Are you looking for a trivia quiz to refresh what you know about computer application? The test below is guaranteed to help you understand computers a little easier, and all you have to do is ensure that you read the questions carefully and give the best answer you can. All the best and keep an eye out for other quizzes like this.
a. Data is recorded optically and magnetically
B. When using single-sided dual layer recording, they have a maximum storage capacity that is approximately four times that of a CD-ROM.
C. There are three types: read-only, recordable, and rewritable
d. They can be read by a CD-ROM drive
170
480
310
78,650
a. ergonomic mouse
b. mechanical mouse
C. optical mouse
d. audio mouse
3.5
3.1
3.8
3.375
0.42
1.17
0.60
0.86
210
110
410
310
4
7
3
8
a. It supports file’s I/O
B. It includes the header , which support I/O
c. It declares the iostream class which support I/O
d. It defines cin and cout class
A
B
C
D
A. Depth-first search
b. Depth-limited search
c. Uniformed-cost search
d. Iterative deepening search
A. SELECT employee_name FROM human_resource WHERE salary>=300000
b. SELECT employee_name COUNT(*) FROM human_resource WHERE salary>=300000 GROUPBY employee_name
c. SELECT employee_name, salary FROM human_resource GROUPBY salary HAVING COUNT(*)>300000
D. SELECT salary FROM human_resource WHERE employee_name>=300000 GROUPBY salary
A. Extract the specific columns from the table
b. Create a table by combining inquiry results from one table and the ones of the other table
c. Extract the rows satisfying specific conditions from the table
d. Create a new table by combining tuples satisfying conditions from tuples in more than two tables
a. Control and displays are organized to reflect the order of their use
b. Control and displays are organized to how long they do their process
c. Control and displays are organized to how frequently they are used
d. Control and displays are organized so that those that are functionally related are placed together
a. usability test
b. Rubin’s comparison test
c. heuristic evaluation
d. pluralistic walkthrough
CAI
CAM
CAD
CIM
a. Relates the IP address to the domain name and host name
b. Carries out communication processing on behalf of the client.
c. Dynamically allocates the IP address to the client
d. Enables remote access to intranets
A. A modem performs recovery from bit errors and the like according to a transmission control procedure.
b. A modem exchanges data based on the dialed number and address of the remote party in the communication
c. Analog signals on communication lines are configured differently from digital signals used by computers and terminals, so modems handle the translation of both.
d. A modem assembles transmission data in packet format and disassembles (takes out data from) received packets
a. TCP/IP
b. CSMA/CD
ISDN
ATM
A. Converts protocols, including protocols of levels higher than the transport layer, and allows interconnection of networks having different network architectures
b. Connects at the network layer and is used for interconnecting LAN systems to wide area network
c. Connects at the data-link layer and has traffic separating function
d. Connects at the physical layer and is used to extend the connection distance
MPEG
JPEG
NTSC
PCM
a. Compare to circuit switching, the latency within the network is short
b. Packet switching service is not possible with ISDN.
c. In order to carry out communication by packet switching, both the sender and the receiver must be packet mode terminals. (PT)
d. By setting multiple logical circuits, concurrent communication with multiple parties can be performed using one physical line
254
a. 65,534
d. 16,777,214
126
a. In order to ensure e-mail confidentiality, it is necessary to employ preventive measures such as encryption
B. Text files created with word processing programs and the file are translated into a computer’s internal code, so there is no risk that their contents will be read on the communication path
c. In order to ensure e-mail confidentiality, it is necessary to request the provider connecting the sender to register a receiver’s ID
d. When e-mail is transmitted, a one-to-one id established with the remote party based on the remote party’s address. Therefore, confidentiality is ensured
a. Valuations of critical assets
b. A detailed listing of relevant threats
c. Definition of business recovery roles
D. Likelihood of a potential threat
a. When a user ID is to be deleted, an adequate time interval should be taken after the termination of its use has been notified
B. When privileges are set for a user ID, they should be minimized
C. All the users involved in the same project should use the same user ID
D. A user having multiple user IDs should set the same password for all the IDs
Wait!
Here's an interesting quiz for you.