Second Period Exam Bachillerato May 2010

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Teacher Alejandro
T
Teacher Alejandro
Community Contributor
Quizzes Created: 4 | Total Attempts: 326
Questions: 30 | Attempts: 73

SettingsSettingsSettings
Second Period Exam Bachillerato May 2010 - Quiz

Choose the best answer.


Questions and Answers
  • 1. 

    It's a type of computer threat.

    • A.

      Trojan horse

    • B.

      Firewall

    • C.

      Hotswappable

    • D.

      Updates

    • E.

      Windows toolbar

    Correct Answer
    A. Trojan horse
    Explanation
    A Trojan horse is a type of computer threat that disguises itself as a legitimate program or file, but once installed, it can carry out malicious activities without the user's knowledge. It can steal personal information, damage files, or allow unauthorized access to the computer. Unlike viruses or worms, Trojan horses do not replicate themselves, but they can be just as harmful. It is important to have proper security measures in place, such as antivirus software and regular updates, to protect against Trojan horse attacks.

    Rate this question:

  • 2. 

    HTTP stands for:

    • A.

      Hyper transfer text protocol

    • B.

      Hyper text transfer process

    • C.

      Hyper transferece total protocol

    • D.

      Hyper text markup language

    • E.

      Hyper text transfer protocol

    Correct Answer
    E. Hyper text transfer protocol
    Explanation
    HTTP stands for Hyper Text Transfer Protocol. It is a protocol used for transmitting hypertext over the internet. Hypertext refers to text that contains links to other texts, allowing users to navigate between different documents or web pages. The HTTP protocol defines how messages are formatted and transmitted, as well as how web browsers and servers should respond to various requests and commands. It is the foundation of data communication for the World Wide Web.

    Rate this question:

  • 3. 

    Html stands for

    • A.

      Hyper text transfer language

    • B.

      Hyper text transfer lock

    • C.

      Hyper technology transfer language

    • D.

      Hyper text markup language

    • E.

      Hyper text modified language

    Correct Answer
    D. Hyper text markup language
    Explanation
    HTML stands for Hyper Text Markup Language. It is a standard markup language used for creating web pages and applications. HTML uses tags to structure the content and define the layout and appearance of the web page. It is the backbone of every web page and is responsible for defining the structure and elements of the page, such as headings, paragraphs, images, links, and more.

    Rate this question:

  • 4. 

    What's the name of this hardware?

    • A.

      Floppy disk drive

    • B.

      Hard drive

    • C.

      Floppy disk

    • D.

      Optical drive

    • E.

      Flexible drive

    Correct Answer
    C. Floppy disk
    Explanation
    The correct answer is "floppy disk" because a floppy disk is a type of hardware that was commonly used for data storage in the past. It is a portable, magnetic storage device that consists of a thin, flexible disk enclosed in a protective plastic casing. The floppy disk drive is the device used to read and write data onto the floppy disk.

    Rate this question:

  • 5. 

    It´s a collection of information gathered in tables and forms:

    • A.

      Group

    • B.

      Database

    • C.

      Groupwise

    • D.

      Hard drive

    • E.

      My documents

    Correct Answer
    B. Database
    Explanation
    A database is a collection of information gathered in tables and forms. It is a structured way of organizing and storing data, allowing users to easily retrieve and manipulate the information. Unlike other options such as a group, groupwise, hard drive, or my documents, a database specifically refers to a system designed for efficient data management.

    Rate this question:

  • 6. 

    It´s a type of compressed file:

    • A.

      Pdf

    • B.

      Xml

    • C.

      Zip

    • D.

      Comp

    • E.

      Jar

    Correct Answer
    C. Zip
    Explanation
    A zip file is a type of compressed file that is commonly used to compress and package multiple files or folders into a single archive. This archive can then be easily transferred or stored, taking up less space. Zip files are widely supported and can be opened on various operating systems. They are often used for file compression and distribution purposes.

    Rate this question:

  • 7. 

    Is a form of computer data storage. Today, it takes the form of integrated circuits that allow stored data to be accessed in any order (i.e., at random). "Random" refers to the idea that any piece of data can be returned in a constant time, regardless of its physical location and whether or not it is related to the previous piece of data.

    • A.

      Static

    • B.

      Dynamic

    • C.

      ROM

    • D.

      RAM

    • E.

