Basic Knowledge Of Computer And Applications Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Tanmay Shankar
T
Tanmay Shankar
Community Contributor
Quizzes Created: 493 | Total Attempts: 1,777,525
Questions: 28 | Attempts: 20,323

SettingsSettingsSettings
Basic Knowledge Of Computer And Applications Quiz - Quiz


This quiz is about the basic knowledge of computer and its applications. In today’s technological world, knowledge of how computers work and how to operate them is no small feat; it’s something you need to know about if you ever want to get involved in one of the fastest-growing industries in the world. What can you tell us about computing so far?


Questions and Answers
  • 1. 

    What is backup?

    • A.

      Adding more components to your network

    • B.

      Protecting data by copying it from the original source to a different destination

    • C.

      Filtering old data from the new data

    • D.

      Accessing data on tape

    • E.

      Using earlier data

    Correct Answer
    B. Protecting data by copying it from the original source to a different destination
    Explanation
    Backup refers to the process of protecting data by creating a copy of it from the original source and storing it in a different location. This is done to ensure that in case of any data loss or damage to the original source, the backup copy can be used to restore the data. It acts as a safeguard against accidental deletion, hardware failure, natural disasters, or any other potential risks that may result in data loss. By making a duplicate copy of the data, backup helps to ensure data availability and reliability.

    Rate this question:

  • 2. 

    The legal right to use software based on specific restrictions is granted via a

    • A.

      Software privacy policy

    • B.

      Software license

    • C.

      Software password manager

    • D.

      Software log

    • E.

      None of these

    Correct Answer
    B. Software license
    Explanation
    A software license is a legal agreement between the software developer and the end user that grants the user the right to use the software under specific terms and conditions. This agreement outlines the restrictions on how the software can be used, distributed, and modified. By obtaining a software license, the user gains the legal right to use the software while adhering to the specified restrictions. A software privacy policy, software password manager, and software log are not directly related to granting the right to use software.

    Rate this question:

  • 3. 

    What is an e-mail attachment?

    • A.

      A receipt sent by the recipient

    • B.

      A separate document from another program sent along with an e-mail

    • C.

      A malicious parasite that feeds on your messages and destroys the contents

    • D.

      A list of CC or BCC recipients

    • E.

      A friend to whom e-mail is sent regularly

    Correct Answer
    B. A separate document from another program sent along with an e-mail
    Explanation
    An e-mail attachment refers to a separate document from another program that is sent along with an e-mail. This document can be a file, such as a Word document, PDF, image, or any other type of file that is attached to the e-mail message. It allows the sender to share additional information or files with the recipient that are relevant to the content of the e-mail.

    Rate this question:

  • 4. 

    Which of the following is the type of software that controls the internal operations in the computer and controls how the computer works with all its parts?

    • A.

      Shareware

    • B.

      Public domain software

    • C.

      Application software

    • D.

      Operating system software

    • E.

      None of these

    Correct Answer
    D. Operating system software
    Explanation
    Operating system software is the correct answer because it is the type of software that controls the internal operations in the computer and manages how the computer works with all its parts. It provides a platform for other software applications to run on the computer and manages system resources such as memory, storage, and input/output devices. It also provides a user interface for users to interact with the computer and coordinates the execution of various tasks and processes.

    Rate this question:

  • 5. 

    When data changes in multiple lists and all lists are not updated, this causes

    • A.

      Data redundancy

    • B.

      Information overload

    • C.

      Duplicate data

    • D.

      Data consistency

    • E.

      Data inconsistency

    Correct Answer
    E. Data inconsistency
    Explanation
    When data changes in multiple lists and all lists are not updated, it leads to data inconsistency. This means that the data in different lists or databases becomes different or contradictory, causing confusion and inaccuracies. Data inconsistency can result in incorrect analysis, decision-making, and overall inefficiency in data management.

    Rate this question:

  • 6. 

    What is the main folder on a storage device called?

    • A.

      Root directory

    • B.

      Interface

    • C.

      Device driver

    • D.

      Platform

    • E.

      Main directory

    Correct Answer
    A. Root directory
    Explanation
    The main folder on a storage device is called the root directory. This directory is the top-level directory that contains all other files and folders on the storage device. It serves as the starting point for navigating and organizing the files and folders within the storage device.

    Rate this question:

  • 7. 

    To view information on the Web you must have a

    • A.

      Cable modem

    • B.

      Web browser

    • C.

      Domain name server

    • D.

      Hypertext viewer

    • E.

