Computer Basics & Internet Safety

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Racastillo
R
Racastillo
Community Contributor
Quizzes Created: 3 | Total Attempts: 4,257
Questions: 23 | Attempts: 276

SettingsSettingsSettings
Computer Basics & Internet Safety - Quiz


Questions and Answers
  • 1. 

    Internet sites are safe and never expose your computer to dangerous computer viruses.  

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    This statement is false because internet sites can expose your computer to dangerous computer viruses. Visiting malicious websites, downloading files from untrusted sources, or clicking on suspicious links can all lead to the introduction of viruses or malware onto your computer. It is important to have proper antivirus software and to practice safe browsing habits to protect your computer from these threats.

    Rate this question:

  • 2. 

    When installing programs in your computer, it is important to test your computer for problems after each installed program.  

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    It is important to test your computer for problems after each installed program to ensure that the program is functioning correctly and not causing any conflicts or issues with other software or hardware on the computer. This helps to identify any potential problems early on and allows for timely troubleshooting and resolution.

    Rate this question:

  • 3. 

    The computer’s hard drive is also known as the C: Drive.  

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The computer's hard drive is commonly referred to as the C: Drive. This is because in most Windows operating systems, the hard drive is assigned the letter C as its drive letter. This drive letter is used to identify and access the hard drive's contents. Therefore, it is correct to say that the computer's hard drive is also known as the C: Drive.

    Rate this question:

  • 4. 

    Lucy's computer is running really slow. Her BIM teacher suggests she replaces a chip that serves as a computer’s temporary memory, which stores data or programs while they are being used and requires power. What hardware does Lucy need to buy?  

    • A.

      Hard drive

    • B.

      RAM

    • C.

      ROM

    • D.

      CD-ROM DRIVE

    Correct Answer
    B. RAM
    Explanation
    Lucy needs to buy RAM (Random Access Memory) in order to replace the chip that serves as a computer's temporary memory. RAM stores data or programs while they are being used and requires power.

    Rate this question:

  • 5. 

    Physical parts of the computer, including processor and memory chips and input/output devices are known as 

    • A.

      Software

    • B.

      Hardware

    • C.

      Process

    • D.

      Monitor

    Correct Answer
    B. Hardware
    Explanation
    Hardware refers to the physical components of a computer system, such as the processor, memory chips, and input/output devices. These components are tangible and can be physically touched and manipulated. In contrast, software refers to the programs, data, and instructions that are stored on the hardware and tell it what to do. Therefore, the correct answer is Hardware.

    Rate this question:

  • 6. 

     This magnetic part stores data, programs, settings, and the operating system while the computer is off. While it is on, it spins inside the computer reading and writing data 

    • A.

      RAM

    • B.

      Motherboard

    • C.

      CPU

    • D.

      Hard drive

    Correct Answer
    D. Hard drive
    Explanation
    The hard drive is the correct answer because it is the magnetic part that stores data, programs, settings, and the operating system while the computer is off. It also spins inside the computer while it is on, reading and writing data. RAM, motherboard, and CPU do not perform these functions.

    Rate this question:

  • 7. 

    Branden is working on short story for Mr. Cardenas's class. He has created his handwritten rough draft  and is now ready to complete his final copy. Which application should Branden use for his short story?

    • A.

      WORD

    • B.

      EXCEL

    • C.

      INTERNET EXPLORER

    • D.

      PUBLISHER

    • E.

      POWERPOINT

    Correct Answer
    A. WORD
    Explanation
    Branden should use Microsoft Word for his short story. Word is a word processing application that is commonly used for creating and editing documents. It provides various formatting options, spell check, and other features that are useful for writing and organizing written content. Therefore, it is the most suitable application for Branden to complete his final copy of the short story.

    Rate this question:

  • 8. 

     If your computer needs cleaning, you can spray it with any household cleansers.  

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Spraying household cleansers on a computer can be damaging and harmful. Household cleansers contain chemicals that can corrode the electronic components of a computer and cause permanent damage. It is recommended to use specialized computer cleaning products or consult a professional for cleaning a computer.

    Rate this question:

  • 9. 

     The place where the computer is connected to the phone line. 

    • A.

      Network card

    • B.

      Modem

    • C.

      Video card

    • D.