      DVD

    Correct Answer
    D. RAM
    Explanation
    RAM stands for Random Access Memory, which is a form of computer data storage. It is different from other forms of memory like ROM or DVDs because it allows stored data to be accessed in any order, hence the term "random". This means that any piece of data can be retrieved in a constant time, regardless of its physical location or its relation to previous data. RAM is commonly used in computers and other electronic devices as a temporary storage for data that is actively being used by the system or applications.

    Rate this question:

  • 8. 

    He is a person who likes to spy in chat rooms

    • A.

      Netiquette

    • B.

      Spytech

    • C.

      Social engineer

    • D.

      Hacker

    • E.

      Lurker

    Correct Answer
    E. Lurker
    Explanation
    A lurker is someone who observes or reads conversations in online chat rooms or forums without actively participating or engaging in the discussions. This person prefers to remain anonymous and simply "lurk" in the background, gathering information or observing others without actively contributing. This behavior is often associated with individuals who enjoy spying or monitoring online interactions without directly participating themselves.

    Rate this question:

  • 9. 

    It´s a windows application that blocks access to unwanted programs and stablish privilegies to known programs.

    • A.

      Firewall

    • B.

      Firewire

    • C.

      Firefox

    • D.

      Firefighter

    • E.

      Firedoor

    Correct Answer
    A. Firewall
    Explanation
    A firewall is a type of software or hardware that acts as a barrier between a computer network and the internet, monitoring and controlling incoming and outgoing network traffic. It blocks access to unwanted programs, preventing unauthorized access and potential security threats. It also allows the user to establish privileges for known programs, giving them specific access rights.

    Rate this question:

  • 10. 

    It´s a known place or website that the user assigns in the favorites menu to have easy access to it later.

    • A.

      Markup

    • B.

      Notebookmark

    • C.

      Notemark

    • D.

      Bookmark

    • E.

      Lurkmark

    Correct Answer
    D. Bookmark
    Explanation
    A bookmark is a known place or website that a user saves in their favorites menu for easy access later. It allows the user to quickly navigate to their preferred websites without having to search for them again. The term "bookmark" is commonly used to refer to this feature in web browsers.

    Rate this question:

  • 11. 

    It´s a type of ISP (Internet Service Provider)

    • A.

      DSL

    • B.

      DHL

    • C.

      UPS

    • D.

      LEX

    • E.

      IDE

    Correct Answer
    A. DSL
    Explanation
    DSL stands for Digital Subscriber Line, which is a type of Internet Service Provider. DSL uses existing telephone lines to provide high-speed internet access to users. It works by transmitting digital data over the copper wires of a telephone line, allowing users to access the internet while still being able to use their telephone for voice calls. DSL is a popular choice for residential and small business users who require a reliable and fast internet connection.

    Rate this question:

  • 12. 

    It's a type of computer threat where a fake page takes the identity of another pushing the user to provide his password and username in order to send it to another computer.

    • A.

      Lurking

    • B.

      Spam

    • C.

      Malware

    • D.

      Computer assult

    • E.

      Phishing

    Correct Answer
    E. Phishing
    Explanation
    Phishing is a type of computer threat where a fake page is created to mimic a legitimate website or service. The intention is to deceive the user into providing their personal information, such as passwords and usernames, which are then sent to the attacker's computer. This is a form of social engineering attack where the user is tricked into thinking they are interacting with a trusted entity. It is important to be cautious and verify the legitimacy of websites before entering sensitive information to protect against phishing attacks.

    Rate this question:

  • 13. 

    It's a system consisting on "0" and "1" only

    • A.

      Decimal

    • B.

      Binary

    • C.

      Hexadecimal

    • D.

      Cero one

    • E.

      One cero

    Correct Answer
    B. Binary
    Explanation
    The given system consisting of "0" and "1" only is commonly known as the binary system. In this system, numbers are represented using only two digits, 0 and 1. Each digit in a binary number represents a power of 2. This system is widely used in computer science and digital electronics because it aligns well with the binary nature of electronic circuits, where 0 represents off state and 1 represents on state.

    Rate this question:

  • 14. 

    It's a type of software that allows you to transfer printed text to a text editor

    • A.

      Roc

    • B.

      Cor

    • C.

      Dor

    • D.

      Ocr

    • E.

      Ord

    Correct Answer
    D. Ocr
    Explanation
    OCR stands for Optical Character Recognition, which is a technology used to convert printed or handwritten text into editable digital text. It allows users to transfer printed text from documents, images, or scanned copies into a text editor or word processing software. OCR software uses algorithms to analyze the shapes and patterns of characters, recognizing and converting them into text that can be edited, searched, or stored digitally. This technology is commonly used in various applications like document scanning, data entry, and text extraction from images.

