Second Period Exam Bachillerato May 2010

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Teacher Alejandro
T
Teacher Alejandro
Community Contributor
Quizzes Created: 3 | Total Attempts: 256
| Attempts: 76 | Questions: 30
Please wait...
Question 1 / 30
0 %
0/100
Score 0/100
1. It's a type of computer threat.

Explanation

A Trojan horse is a type of computer threat that disguises itself as a legitimate program or file, but once installed, it can carry out malicious activities without the user's knowledge. It can steal personal information, damage files, or allow unauthorized access to the computer. Unlike viruses or worms, Trojan horses do not replicate themselves, but they can be just as harmful. It is important to have proper security measures in place, such as antivirus software and regular updates, to protect against Trojan horse attacks.

Submit
Please wait...
About This Quiz
Second Period Exam Bachillerato May 2010 - Quiz

The 'Second Period Exam Bachillerato May 2010' assesses knowledge on various computer-related topics such as types of threats, internet protocols, hardware identification, and data management. It is designed to evaluate understanding of fundamental IT concepts and tools, crucial for students in the field.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. HTTP stands for:

Explanation

HTTP stands for Hyper Text Transfer Protocol. It is a protocol used for transmitting hypertext over the internet. Hypertext refers to text that contains links to other texts, allowing users to navigate between different documents or web pages. The HTTP protocol defines how messages are formatted and transmitted, as well as how web browsers and servers should respond to various requests and commands. It is the foundation of data communication for the World Wide Web.

Submit
3. Html stands for

Explanation

HTML stands for Hyper Text Markup Language. It is a standard markup language used for creating web pages and applications. HTML uses tags to structure the content and define the layout and appearance of the web page. It is the backbone of every web page and is responsible for defining the structure and elements of the page, such as headings, paragraphs, images, links, and more.

Submit
4. What's the name of this hardware?

Explanation

The correct answer is "floppy disk" because a floppy disk is a type of hardware that was commonly used for data storage in the past. It is a portable, magnetic storage device that consists of a thin, flexible disk enclosed in a protective plastic casing. The floppy disk drive is the device used to read and write data onto the floppy disk.

Submit
5. It´s a collection of information gathered in tables and forms:

Explanation

A database is a collection of information gathered in tables and forms. It is a structured way of organizing and storing data, allowing users to easily retrieve and manipulate the information. Unlike other options such as a group, groupwise, hard drive, or my documents, a database specifically refers to a system designed for efficient data management.

Submit
6. It´s a type of compressed file:

Explanation

A zip file is a type of compressed file that is commonly used to compress and package multiple files or folders into a single archive. This archive can then be easily transferred or stored, taking up less space. Zip files are widely supported and can be opened on various operating systems. They are often used for file compression and distribution purposes.

Submit
7. Is a form of computer data storage. Today, it takes the form of integrated circuits that allow stored data to be accessed in any order (i.e., at random). "Random" refers to the idea that any piece of data can be returned in a constant time, regardless of its physical location and whether or not it is related to the previous piece of data.

Explanation

RAM stands for Random Access Memory, which is a form of computer data storage. It is different from other forms of memory like ROM or DVDs because it allows stored data to be accessed in any order, hence the term "random". This means that any piece of data can be retrieved in a constant time, regardless of its physical location or its relation to previous data. RAM is commonly used in computers and other electronic devices as a temporary storage for data that is actively being used by the system or applications.

Submit
8. He is a person who likes to spy in chat rooms

Explanation

A lurker is someone who observes or reads conversations in online chat rooms or forums without actively participating or engaging in the discussions. This person prefers to remain anonymous and simply "lurk" in the background, gathering information or observing others without actively contributing. This behavior is often associated with individuals who enjoy spying or monitoring online interactions without directly participating themselves.

Submit
9. It´s a windows application that blocks access to unwanted programs and stablish privilegies to known programs.

Explanation

A firewall is a type of software or hardware that acts as a barrier between a computer network and the internet, monitoring and controlling incoming and outgoing network traffic. It blocks access to unwanted programs, preventing unauthorized access and potential security threats. It also allows the user to establish privileges for known programs, giving them specific access rights.

Submit
10. It´s a known place or website that the user assigns in the favorites menu to have easy access to it later.

