Interesting Quiz On Computers

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Thames
T
Thames
Community Contributor
Quizzes Created: 6820 | Total Attempts: 9,511,592
| Attempts: 230 | Questions: 15
Please wait...
Question 1 / 15
0 %
0/100
Score 0/100
1. Which of the following innovators is credited with inventing ethernet?

Explanation

Robert Metcalfe is credited with inventing Ethernet. Ethernet is a widely used technology for connecting devices in a local area network (LAN). Metcalfe, along with his team at Xerox PARC, developed the first Ethernet protocol in the 1970s. This protocol allowed multiple computers to communicate and share data over a network. Metcalfe's invention of Ethernet revolutionized computer networking and laid the foundation for the modern internet.

Submit
Please wait...
About This Quiz
Interesting Quiz On Computers - Quiz

Explore the evolution of computing technology with this engaging quiz. Assess your knowledge on historical computers, key technological advancements, and pivotal figures in the development of networking protocols.... see moreIdeal for learners interested in computer science history. see less

2. Which company introduced the first hard drive?

Explanation

IBM is the correct answer because they introduced the first hard drive.

Submit
3. What was the storage capacity of IBM's first hard drive?

Explanation

IBM's first hard drive had a storage capacity of 5 Megabytes. This means that it could store approximately 5 million characters of data. This was a significant milestone in computer storage technology at that time, as it provided a much larger storage capacity compared to previous storage devices. This advancement in storage capacity paved the way for the development of more sophisticated and powerful computer systems in the future.

Submit
4. Who is credited with developing ARPANET, one of the original computer networks?

Explanation

Vinton Cerf is credited with developing ARPANET, one of the original computer networks. ARPANET was a groundbreaking project that laid the foundation for the modern internet. Cerf, along with his colleague Robert Kahn, developed the TCP/IP protocol suite, which enabled different computer networks to communicate with each other. This development was crucial in the growth and expansion of the internet, making Cerf a key figure in its development.

Submit
5. What is the name of the computer in the 1957 film, "Desk Set"?

Explanation

In the 1957 film "Desk Set," the name of the computer is Emerac.

Submit
6. What does the "NT" acronym in Windows NT stand for?

Explanation

The "NT" acronym in Windows NT stands for New Technology. This is because Windows NT was a new operating system developed by Microsoft that introduced several advanced features and improvements compared to its predecessor, Windows 3.1. Windows NT was designed to be more robust, secure, and scalable, making it suitable for both personal and business use. The "NT" designation was used to differentiate this new operating system from the previous versions of Windows.

Submit
7. What technique uses odd packet headers to detect a remote machine's operating system?

Explanation

TCP Fingerprinting is a technique that uses odd packet headers to detect a remote machine's operating system. By analyzing the specific characteristics and behavior of TCP packets sent by a remote machine, such as the order of flags set in the packet header or the specific options included, it is possible to make educated guesses about the operating system running on that machine. This can be useful for network administrators to identify potential vulnerabilities or to gather information about the systems on their network.

Submit
8. Which pair are widely credited with inventing the TCP/IP protocol?

Explanation

Kahn and Cerf are widely credited with inventing the TCP/IP protocol. Vinton Cerf and Robert Kahn are computer scientists who played a crucial role in the development of the Internet. They co-designed the TCP/IP protocol suite, which is the foundation of the modern internet. This protocol allows for the transmission of data between different networks, enabling the interconnectedness of computers worldwide. Their work revolutionized communication and paved the way for the internet as we know it today.

Submit
9. What university did Michael Dell drop out of?

Explanation

Michael Dell dropped out of the University of Texas.

Submit
10. What type of cryptosystem prevents the breaking of one key from aiding the breaking of others?

Explanation

Perfect Forward Secrecy is a type of cryptosystem that ensures that the breaking of one key does not aid in breaking other keys. In this system, a unique session key is generated for each communication session, and even if one session key is compromised, it does not compromise the security of other sessions. This provides an additional layer of protection against attacks and ensures that past communications remain secure even if future keys are compromised.

Submit
11. The RC4 symmetric key algorithm was designed by an employee of what firm?

Explanation

The correct answer is RSA Data Security because the RC4 symmetric key algorithm was indeed designed by an employee of this firm.

Submit
12. Wireless efficiency can be increased by "DTIM" in data packets, which stands for what?

Explanation

DTIM stands for Delivery Traffic Indication Message. This feature in data packets helps to increase wireless efficiency. DTIM allows devices to know when there is data waiting for them on the network, reducing the time they spend in sleep mode and improving responsiveness. It helps in managing power consumption and optimizing the delivery of data packets in wireless networks.

Submit
13. What was the first type of early computer memory?

Explanation

The correct answer is Electrostatic Tube. Electrostatic tubes were the first type of early computer memory. They were used in the early 1940s and stored data as an electric charge on a vacuum tube. However, they were not very reliable and were eventually replaced by more efficient and reliable memory technologies such as magnetic core and magnetic drum.

Submit
14. Microsoft Windows NT has development roots in which older operating system?

Explanation

Microsoft Windows NT has development roots in VMS. VMS stands for Virtual Memory System, which was an operating system developed by Digital Equipment Corporation (DEC). Windows NT was designed to be a high-performance, multi-user operating system, and it borrowed several concepts and features from VMS. These include the use of a hierarchical file system, a security model based on access control lists (ACLs), and the separation of user mode and kernel mode. The influence of VMS on Windows NT can be seen in various aspects of the operating system's design and functionality.

Submit
15. In IPSec, the abbreviation "SA" refers to what when setting up a VPN?

Explanation

not-available-via-ai

Submit
View My Results

Quiz Review Timeline (Updated): Mar 24, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 24, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 16, 2015
    Quiz Created by
    Thames
Cancel
  • All
    All (15)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following innovators is credited with inventing ethernet?
Which company introduced the first hard drive?
What was the storage capacity of IBM's first hard drive?
Who is credited with developing ARPANET, one of the original computer...
What is the name of the computer in the 1957 film, "Desk Set"?
What does the "NT" acronym in Windows NT stand for?
What technique uses odd packet headers to detect a remote machine's...
Which pair are widely credited with inventing the TCP/IP protocol?
What university did Michael Dell drop out of?
What type of cryptosystem prevents the breaking of one key from aiding...
The RC4 symmetric key algorithm was designed by an employee of what...
Wireless efficiency can be increased by "DTIM" in data packets, which...
What was the first type of early computer memory?
Microsoft Windows NT has development roots in which older operating...
In IPSec, the abbreviation "SA" refers to what when setting up a VPN?
Alert!

Advertisement