Do You Actually Know Computers?

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Cambronbill3
C
Cambronbill3
Community Contributor
Quizzes Created: 2461 | Total Attempts: 1,093,195
Questions: 15 | Attempts: 336

SettingsSettingsSettings
Do You Actually Know Computers? - Quiz

A non-complicated quiz based on Computers


Questions and Answers
  • 1. 

    What device interfaces between an IP network and the public telephone network?

    • A.

      Router

    • B.

      Scanner

    • C.

      SCSI Adapter

    • D.

      VoIP Gateway

    Correct Answer
    D. VoIP Gateway
    Explanation
    A VoIP Gateway is a device that interfaces between an IP network and the public telephone network. It allows voice communication to be transmitted over the internet protocol (IP) network, converting analog voice signals into digital data packets that can be transmitted over the IP network. This enables users to make phone calls using internet connection instead of traditional telephone lines.

    Rate this question:

  • 2. 

    What cowboy-derived term is used for those who search for security flaws to fix them?

    • A.

      Cowpoke

    • B.

      Netminder

    • C.

      White Hat

    • D.

      Ranch Hand

    Correct Answer
    C. White Hat
    Explanation
    The term "White Hat" is derived from the concept of cowboys wearing white hats to symbolize their virtuous and lawful intentions. In the context of cybersecurity, "White Hat" refers to individuals who search for security flaws in order to fix them and improve the overall security of a system or network. They are ethical hackers or security professionals who use their skills for defensive purposes, unlike "Black Hat" hackers who exploit vulnerabilities for malicious activities.

    Rate this question:

  • 3. 

    What MIT-developed third party authentication protocol was named for a mythological beast?

    • A.

      Q

    • B.

      Medusa

    • C.

      Kerberos

    • D.

      Cyclops

    Correct Answer
    C. Kerberos
    Explanation
    Kerberos is a third-party authentication protocol developed by MIT and named after the mythological three-headed dog, Kerberos. Just like the dog guarded the gates of the underworld, the Kerberos protocol is designed to provide secure authentication for computer networks. It uses a trusted third party, known as the Key Distribution Center (KDC), to authenticate users and grant them access to network resources. This protocol uses tickets to verify the identity of users and ensure secure communication between clients and servers. Overall, Kerberos plays a crucial role in ensuring the security and integrity of network systems.

    Rate this question:

  • 4. 

    The year 2009 saw the unveiling of which "computational engine for the Web"?

    • A.

      Web Works

    • B.

      Google Cloud

    • C.

      IEngine

    • D.

      Wolfram Alpha

    Correct Answer
    D. Wolfram Alpha
    Explanation
    In 2009, Wolfram Alpha was unveiled as a "computational engine for the Web". It is a powerful search engine that provides answers to factual queries by computing them rather than just providing a list of links. It uses a vast amount of curated data and algorithms to generate accurate and detailed responses to a wide range of questions. Wolfram Alpha has become a popular tool for students, researchers, and anyone seeking precise and reliable information.

    Rate this question:

  • 5. 

    PPTP allows what other protocol to be tunneled through an IP network?

    • A.

      PPP

    • B.

      GSP

    • C.

      WCP

    • D.

      TCP

    Correct Answer
    A. PPP
    Explanation
    PPTP (Point-to-Point Tunneling Protocol) allows the PPP (Point-to-Point Protocol) to be tunneled through an IP network. PPP is a data link layer protocol used for establishing a direct connection between two nodes in a network. PPTP encapsulates PPP packets within IP packets, allowing them to be transmitted over IP networks such as the internet. This enables secure and private communication between two endpoints by creating a virtual private network (VPN) over the IP network.

    Rate this question:

  • 6. 

    Software such as "Tomato" which is loaded onto wireless routers is classified by what name?

    • A.

      Webware

    • B.

      Firmware

    • C.

      Netware

    • D.

      Squishyware

    Correct Answer
    B. Firmware
    Explanation
    Firmware refers to software that is permanently stored in a hardware device, such as a wireless router. It provides the necessary instructions for the device to function properly. In this case, "Tomato" is a type of firmware that can be loaded onto wireless routers, enhancing their capabilities and features. Therefore, the correct answer is Firmware.

    Rate this question:

  • 7. 

    Thin-film transistor arrays on special plastics allow for prototyping what displays?

    • A.

      Flexible

    • B.

      Nanochip

    • C.

      Laptop

    • D.