      None of these

    Correct Answer
    B. Web browser
    Explanation
    A web browser is the software application that allows users to access and view information on the web. It is the interface between the user and the internet, enabling them to navigate websites, view web pages, and interact with online content. Without a web browser, users would not be able to access or view any information on the web. A cable modem, domain name server, and hypertext viewer are all components that facilitate internet connectivity and web browsing, but none of them alone can fulfill the requirement of accessing and viewing information on the web.

    Rate this question:

  • 8. 

    A file is often referred to as a

    • A.

      Wizard

    • B.

      Document

    • C.

      Pane

    • D.

      Device

    • E.

      Documentation

    Correct Answer
    B. Document
    Explanation
    A file is often referred to as a document because it is a collection of data or information that is stored and organized in a specific format. Just like a document, a file can contain text, images, tables, and other types of content. Additionally, files are typically used for recording and storing information in a digital format, similar to how a document is used to record and store information on paper. Therefore, referring to a file as a document is an appropriate and commonly used term.

    Rate this question:

  • 9. 

    To protect yourself from computer hacker intrusions you should instal a

    • A.

      Firewall

    • B.

      Mailer

    • C.

      Macro

    • D.

      Script

    • E.

      None of these

    Correct Answer
    A. Firewall
    Explanation
    A firewall is a security measure that helps protect computer systems from unauthorized access and intrusions by monitoring and controlling incoming and outgoing network traffic. It acts as a barrier between a trusted internal network and an untrusted external network, filtering out potentially harmful or malicious data packets. By installing a firewall, users can prevent hackers from gaining unauthorized access to their systems and reduce the risk of data breaches and cyber attacks. It is an essential component of a comprehensive cybersecurity strategy.

    Rate this question:

  • 10. 

    What type of computers are client. computers (most of the time) in a client-server system?

    • A.

      Mainframe

    • B.

      Mini-computer

    • C.

      Microcomputer

    • D.

      PDA

    • E.

      None of these

    Correct Answer
    A. Mainframe
    Explanation
    Client computers in a client-server system are not typically mainframe computers, mini-computers, or PDAs. Instead, they are usually microcomputers. Microcomputers, also known as personal computers, are the most common type of client computers used in a client-server system. They are smaller, less powerful computers that are designed for individual use and are connected to a larger server to access resources and services.

    Rate this question:

  • 11. 

    What happens when you boot up a PC?

    • A.

      Portions of the operating system are copied from disk into memory

    • B.

      Portions of the operating system are copied from memory onto disk

    • C.

      Portions of the operating system are compiled

    • D.

      Portions of the operating system are emulated

    • E.

      The PC gets switched off

    Correct Answer
    A. Portions of the operating system are copied from disk into memory
    Explanation
    When you boot up a PC, portions of the operating system are copied from the disk into the computer's memory. This is necessary because the operating system needs to be loaded into memory in order to function properly. By copying the operating system into memory, the PC can access and execute the necessary instructions and data to start up and run various software applications.

    Rate this question:

  • 12. 

    Linux is an example of

    • A.

      Freeware

    • B.

      Open source software

    • C.

      Shareware

    • D.

      Complimentary

    • E.

      None of these

    Correct Answer
    B. Open source software
    Explanation
    Linux is an example of open source software because it is a free and open operating system that allows users to view, modify, and distribute its source code. Being open source means that anyone can access and modify the code, which promotes collaboration and innovation within the Linux community. This distinguishes it from freeware, which is software that is available for free but does not necessarily allow users to modify or distribute its source code. Shareware refers to software that is initially provided for free but requires payment for continued use, while complimentary simply means something given for free.

    Rate this question:

  • 13. 

    Which of the following software applications would be the most appropriate for performing numerical and statistical calculations?

    • A.

      Database

    • B.

      Document processor

    • C.

      Graphics package

    • D.

      Spreadsheet

    • E.

      PowerPoint

    Correct Answer
    D. Spreadsheet
    Explanation
    A spreadsheet would be the most appropriate software application for performing numerical and statistical calculations. Spreadsheets are designed specifically for organizing and manipulating numerical data, making them ideal for performing calculations, creating formulas, and generating statistical analysis. They provide a grid-like structure that allows for easy input and manipulation of data, as well as the ability to perform complex mathematical functions and generate charts and graphs. Additionally, spreadsheets offer features like sorting, filtering, and data validation, which are essential for working with numerical and statistical data effectively.

    Rate this question:

  • 14. 