    Rate this question:

  • 15. 

    It´s a relationship between two files through a word you can click on:

    • A.

      Hyperlink

    • B.

      Browser

    • C.

      Related site

    • D.

      Html

    • E.

      Spam

    Correct Answer
    A. Hyperlink
    Explanation
    A hyperlink is a word or phrase that can be clicked on in a document or webpage to navigate to another location or file. It establishes a relationship between two files by allowing the user to easily access related information. This feature is commonly used in HTML documents and web browsers to create a connected network of webpages.

    Rate this question:

  • 16. 

    It's a common error that appears when a page has not been found.

    • A.

      202e

    • B.

      602

    • C.

      Error page loading

    • D.

      404

    • E.

      Sorry

    Correct Answer
    D. 404
    Explanation
    The correct answer is 404. This error code is commonly displayed when a webpage cannot be found. It indicates that the requested page does not exist on the server. This can occur due to various reasons such as a broken link, incorrect URL, or the page being removed or relocated. The server responds with a 404 error to inform the user that the requested resource is not available.

    Rate this question:

  • 17. 

    It is designed to search for information on the World Wide Web. The search results are usually presented in a list of results and are commonly called hits. The information may consist of web pages, images, information and other types of files

    • A.

      Search page

    • B.

      Search lab

    • C.

      Finding site

    • D.

      Search engine

    • E.

      Yellow pages

    Correct Answer
    D. Search engine
    Explanation
    A search engine is a tool or software program that is specifically created to search for information on the World Wide Web. It retrieves and presents search results in the form of a list of hits, which can include web pages, images, information, and other types of files. Unlike other options listed, such as a search page, search lab, finding site, or yellow pages, a search engine is specifically designed for web searches and is the most appropriate term to describe this function.

    Rate this question:

  • 18. 

    What´s the name of the microsoft application to create databases?

    • A.

      Publisher

    • B.

      One note

    • C.

      Picture viewer

    • D.

      Access

    • E.

      Lotus

    Correct Answer
    D. Access
    Explanation
    Access is the correct answer because it is a Microsoft application specifically designed for creating and managing databases. It allows users to store, organize, and retrieve large amounts of data efficiently. Publisher, OneNote, Picture Viewer, and Lotus are not database creation applications.

    Rate this question:

  • 19. 

    What´s number 49 in binary?

    • A.

      001110

    • B.

      100010

    • C.

      011001

    • D.

      101010

    • E.

      110001

    Correct Answer
    E. 110001
    Explanation
    The binary number system is a base-2 system, meaning it only uses two digits: 0 and 1. To convert decimal number 49 to binary, we divide it by 2 repeatedly and record the remainders. Starting from the right, the remainders are 1, 0, 0, 0, 1, 1. Reversing the order gives us the binary representation 110001. Therefore, the correct answer is 110001.

    Rate this question:

  • 20. 

    What´s number 88 in binary?

    • A.

      0100111

    • B.

      1011000

    • C.

      1000111

    • D.

      0101010

    • E.

      010011

    Correct Answer
    B. 1011000
    Explanation
    The given binary number 1011000 is equivalent to the decimal number 88. In binary, each digit represents a power of 2, starting from the rightmost digit as 2^0, then 2^1, 2^2, and so on. By adding up the decimal values of the digits that are 1, we get 64 + 16 + 8 = 88. Therefore, the binary number 1011000 is equivalent to the decimal number 88.

    Rate this question:

  • 21. 

    What´s number 33 in binary?

    • A.

      011110

    • B.

      100000

    • C.

      100001

    • D.

      101010

    • E.

      000111

    Correct Answer
    C. 100001
    Explanation
    The correct answer is 100001. This is the binary representation of the decimal number 33. In binary, each digit represents a power of 2, starting from the rightmost digit. So, reading from right to left, the first digit represents 2^0 (which is 1), the second digit represents 2^1 (which is 2), the third digit represents 2^2 (which is 4), and so on. Adding up the values of the digits in the binary representation of 100001, we get 1 + 0 + 0 + 0 + 0 + 32, which equals 33. Therefore, 100001 is the binary representation of 33.

    Rate this question:

  • 22. 

    What is the name of the following cable?

    • A.

      ATA

    • B.