      Interplanetary

    Correct Answer
    A. Flexible
    Explanation
    Thin-film transistor arrays on special plastics allow for prototyping flexible displays. These displays can be bent, curved, or rolled, making them ideal for applications where traditional rigid displays are not suitable. Flexible displays have various potential uses, including wearable technology, foldable smartphones, and curved televisions. The use of special plastics in combination with thin-film transistors enables the creation of these flexible displays.

    Rate this question:

  • 8. 

    Which microprocessor was the world's first to contain over one million transistors on a .4 x .6 silicon chip?

    • A.

      Intel 80486

    • B.

      Intel Pentium

    • C.

      Motorola 6800

    • D.

      Intel 80386

    Correct Answer
    A. Intel 80486
    Explanation
    The Intel 80486 was the world's first microprocessor to contain over one million transistors on a .4 x .6 silicon chip. This advancement in transistor density allowed for greater processing power and performance in computers. The Intel Pentium, Motorola 6800, and Intel 80386 did not have the same level of transistor density as the Intel 80486.

    Rate this question:

  • 9. 

    When did the Intel 80486 chipset first come out?

    • A.

      1978

    • B.

      1999

    • C.

      1996

    • D.

      1989

    Correct Answer
    D. 1989
    Explanation
    The Intel 80486 chipset first came out in 1989.

    Rate this question:

  • 10. 

    In the year 1999, what was Sun Microsystems' largest and most powerful server?

    • A.

      Ultra Enterprise 450

    • B.

      Sunblade

    • C.

      Ultra Enterprise 4500

    • D.

      E10k

    Correct Answer
    D. E10k
    Explanation
    The correct answer is E10k. In the year 1999, Sun Microsystems' largest and most powerful server was the E10k.

    Rate this question:

  • 11. 

    What does the term "GNU" stand for?

    • A.

      Gibson's Not Unix

    • B.

      Generally Not Unix

    • C.

      Gizmo Network Unit

    • D.

      GNU's Not Unix

    Correct Answer
    D. GNU's Not Unix
    Explanation
    The term "GNU" stands for "GNU's Not Unix." This acronym was created by Richard Stallman in the 1980s as part of the GNU Project, which aimed to develop a free and open-source operating system similar to Unix. The name was chosen to reflect the project's goal of creating a Unix-like system that was not proprietary or controlled by any specific company. The GNU Project eventually led to the development of the GNU operating system, which is commonly used in combination with the Linux kernel to create what is known as GNU/Linux.

    Rate this question:

  • 12. 

    What was the first product sold by IBM?

    • A.

      Typewriter

    • B.

      Sewing Machine

    • C.

      Cash Register

    • D.

      Counting Machine

    Correct Answer
    D. Counting Machine
    Explanation
    IBM's first product was the counting machine, also known as the tabulating machine. This machine was developed by IBM's predecessor, the Tabulating Machine Company, and was used to process and tabulate data by mechanical means. The counting machine played a significant role in revolutionizing data processing and laid the foundation for IBM's future success in the computing industry.

    Rate this question:

  • 13. 

    What is the purpose of "interrupt 10H"?

    • A.

      DOS From The Bios To Software

    • B.

      Win32 Protected Mode

    • C.

      Video From Bios To Software

    • D.

      Expansion Card Hardware Interrupt

    Correct Answer
    C. Video From Bios To Software
    Explanation
    The purpose of "interrupt 10H" is to handle video operations from the BIOS to the software. This interrupt allows the software to communicate with the video hardware and perform tasks such as displaying characters, changing screen modes, and manipulating pixels on the screen. It provides a standardized interface for video operations, making it easier for software developers to write programs that interact with the video hardware.

    Rate this question:

  • 14. 

    What was the name of the first computer manufactured by IBM?

    • A.

      IBM 1

    • B.

      802

    • C.

      701

    • D.

      PC-1

    Correct Answer
    C. 701
    Explanation
    The correct answer is 701. The IBM 701, also known as the Defense Calculator, was the first computer manufactured by IBM. It was introduced in 1952 and was designed for scientific calculations. The 701 was a vacuum tube-based computer that could perform complex calculations at a faster speed compared to other computers of that time. It marked a significant milestone in the development of computing technology and set the foundation for future advancements in the field.

    Rate this question:

  • 15. 

    When was the first commercial short text message sent?

    • A.

      2000

    • B.

      1985

    • C.

      1999

    • D.

      1992

    Correct Answer
    D. 1992
    Explanation
    In 1992, the first commercial short text message was sent. This implies that before 1992, short text messages were not commercially available.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 24, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 16, 2015
    Quiz Created by
    Cambronbill3
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.