    A             is used to' read handwritten or printed text to make a digital image that is stored in memory.

    • A.

      Printer

    • B.

      Laser beam

    • C.

      Scanner

    • D.

      Touchpad

    • E.

      None of these

    Correct Answer
    C. Scanner
    Explanation
    A scanner is used to read handwritten or printed text to make a digital image that is stored in memory. It is a device that uses optical technology to capture an image of a document or photo and convert it into a digital format. This digital image can then be stored, edited, or shared electronically. Scanners are commonly used in offices, libraries, and homes for tasks such as scanning documents, creating digital copies of photos, or converting physical documents into editable text through optical character recognition (OCR) technology.

    Rate this question:

  • 15. 

    You organise files by storing them in

    • A.

      Archives

    • B.

      Lists

    • C.

      Indexes

    • D.

      Folders

    • E.

      None of these

    Correct Answer
    D. Folders
    Explanation
    Files are commonly organized and stored in folders. Folders act as containers that hold related files together, making it easier to locate and manage them. By grouping files into folders, users can create a hierarchical structure, allowing for better organization and efficient retrieval of files when needed. This method of organizing files is widely used in computer systems to maintain order and accessibility.

    Rate this question:

  • 16. 

    A             is a pre-designed document that already has coordinating fonts, a layout, and a background.

    • A.

      Guide

    • B.

      Model

    • C.

      Ruler

    • D.

      Template

    • E.

      Design-plate

    Correct Answer
    D. Template
    Explanation
    A template is a pre-designed document that already has coordinating fonts, a layout, and a background. It serves as a starting point for creating new documents, as it provides a consistent design and format. Templates are commonly used in various applications, such as word processors, graphic design software, and website builders, to save time and ensure consistency in the appearance of documents or designs.

    Rate this question:

  • 17. 

    What is the default file extension for all Word documents?

    • A.

      WRD

    • B.

      TXT

    • C.

      DOC

    • D.

      FIL

    • E.

      WD

    Correct Answer
    C. DOC
    Explanation
    The default file extension for all Word documents is DOC. This file extension is used by Microsoft Word to save and identify its documents.

    Rate this question:

  • 18. 

    Removing and replacing devices without turning off your computer is referred to as

    • A.

      Hot swapping

    • B.

      Plug-n-Play

    • C.

      Bay swap

    • D.

      USB swapping

    • E.

      None of these

    Correct Answer
    B. Plug-n-Play
    Explanation
    Removing and replacing devices without turning off the computer is referred to as Plug-n-Play. This feature allows devices to be connected or disconnected while the computer is still running, without the need for manual configuration or restarting the system. Plug-n-Play technology enables easy installation and use of various peripherals, such as USB devices, printers, and external hard drives, by automatically detecting and configuring them. It simplifies the process of adding or removing hardware components, making it convenient for users to expand or upgrade their computer systems.

    Rate this question:

  • 19. 

    Specialised programs that assist users' in locating information on the Web are called

    • A.

      Information engines

    • B.

      Locator engines

    • C.

      Web browsers

    • D.

      Resource locators

    • E.

      Search engines

    Correct Answer
    E. Search engines
    Explanation
    Search engines are specialized programs that assist users in locating information on the web. They use algorithms to search and index web pages, making it easier for users to find relevant information by entering keywords or phrases. Unlike web browsers, which are software applications used to access and view websites, search engines specifically focus on retrieving and organizing information from the internet. Resource locators and information engines are not commonly used terms to refer to search engines, making them incorrect options.

    Rate this question:

  • 20. 

    Compiling creates a(n)

    • A.

      Error-free program

    • B.

      Program specification

    • C.

      Subroutine

    • D.

      Algorithm

    • E.

      Executable program

    Correct Answer
    E. Executable program
    Explanation
    Compiling is the process of converting human-readable code into machine-readable instructions. When a program is compiled, it is checked for syntax errors and other issues, and if there are no errors, an executable program is generated. An executable program is a file that can be directly run by the computer's operating system, allowing the program to be executed and perform its intended tasks. Therefore, the correct answer is "executable program".

    Rate this question:

  • 21. 

    Expansion cards are inserted into

    • A.

      Slots

    • B.

      Peripheral devices

    • C.

      The CPU

    • D.

      The back of the computer

    • E.

      None of these

    Correct Answer
    A. Slots
    Explanation
    Expansion cards are inserted into slots. These slots are typically found on the motherboard of a computer. Expansion cards are used to add extra functionality to a computer system, such as graphics cards, sound cards, or network cards. By inserting these cards into the available slots, users can enhance the capabilities of their computer and customize it according to their specific needs.

