer technology and set the foundation for modern computers.

    Rate this question:

  • 14. 

    In what year did Steve Wozniak and Steve Jobs build the first Apple personal computer?

    • A.

      1981

    • B.

      1985

    • C.

      1963

    • D.

      1976

    Correct Answer
    D. 1976
    Explanation
    In 1976, Steve Wozniak and Steve Jobs built the first Apple personal computer. This marked the beginning of Apple Inc. and revolutionized the technology industry. The Apple I, as it was called, was a single circuit board with a built-in keyboard and display. It was a significant milestone in the history of personal computing, paving the way for the development of future Apple products and establishing the company as a major player in the technology market.

    Rate this question:

  • 15. 

    What is the name of the microcomputer kit offered by MITS Inc. in 1975, for just $400?

    • A.

      Altair

    • B.

      Dark Star

    • C.

      Little Bo Peep

    • D.

      Pdp20

    Correct Answer
    A. Altair
    Explanation
    In 1975, MITS Inc. offered a microcomputer kit called Altair for just $400.

    Rate this question:

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.