      CPU

    Correct Answer
    B. Modem
    Explanation
    A modem is a device that connects a computer to a phone line, allowing it to transmit and receive data over the internet. It converts digital signals from the computer into analog signals that can be transmitted over the phone line, and vice versa. Therefore, a modem is the correct answer as it is specifically designed for connecting a computer to a phone line.

    Rate this question:

  • 10. 

     If you are confronted by a difficult situation online and you dont know exactly how to handle it what should you do?

    • A.

      Ask an online friend for help

    • B.

      Tell a trusted adult

    • C.

      Make an educated guess

    • D.

      Turn off the computer

    Correct Answer
    B. Tell a trusted adult
    Explanation
    In this scenario, if you are confronted by a difficult situation online and you don't know exactly how to handle it, the best course of action would be to tell a trusted adult. This is because adults can provide guidance, support, and help in dealing with the situation appropriately. They can offer advice on how to navigate the online world safely and can intervene if necessary. Relying on the assistance of a trusted adult ensures that you have someone experienced and knowledgeable to turn to for help in resolving the difficult situation.

    Rate this question:

  • 11. 

     Why do you need to be more cautious with friends you meet online than friends you meet at school?

    • A.

      Most people on the interenet arent trustworthy as people in real world

    • B.

      Friendships that begin online arent "real"

    • C.

      Online, its more difficult to tell if a person is who he says he is

    • D.

      Websites have very strict rules about online friends

    Correct Answer
    C. Online, its more difficult to tell if a person is who he says he is
    Explanation
    When meeting friends online, it is more difficult to verify the true identity of a person compared to meeting friends at school. Online interactions lack physical cues and face-to-face interactions that can help determine someone's true intentions and character. This makes it necessary to exercise caution and be more skeptical when building friendships online.

    Rate this question:

  • 12. 

    Which one of the following is risking online behavior? 

    • A.

      Talking about fridays football game

    • B.

      Posting pictures of your favorite car

    • C.

      Posting revealing pictures

    • D.

      Talkng about your favorite music artist

    Correct Answer
    C. Posting revealing pictures
    Explanation
    Posting revealing pictures is considered risky online behavior because it can potentially expose individuals to various dangers, such as cyberbullying, harassment, and exploitation. These pictures can be easily shared, downloaded, and distributed without the person's consent, leading to privacy invasion and potential harm. Additionally, posting revealing pictures can also have long-lasting consequences, as they can negatively impact one's reputation, personal relationships, and future opportunities. It is important to be cautious and mindful of the content we share online to protect our safety and well-being.

    Rate this question:

  • 13. 

    The process where online predators give gifts and pretend to be nice to their victims is called. 

    • A.

      Generousity

    • B.

      Grooming

    • C.

      Scamming

    • D.

      Screening

    Correct Answer
    B. Grooming
    Explanation
    Grooming is the process where online predators manipulate their victims by giving them gifts and pretending to be nice to gain their trust. This tactic is used to establish a relationship and exploit the victim for their own malicious purposes.

    Rate this question:

  • 14. 

     What is the most important thing you can do when you are confronted with a cyberbully or online predator?

    • A.

      Report it

    • B.

      Ingnore it

    • C.

      Block them

    • D.

      Set up a new account

    Correct Answer
    A. Report it
    Explanation
    The most important thing you can do when confronted with a cyberbully or online predator is to report it. Reporting the situation to the appropriate authorities or platform administrators can help ensure that the issue is addressed and appropriate action is taken against the perpetrator. This not only protects yourself but also helps protect others from potential harm.

    Rate this question:

  • 15. 

    Luis just got his first job and has opened a bank account. He wants to create a budget that will keep track of his money and calculate his expenses. What application is the best choice for Luis?

    • A.

      WORD

    • B.

      EXCEL

    • C.

      POWERPOINT

    • D.

      PUBLISHER

    Correct Answer
    B. EXCEL
    Explanation
    Excel is the best choice for Luis because it is a spreadsheet application that allows him to create a budget and track his expenses easily. Excel provides various features such as formulas, functions, and templates that can help Luis organize his financial data effectively. He can input his income, expenses, and savings into different cells, use formulas to calculate totals and balances, and create charts or graphs to visualize his financial situation. Excel's versatility and functionality make it an ideal tool for managing budgets and financial data.

    Rate this question:

  • 16. 

    Jose has been asked to share his political views to the entire class. He would like to speak in front of the class but also has some images and videos he would like to use to support his views. Which application would be best for Jose to use?

    • A.

      WORD

    • B.