      PATA

    • C.

      SATA

    • D.

      FDD

    • E.

      RED CABLE

    Correct Answer
    C. SATA
    Explanation
    The correct answer is SATA. SATA stands for Serial Advanced Technology Attachment and it is a type of cable used to connect storage devices such as hard drives and solid-state drives to a computer's motherboard. It replaced the older PATA (Parallel ATA) cable, offering faster data transfer speeds and improved performance. SATA cables are typically red in color, but the color alone is not a reliable indicator of the cable type.

    Rate this question:

  • 23. 

    What´s the name of this cable?

    • A.

      HDMI

    • B.

      ATX

    • C.

      RJ45

    • D.

      USB

    • E.

      SUV

    Correct Answer
    D. USB
    Explanation
    The correct answer is USB. USB stands for Universal Serial Bus, and it is a common cable used for connecting various devices to a computer. It is used for transferring data, charging devices, and connecting peripherals such as keyboards, mice, and printers. USB cables have become widely adopted due to their versatility and compatibility with a wide range of devices.

    Rate this question:

  • 24. 

    Unwanted email is also called:

    • A.

      Phishing

    • B.

      Trash

    • C.

      Inbox

    • D.

      Spam

    • E.

      Outbox

    Correct Answer
    D. Spam
    Explanation
    Unwanted email is commonly referred to as "spam". Spam emails are unsolicited messages sent in bulk to a large number of recipients, often for advertising purposes. These emails are typically sent without the consent of the recipients and can be annoying or potentially harmful. Therefore, "spam" is the correct term used to describe unwanted emails.

    Rate this question:

  • 25. 

    Who created the first virus? 

    • A.

      Engineers at the NASA

    • B.

      Taliban members

    • C.

      Bill gates

    • D.

      Two brothers in Pakistan

    • E.

      Steve Jobs

    Correct Answer
    D. Two brothers in Pakistan
    Explanation
    The correct answer is "Two brothers in Pakistan." This explanation suggests that the first virus was created by two brothers in Pakistan. It implies that the individuals responsible for creating the first virus were not affiliated with NASA, the Taliban, Bill Gates, or Steve Jobs.

    Rate this question:

  • 26. 

    What is the name of the following device?

    • A.

      LCD

    • B.

      DSL

    • C.

      PLS

    • D.

      UPS

    • E.

      CRT

    Correct Answer
    E. CRT
    Explanation
    The correct answer is CRT. CRT stands for Cathode Ray Tube, which is a device used in older televisions and computer monitors to display images. It works by using an electron beam to illuminate phosphors on a screen, creating the images that we see. LCD, DSL, PLS, and UPS are not the names of this device and are unrelated to CRT technology.

    Rate this question:

  • 27. 

    What's the name of the following port?

    • A.

      Serial

    • B.

      Parallel

    • C.

      Usb

    • D.

      Hdmi

    • E.

      Firewire

    Correct Answer
    A. Serial
    Explanation
    Serial is the correct answer because it is a type of port used for transferring data one bit at a time. It is commonly used for connecting devices such as modems, printers, and mice to a computer. Serial ports are characterized by their small size and use of a serial cable with multiple pins. This distinguishes it from parallel ports, USB ports, HDMI ports, and firewire ports, which have different functionalities and physical characteristics.

    Rate this question:

  • 28. 

    What type of device is this? 

    • A.

      Output

    • B.

      Input

    • C.

      Both

    Correct Answer
    A. Output
    Explanation
    This device is an output device because it is used to display or provide information to the user.

    Rate this question:

  • 29. 

    Which symbols must be used in this fields?

    • A.

      " " and ;

    • B.

      ., and

    • C.

      , and:

    • D.

      . and .,

    • E.

      " " and .,

    Correct Answer
    A. " " and ;
    Explanation
    The correct answer is " " and ;. These symbols are commonly used in fields where multiple values or options need to be separated or indicated. The symbol " " (space) is used to separate words or values, while the symbol ; (semicolon) is used to separate multiple values or options within a field. These symbols help to organize and differentiate the information in the field, making it easier to read and understand.

    Rate this question:

  • 30. 

    What type of device is this?

    • A.

      Input

    • B.

      Output

    • C.

      Both

    Correct Answer
    A. Input
    Explanation
    This device is classified as an input device because it is used to input data or information into a computer or electronic system.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 15, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 11, 2010
    Quiz Created by
    Teacher Alejandro
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.