The Ultimate General Computer Knowledge Quiz

25 Questions

SettingsSettingsSettings
Please wait...
Computer Knowledge Quizzes & Trivia

Questions and Answers
  • 1. 
    The columns in a Microsoft Access table are also called? 
    • A. 

      Rows

    • B. 

      Records

    • C. 

      Fields

    • D. 

      Columns

  • 2. 
    In what order, are the stages of software development performed?
    • A. 

      Analysis, design, testing, programming

    • B. 

      Design, testing, analysis, programming

    • C. 

      Design, programming, testing, analysis

    • D. 

      Analysis, design, programming, testing

  • 3. 
    Which of the following is not a type of Microsoft Access database object?
    • A. 

      Worksheets

    • B. 

      Table

    • C. 

      Form

    • D. 

      Modules

    • E. 

      Option 5

  • 4. 
    In one-to-many relationships the table in the ‘one’ side is called __________ and on the ‘many’ side is called? ___________
    • A. 

      Child, Parent

    • B. 

      Parent, Child

    • C. 

      Row, Column

    • D. 

      Grandparent, Parent

  • 5. 
    A ____________ consists of tables, each of which contains information on a specific subject.
    • A. 

      Spreadsheet

    • B. 

      List

    • C. 

      Worksheet

    • D. 

      Relational Database

  • 6. 
    How are records stored in a database uniquely identified?
    • A. 

      Unique Identifier

    • B. 

      Primary Key

    • C. 

      Foreign Key

    • D. 

      Macro Key

  • 7. 
    What is the purpose of an operating system?
    • A. 

      Manage software on computer

    • B. 

      Manage hardware on computer

    • C. 

      Manage all hardware & software on computer

    • D. 

      Provide a visual interface for users to manage hardware and software.

  • 8. 
    Dividing a hard disk drive into multiple logical storage units is referred to as?
    • A. 

      Partitioning

    • B. 

      Division

    • C. 

      Configuring

    • D. 

      Segmenting

  • 9. 
    What can you do with the Device Manager tool of the Operating system?
    • A. 

      Add new hardware.

    • B. 

      See a list of all the hardware devices installed on your computer (use this to change the properties of any device).

    • C. 

      Adjust the resolution of your monitor, change Windows themes, and change background theme/image for your desktop.

    • D. 

      Change what appears regarding notifications and quick start buttons.

  • 10. 
    Which of the following is NOT an operating system?       
    • A. 

      UNIX

    • B. 

      Linux

    • C. 

      Firefox

    • D. 

      Windows

  • 11. 
    What can you use to identify what is consuming most of the CPU’s processing power?
    • A. 

      The service applet

    • B. 

      The system applet

    • C. 

      The performance tab of the Task Manager

    • D. 

      The process tab of the Task Manager

  • 12. 
    ___________________ is designed to solve a specific problem or to do a specific task.
    • A. 

      Application Software

    • B. 

      System Software

    • C. 

      Utility Software

    • D. 

      User

  • 13. 
    The type of software which is designed for users to customize the program is called?
    • A. 

      Freeware

    • B. 

      Open-source software

    • C. 

      Shareware

    • D. 

      Macros

  • 14. 
    Which type of software provides the public with its source code free of charge?
    • A. 

      Open-source software

    • B. 

      Freeware

    • C. 

      Shareware

    • D. 

      System software

  • 15. 
    What is the name of an application program that is self-replicating and transports itself through the Internet?
    • A. 

      A BOT

    • B. 

      Spyware

    • C. 

      Logic bomb

    • D. 

      Worm

  • 16. 
    A network that is used for very long distances data transmission?
    • A. 

      LAN

    • B. 

      WAN

    • C. 

      MAN

    • D. 

      WLAN

  • 17. 
    In computer terms, a ‘group’ is a collection of users who:
    • A. 

      Have the same interests

    • B. 

      Are placed in the same location in an office

    • C. 

      Are associated by an organizational need

    • D. 

      Have the same computers

  • 18. 
    How many broad ‘classes’ of software are there:
    • A. 

      Two

    • B. 

      Five

    • C. 

      Three

    • D. 

      Four

  • 19. 
    What is the correct procedure to follow in order to obtain the correct media for backup?
    • A. 

      Assessing the Disaster Recovery Plan

    • B. 

      By evaluating the implementation plan

    • C. 

      From personal observation

    • D. 

      By evaluating the implementation plan and from personal observation

  • 20. 
    Which of the options listed below will be stated in a backup procedures manual?
    • A. 

      Data should be stored on its own volume

    • B. 

      Data should be mixed in with program files

    • C. 

      Data should be stored on local hard drives

    • D. 

      Data should be stored on removable media

  • 21. 
    Being vigilant with viruses is the responsibility of:
    • A. 

      The Network Administrator

    • B. 

      The IT Manager

    • C. 

      The Security Auditor

    • D. 

      All users in an organization

  • 22. 
    The most effective approach to virus protection is to:       
    • A. 

      Use utility software in conjunction with staff education

    • B. 

      Use an anti-virus

    • C. 

      Use a firewall

    • D. 

      Be careful of the websites you visit

  • 23. 
    An important role for the Network Administrator will be:
    • A. 

      Scanning all removable disks or CDs to be used by users

    • B. 

      Obtaining and distributing the latest signature files

    • C. 

      Vetting the web sites that users visit to check for viruses

    • D. 

      Using a network ‘sniffer’ to check that packets of data do not contain virus signatures

  • 24. 
    When would be the ideal period to perform a system backup?
    • A. 

      When the system is least busy.

    • B. 

      At 2AM local time.

    • C. 

      On boot up.

    • D. 

      Any time before 6AM local time.

  • 25. 
    All users of a particular class should have access based on:
    • A. 

      The class of user

    • B. 

      The organizational guidelines

    • C. 

      The group to which the user belongs

    • D. 

      Local group policy

Back to Top Back to top