    Rate this question:

  • 22. 

    A device that connects to a network without the use of cable is said to be

    • A.

      Distributed

    • B.

      Non-wired

    • C.

      Centralised

    • D.

      Open source

    • E.

      Wireless

    Correct Answer
    E. Wireless
    Explanation
    A device that connects to a network without the use of cable is said to be wireless. This means that it can communicate and transfer data over a network using radio waves or other wireless signals, eliminating the need for physical cables. Wireless devices are commonly used in modern technology, such as smartphones, laptops, and Wi-Fi routers, allowing for convenient and flexible connectivity.

    Rate this question:

  • 23. 

    A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n)

    • A.

      Workstation

    • B.

      CPU

    • C.

      Magnetic disk

    • D.

      Integrated circuit

    • E.

      Complex circuit

    Correct Answer
    D. Integrated circuit
    Explanation
    An integrated circuit refers to a complete electronic circuit that is built on a small silicon chip and includes transistors and other electronic components. This technology allows for the miniaturization of electronic circuits, making them more efficient and compact. Integrated circuits are commonly used in various electronic devices, such as computers, smartphones, and other electronic systems, due to their small size and high functionality.

    Rate this question:

  • 24. 

    Junk e-mail is also called

    • A.

      Crap

    • B.

      Spoof

    • C.

      Sniffer script

    • D.

      Spool

    • E.

      Spam

    Correct Answer
    E. Spam
    Explanation
    Junk e-mail is commonly referred to as "spam." This term originated from a Monty Python sketch where a group of Vikings repeatedly sang the word "spam," overpowering all other conversation. Similarly, spam emails flood our inboxes, overwhelming legitimate messages with unwanted and often unsolicited content. Hence, the correct answer is "spam."

    Rate this question:

  • 25. 

    A program designed to destroy data on your computer which can travel to "infect" other computers is called a

    • A.

      Disease

    • B.

      Torpedo

    • C.

      Hurricane

    • D.

      Virus

    • E.

      Infector

    Correct Answer
    D. Virus
    Explanation
    A program designed to destroy data on your computer which can travel to "infect" other computers is called a virus. Viruses are malicious software that can replicate themselves and spread to other computers, causing damage to files, programs, and the overall system. They can be introduced through various means, such as email attachments, downloads from untrusted sources, or infected external devices. Once a virus infects a computer, it can execute its destructive actions, potentially leading to data loss, system crashes, and other harmful consequences.

    Rate this question:

  • 26. 

                   shows the files, folders, and drives on your computer, making it easy to navigate from one location to another within the file hierarchy.

    • A.

      Microsoft Internet Explorer

    • B.

      Windows Explorer

    • C.

      My Computer

    • D.

      Folders Manager

    • E.

      Windows Locator

    Correct Answer
    B. Windows Explorer
    Explanation
    Windows Explorer is a file management tool provided by Microsoft that allows users to navigate through the files, folders, and drives on their computer. It provides a graphical interface to easily access and manage files, making it convenient to move from one location to another within the file hierarchy. It is different from Internet Explorer, which is a web browser, and My Computer, which is a window that displays the available drives on the computer. Folders Manager and Windows Locator are not commonly used terms and do not accurately describe the functionality of Windows Explorer.

    Rate this question:

  • 27. 

    The               manual tells you how to use a software program.

    • A.

      Documentation

    • B.

      Programming

    • C.

      User

    • D.

      Technical

    • E.

      Designer

    Correct Answer
    C. User
    Explanation
    The manual provides instructions on how to use a software program, making it a valuable resource for the end-user. It helps them understand the functionality and features of the program, allowing them to navigate and utilize it effectively. The manual may include step-by-step guides, troubleshooting tips, and other relevant information to enhance the user's experience and ensure they can make the most out of the software.

    Rate this question:

  • 28. 

    A collection of interrelated records is called a

    • A.

      Utility file

    • B.

      Management information system

    • C.

      Database

    • D.

      Spreadsheet

    • E.

      Datasheet

    Correct Answer
    C. Database
    Explanation
    A collection of interrelated records is called a database. A database is a structured set of data stored and organized in a way that allows for efficient retrieval, updating, and management of the information. It is designed to store and manage large amounts of data, allowing users to easily access and manipulate the data for various purposes.

    Rate this question:

Back to Top Back to top
Advertisement