Explanation

A bookmark is a known place or website that a user saves in their favorites menu for easy access later. It allows the user to quickly navigate to their preferred websites without having to search for them again. The term "bookmark" is commonly used to refer to this feature in web browsers.

Submit
11. It´s a type of ISP (Internet Service Provider)

Explanation

DSL stands for Digital Subscriber Line, which is a type of Internet Service Provider. DSL uses existing telephone lines to provide high-speed internet access to users. It works by transmitting digital data over the copper wires of a telephone line, allowing users to access the internet while still being able to use their telephone for voice calls. DSL is a popular choice for residential and small business users who require a reliable and fast internet connection.

Submit
12. It's a type of computer threat where a fake page takes the identity of another pushing the user to provide his password and username in order to send it to another computer.

Explanation

Phishing is a type of computer threat where a fake page is created to mimic a legitimate website or service. The intention is to deceive the user into providing their personal information, such as passwords and usernames, which are then sent to the attacker's computer. This is a form of social engineering attack where the user is tricked into thinking they are interacting with a trusted entity. It is important to be cautious and verify the legitimacy of websites before entering sensitive information to protect against phishing attacks.

Submit
13. It's a system consisting on "0" and "1" only

Explanation

The given system consisting of "0" and "1" only is commonly known as the binary system. In this system, numbers are represented using only two digits, 0 and 1. Each digit in a binary number represents a power of 2. This system is widely used in computer science and digital electronics because it aligns well with the binary nature of electronic circuits, where 0 represents off state and 1 represents on state.

Submit
14. It's a type of software that allows you to transfer printed text to a text editor

Explanation

OCR stands for Optical Character Recognition, which is a technology used to convert printed or handwritten text into editable digital text. It allows users to transfer printed text from documents, images, or scanned copies into a text editor or word processing software. OCR software uses algorithms to analyze the shapes and patterns of characters, recognizing and converting them into text that can be edited, searched, or stored digitally. This technology is commonly used in various applications like document scanning, data entry, and text extraction from images.

Submit
15. It´s a relationship between two files through a word you can click on:

Explanation

A hyperlink is a word or phrase that can be clicked on in a document or webpage to navigate to another location or file. It establishes a relationship between two files by allowing the user to easily access related information. This feature is commonly used in HTML documents and web browsers to create a connected network of webpages.

Submit
16. It's a common error that appears when a page has not been found.

Explanation

The correct answer is 404. This error code is commonly displayed when a webpage cannot be found. It indicates that the requested page does not exist on the server. This can occur due to various reasons such as a broken link, incorrect URL, or the page being removed or relocated. The server responds with a 404 error to inform the user that the requested resource is not available.

Submit
17. It is designed to search for information on the World Wide Web. The search results are usually presented in a list of results and are commonly called hits. The information may consist of web pages, images, information and other types of files

Explanation

A search engine is a tool or software program that is specifically created to search for information on the World Wide Web. It retrieves and presents search results in the form of a list of hits, which can include web pages, images, information, and other types of files. Unlike other options listed, such as a search page, search lab, finding site, or yellow pages, a search engine is specifically designed for web searches and is the most appropriate term to describe this function.

Submit
18. What´s the name of the microsoft application to create databases?

Explanation

Access is the correct answer because it is a Microsoft application specifically designed for creating and managing databases. It allows users to store, organize, and retrieve large amounts of data efficiently. Publisher, OneNote, Picture Viewer, and Lotus are not database creation applications.

Submit
19. What´s number 49 in binary?

Explanation

The binary number system is a base-2 system, meaning it only uses two digits: 0 and 1. To convert decimal number 49 to binary, we divide it by 2 repeatedly and record the remainders. Starting from the right, the remainders are 1, 0, 0, 0, 1, 1. Reversing the order gives us the binary representation 110001. Therefore, the correct answer is 110001.

Submit
20. What´s number 88 in binary?

Explanation

The given binary number 1011000 is equivalent to the decimal number 88. In binary, each digit represents a power of 2, starting from the rightmost digit as 2^0, then 2^1, 2^2, and so on. By adding up the decimal values of the digits that are 1, we get 64 + 16 + 8 = 88. Therefore, the binary number 1011000 is equivalent to the decimal number 88.

Submit
21. What´s number 33 in binary?

