Are you looking for a trivia quiz to refresh what you know about computer application? The test below is guaranteed to help you understand computers a little easier, and all you have to do is ensure that you read the questions carefully and give the best answer you can. All the best and keep an eye out for other quizzes See morelike this.
170
480
310
78,650
Rate this question:
a. ergonomic mouse
b. mechanical mouse
C. optical mouse
d. audio mouse
Rate this question:
3.5
3.1
3.8
3.375
Rate this question:
0.42
1.17
0.60
0.86
Rate this question:
210
110
410
310
Rate this question:
4
7
3
8
Rate this question:
a. It supports file’s I/O
B. It includes the header , which support I/O
c. It declares the iostream class which support I/O
d. It defines cin and cout class
Rate this question:
A
B
C
D
Rate this question:
A. Depth-first search
b. Depth-limited search
c. Uniformed-cost search
d. Iterative deepening search
Rate this question:
A. SELECT employee_name FROM human_resource WHERE salary>=300000
b. SELECT employee_name COUNT(*) FROM human_resource WHERE salary>=300000 GROUPBY employee_name
c. SELECT employee_name, salary FROM human_resource GROUPBY salary HAVING COUNT(*)>300000
D. SELECT salary FROM human_resource WHERE employee_name>=300000 GROUPBY salary
Rate this question:
A. Extract the specific columns from the table
b. Create a table by combining inquiry results from one table and the ones of the other table
c. Extract the rows satisfying specific conditions from the table
d. Create a new table by combining tuples satisfying conditions from tuples in more than two tables
Rate this question:
a. Control and displays are organized to reflect the order of their use
b. Control and displays are organized to how long they do their process
c. Control and displays are organized to how frequently they are used
d. Control and displays are organized so that those that are functionally related are placed together
Rate this question:
a. usability test
b. Rubin’s comparison test
c. heuristic evaluation
d. pluralistic walkthrough
Rate this question:
CAI
CAM
CAD
CIM
Rate this question:
a. Relates the IP address to the domain name and host name
b. Carries out communication processing on behalf of the client.
c. Dynamically allocates the IP address to the client
d. Enables remote access to intranets
Rate this question:
A. A modem performs recovery from bit errors and the like according to a transmission control procedure.
b. A modem exchanges data based on the dialed number and address of the remote party in the communication
c. Analog signals on communication lines are configured differently from digital signals used by computers and terminals, so modems handle the translation of both.
d. A modem assembles transmission data in packet format and disassembles (takes out data from) received packets
Rate this question:
a. TCP/IP
b. CSMA/CD
ISDN
ATM
Rate this question:
A. Converts protocols, including protocols of levels higher than the transport layer, and allows interconnection of networks having different network architectures
b. Connects at the network layer and is used for interconnecting LAN systems to wide area network
c. Connects at the data-link layer and has traffic separating function
d. Connects at the physical layer and is used to extend the connection distance
Rate this question:
MPEG
JPEG
NTSC
PCM
Rate this question:
a. Compare to circuit switching, the latency within the network is short
b. Packet switching service is not possible with ISDN.
c. In order to carry out communication by packet switching, both the sender and the receiver must be packet mode terminals. (PT)
d. By setting multiple logical circuits, concurrent communication with multiple parties can be performed using one physical line
Rate this question:
254
a. 65,534
d. 16,777,214
126
Rate this question:
a. In order to ensure e-mail confidentiality, it is necessary to employ preventive measures such as encryption
B. Text files created with word processing programs and the file are translated into a computer’s internal code, so there is no risk that their contents will be read on the communication path
c. In order to ensure e-mail confidentiality, it is necessary to request the provider connecting the sender to register a receiver’s ID
d. When e-mail is transmitted, a one-to-one id established with the remote party based on the remote party’s address. Therefore, confidentiality is ensured
Rate this question:
a. Valuations of critical assets
b. A detailed listing of relevant threats
c. Definition of business recovery roles
D. Likelihood of a potential threat
Rate this question:
a. When a user ID is to be deleted, an adequate time interval should be taken after the termination of its use has been notified
B. When privileges are set for a user ID, they should be minimized
C. All the users involved in the same project should use the same user ID
D. A user having multiple user IDs should set the same password for all the IDs
Rate this question:
A. I stands for integrity
b. A stands for authorization
c. C stands for confidentiality
d. A stands for availabilit
Rate this question:
a. It it is possible to set the term of validity of passwords, the term should be used for checking password validation.
b. The security managers should regularly check whether or not passwords can be easily guessed, and recommend that problem passwords be changed
c. The depatment should recommend that users record their passwords in their notebooks in order to minimize the frequency of inquiring about their passwords
d. Even if a password file records encrypted passwords, the department should make it inaccessible to general users
a. Activating the system from an infected floppy disk loads the macro virus into the main meory, and then the virus infects the boot sectors of other floppy disks.
b. A macro virus infects document files opened or newly created after an infected document file is opened.
c. Since it can be easily determined as to whether a macro function is infected by a virus, infection can be prevented at the time of opening a document file
d. The execution of an infected application loads in the macro virus into the main memory, and in this process, the virus infects program files of other applications.
A. An experimental product is produced in an early phase of system development, enabling the removing of ambiguities and differences in recognition between the user and development organizations.
B. Work is performed in the order of basic planning, external design, internal design, program design, programming and test. Therefore, with the technique, a perspective of the work as a whole is gained, making the determination of schedules and allocation of resources easier
C. A large-scale application is broken down into sub-units, each of which is highly independent. Then, for each sub-unit, the process of design, programming and test is repeated, gradually expanding the development area.
d. The software is classified into software whose specifications are fixed and do not require modification, and software whose specifications require modification. Then, for the software whose specifications require modification, the process of development, reconsideration and modification is repeated
Rate this question:
a. The cause-effect graph
B. The experimental design method
c. Equivalence partitioning
d. Condition coverage
Rate this question:
a. In view of profitability, businesses have increased the degree of manufacturing internally without outsourcing systems or operations to external companies.
b. To cut costs or to shorten software development time, applications have been developed based on orders received rather than by use of package software
c. So-called "end-user computing," in which users by themselves build systems and have access to or process information for their own applications, is gaining support
d. Widely spreading use of networks reduces the range affected by a system failure, making security management easier.
a. System tests
B. Regression tes
c. Linkage tests
d. Operation tests
Rate this question:
a. Codes should be assigned to make data classification easier, but the addition or expansion of codes should not be considered
b. It is desirable that codes are understandable by themselves. Therefore, the use of longer code is better.
c. Codes inevitably vary, so it is important to put code books in order and to manage them
d. Numerals should mainly be used as codes, and Chinese characters should not be used
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.