      EXCEL

    • C.

      POWERPOINT

    • D.

      PUBLISHER

    • E.

      INTERNET EXPLORER

    Correct Answer
    C. POWERPOINT
    Explanation
    PowerPoint would be the best application for Jose to use because it allows him to create visually appealing presentations with images and videos. It is specifically designed for creating slideshows and presentations, making it the ideal choice for sharing his political views with the class. Word, Excel, Publisher, and Internet Explorer are not designed for creating presentations and may not have the necessary features to effectively showcase his views.

    Rate this question:

  • 17. 

    Stephanie is looking for a picture of an elephant needed for her powerpoint presentation. She knows that the file is named elephant but has 3 file types name identically. Which one is the image file?

    • A.

      Elephant.wav

    • B.

      Elephant.jpeg

    • C.

      Elephant.txt

    • D.

      Elephant.mp3

    Correct Answer
    B. Elephant.jpeg
    Explanation
    The image file is elephant.jpeg because the .jpeg file extension is commonly used for image files.

    Rate this question:

  • 18. 

    Maggie is having an event fundraiser for her ROTC Club and Sergeant has asked her to create a flyer to help advertise their event. Which application should Maggie use to create her flyer?

    • A.

      WORD

    • B.

      EXCEL

    • C.

      POWERPOINT

    • D.

      PUBLISHER

    Correct Answer
    D. PUBLISHER
    Explanation
    Maggie should use PUBLISHER to create her flyer because Publisher is a desktop publishing application that is specifically designed for creating and designing various types of printed materials, such as flyers, brochures, and newsletters. It offers a wide range of templates, customization options, and layout tools that would be ideal for creating an eye-catching and professional-looking flyer for her event fundraiser.

    Rate this question:

  • 19. 

    _______ is an electronic spreadsheet program that can be used for storing, organizing and manipulating data.

    • A.

      WORD

    • B.

      EXCEL

    • C.

      POWERPOINT

    • D.

      PUBLISHER

    Correct Answer
    B. EXCEL
    Explanation
    Excel is an electronic spreadsheet program that is widely used for storing, organizing, and manipulating data. It allows users to input data into cells, perform calculations, create charts and graphs, and analyze data. Excel is commonly used in various industries and professions, including finance, accounting, marketing, and data analysis. It provides a user-friendly interface and a wide range of features and functions that make it a powerful tool for managing and analyzing data effectively.

    Rate this question:

  • 20. 

    Aracely has just bought a new 28" computer monitor for her desktop computer. She is going to install it herself, which expansion card should she connect the monitor to?

    • A.

      VIDEO CARD

    • B.

      SOUND CARD

    • C.

      MODEM CARD

    • D.

      NETWORK CARD

    Correct Answer
    A. VIDEO CARD
    Explanation
    Aracely should connect the monitor to the video card. The video card is responsible for generating and outputting the video signals to the monitor, allowing it to display images and videos. Connecting the monitor to the video card ensures that she can properly utilize the capabilities of her new 28" computer monitor.

    Rate this question:

  • 21. 

    I am an input device used to enter information into the computer and for giving commands. What am I?

    • A.

      HARD DISK

    • B.

      MOTHERBOARD

    • C.

      KEYBOARD

    • D.

      PRINTER

    Correct Answer
    C. KEYBOARD
    Explanation
    A keyboard is an input device used to enter information into the computer and for giving commands. It consists of a set of keys that are pressed by the user to input text, numbers, and other commands into the computer. The keyboard is an essential tool for interacting with the computer and is commonly used for typing, gaming, and navigating through various software applications. It allows the user to communicate with the computer by inputting commands and data, making it the correct answer in this context.

    Rate this question:

  • 22. 

    Code that uses 0 and 1's (00100) is known as _______ code.

    Correct Answer
    binary
    Explanation
    The code that uses 0 and 1's (00100) is known as binary code. In binary code, each digit represents a power of 2, and the combination of these digits can represent various values. Binary code is widely used in computer systems as it is the fundamental language that computers understand and use to process information.

    Rate this question:

  • 23. 

    Your BIM Teachers last name is ___________.

    Correct Answer
    Castillo
    Explanation
    The correct answer is Castillo because the question is asking for the last name of the BIM teacher. Since Castillo is provided as the answer, it can be inferred that Castillo is the last name of the BIM teacher.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 08, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 07, 2011
    Quiz Created by
    Racastillo
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.