Explanation

The correct answer is 100001. This is the binary representation of the decimal number 33. In binary, each digit represents a power of 2, starting from the rightmost digit. So, reading from right to left, the first digit represents 2^0 (which is 1), the second digit represents 2^1 (which is 2), the third digit represents 2^2 (which is 4), and so on. Adding up the values of the digits in the binary representation of 100001, we get 1 + 0 + 0 + 0 + 0 + 32, which equals 33. Therefore, 100001 is the binary representation of 33.

Submit
22. What is the name of the following cable?

Explanation

The correct answer is SATA. SATA stands for Serial Advanced Technology Attachment and it is a type of cable used to connect storage devices such as hard drives and solid-state drives to a computer's motherboard. It replaced the older PATA (Parallel ATA) cable, offering faster data transfer speeds and improved performance. SATA cables are typically red in color, but the color alone is not a reliable indicator of the cable type.

Submit
23. What´s the name of this cable?

Explanation

The correct answer is USB. USB stands for Universal Serial Bus, and it is a common cable used for connecting various devices to a computer. It is used for transferring data, charging devices, and connecting peripherals such as keyboards, mice, and printers. USB cables have become widely adopted due to their versatility and compatibility with a wide range of devices.

Submit
24. Unwanted email is also called:

Explanation

Unwanted email is commonly referred to as "spam". Spam emails are unsolicited messages sent in bulk to a large number of recipients, often for advertising purposes. These emails are typically sent without the consent of the recipients and can be annoying or potentially harmful. Therefore, "spam" is the correct term used to describe unwanted emails.

Submit
25. Who created the first virus? 

Explanation

The correct answer is "Two brothers in Pakistan." This explanation suggests that the first virus was created by two brothers in Pakistan. It implies that the individuals responsible for creating the first virus were not affiliated with NASA, the Taliban, Bill Gates, or Steve Jobs.

Submit
26. What is the name of the following device?

Explanation

The correct answer is CRT. CRT stands for Cathode Ray Tube, which is a device used in older televisions and computer monitors to display images. It works by using an electron beam to illuminate phosphors on a screen, creating the images that we see. LCD, DSL, PLS, and UPS are not the names of this device and are unrelated to CRT technology.

Submit
27. What's the name of the following port?

Explanation

Serial is the correct answer because it is a type of port used for transferring data one bit at a time. It is commonly used for connecting devices such as modems, printers, and mice to a computer. Serial ports are characterized by their small size and use of a serial cable with multiple pins. This distinguishes it from parallel ports, USB ports, HDMI ports, and firewire ports, which have different functionalities and physical characteristics.

Submit
28. What type of device is this?

 

Explanation

This device is an output device because it is used to display or provide information to the user.

Submit
29. Which symbols must be used in this fields?

Explanation

The correct answer is " " and ;. These symbols are commonly used in fields where multiple values or options need to be separated or indicated. The symbol " " (space) is used to separate words or values, while the symbol ; (semicolon) is used to separate multiple values or options within a field. These symbols help to organize and differentiate the information in the field, making it easier to read and understand.

Submit
30. What type of device is this?

Explanation

This device is classified as an input device because it is used to input data or information into a computer or electronic system.

Submit
View My Results

Quiz Review Timeline (Updated): Jan 22, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 22, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • May 11, 2010
    Quiz Created by
    Teacher Alejandro
Cancel
  • All
    All (30)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
It's a type of computer threat.
HTTP stands for:
Html stands for
What's the name of this hardware?
It´s a collection of information gathered in tables and forms:
It´s a type of compressed file:
Is a form of computer data storage. Today, it takes the form of...
He is a person who likes to spy in chat rooms
It´s a windows application that blocks access to unwanted programs...
It´s a known place or website that the user assigns in the favorites...
It´s a type of ISP (Internet Service Provider)
It's a type of computer threat where a fake page takes the identity of...
It's a system consisting on "0" and "1" only
It's a type of software that allows you to transfer printed text to a...
It´s a relationship between two files through a word you can click...
It's a common error that appears when a page has not been found.
It is designed to search for information on the World Wide Web. The...
What´s the name of the microsoft application to create databases?
What´s number 49 in binary?
What´s number 88 in binary?
What´s number 33 in binary?
What is the name of the following cable?
What´s the name of this cable?
Unwanted email is also called:
Who created the first virus? 
What is the name of the following device?
What's the name of the following port?
What type of device is this? 
Which symbols must be used in this fields?
What type of device is this?
Alert!

Advertisement