Trivia Quiz On Computer Application

33 Questions | Total Attempts: 1033

SettingsSettingsSettings
Trivia Quiz On Computer Application - Quiz

Are you looking for a trivia quiz to refresh what you know about computer application? The test below is guaranteed to help you understand computers a little easier, and all you have to do is ensure that you read the questions carefully and give the best answer you can. All the best and keep an eye out for other quizzes like this.


Questions and Answers
  • 1. 
    Which of the following statements concerning DVDs is true?
    • A. 

      a. Data is recorded optically and magnetically

    • B. 

      B. When using single-sided dual layer recording, they have a maximum storage capacity that is approximately four times that of a CD-ROM.

    • C. 

      C. There are three types: read-only, recordable, and rewritable

    • D. 

      d. They can be read by a CD-ROM drive

  • 2. 
    If an image, whose height and width in pixels is 480 dots and 640 dots, repspectively, is represented in 256 types of colors: approximtely how many kilobytes would be required in order to save this data in a storage device? It should be noted that no compression process is performed.
    • A. 

      170

    • B. 

      480

    • C. 

      310

    • D. 

      78,650

  • 3. 
    A( n) _____ uses devices that emit and sense light to detect the mouse’s movement.
    • A. 

      a. ergonomic mouse

    • B. 

      b. mechanical mouse

    • C. 

      C. optical mouse

    • D. 

      d. audio mouse

  • 4. 
    Which of these values represents in decimal numbers the result of the addtion of the binary numbers 1.1011 and 1.1101?
    • A. 

      3.5

    • B. 

      3.1

    • C. 

      3.8

    • D. 

      3.375

  • 5. 
    How long would it take a 50MIPS computer to process 30 million instructions? (Round to two digits.) Assume a processor duty ratio of 70%, and ignore OS overhead.
    • A. 

      0.42

    • B. 

      1.17

    • C. 

      0.60

    • D. 

      0.86

  • 6. 
    Given this fragment of code: int f1 (int a=20; int b=20) { return a*b; } int f2(int a=10; int b=10) { return (b+f1(a)); } Which values should be the return result if we call: f2( )?
    • A. 

      210

    • B. 

      110

    • C. 

      410

    • D. 

      310

  • 7. 
    Consider this function declaration: ------------------------------------------------ void quiz(int i) { if (i > 1) { quiz(i / 2); quiz(i / 2); } cout << "*"; } ------------------------------------------------ How many asterisks are printed by the function call quiz(5)?
    • A. 

      4

    • B. 

      7

    • C. 

      3

    • D. 

      8

  • 8. 
    What does #include do?
    • A. 

      a. It supports file’s I/O

    • B. 

      B. It includes the header , which support I/O

    • C. 

      c. It declares the iostream class which support I/O

    • D. 

      d. It defines cin and cout class

  • 9. 
    Which of the following combinations of CPU clock frequencies and CPI (Cycles Per Instruction) values shown in the table below will result in the shortest time required to execute a program containing a given number of instructions?
    • A. 

      A

    • B. 

      B

    • C. 

      C

    • D. 

      D

  • 10. 
      If the heuristic function in an A* search algorithm is h( n) = 0, this A* search algorithm becomes which of the following algorithms?
    • A. 

      A. Depth-first search

    • B. 

      b. Depth-limited search

    • C. 

      c. Uniformed-cost search

    • D. 

      d. Iterative deepening search

  • 11. 
    Which of the following SQL statements can extract employee_name has whose salary is 300,000 or higher from the table human_resource?
    • A. 

      A. SELECT employee_name FROM human_resource WHERE salary>=300000

    • B. 

      b. SELECT employee_name COUNT(*) FROM human_resource WHERE salary>=300000 GROUPBY employee_name

    • C. 

      c. SELECT employee_name, salary FROM human_resource GROUPBY salary HAVING COUNT(*)>300000

    • D. 

      D. SELECT salary FROM human_resource WHERE employee_name>=300000 GROUPBY salary

  • 12. 
    Regarding relational database manipulation, which of the following statements correctly explains projection?
    • A. 

      A. Extract the specific columns from the table

    • B. 

      b. Create a table by combining inquiry results from one table and the ones of the other table

    • C. 

      c. Extract the rows satisfying specific conditions from the table

    • D. 

      d. Create a new table by combining tuples satisfying conditions from tuples in more than two tables

  • 13. 
    Which of the following descriptions related to the term Sequential is correct?
    • A. 

      a. Control and displays are organized to reflect the order of their use

    • B. 

      b. Control and displays are organized to how long they do their process

    • C. 

      c. Control and displays are organized to how frequently they are used

    • D. 

      d. Control and displays are organized so that those that are functionally related are placed together

  • 14. 
    A method that does not require human participants serving as test users is the
    • A. 

      a. usability test

    • B. 

      b. Rubin’s comparison test

    • C. 

      c. heuristic evaluation

    • D. 

      d. pluralistic walkthrough

  • 15. 
    Which of the following improve drawing and designing efficiency by using computer for designing industrial products and building constructions?
    • A. 

      CAI

    • B. 

      CAM

    • C. 

      CAD

    • D. 

      CIM

  • 16. 
    Which is the correct explanation of the role played by a DNS server?
    • A. 

      a. Relates the IP address to the domain name and host name

    • B. 

      b. Carries out communication processing on behalf of the client.

    • C. 

      c. Dynamically allocates the IP address to the client

    • D. 

      d. Enables remote access to intranets

  • 17. 
    Which of the following is suitable as a description of the functions of a modem?
    • A. 

      A. A modem performs recovery from bit errors and the like according to a transmission control procedure.

    • B. 

      b. A modem exchanges data based on the dialed number and address of the remote party in the communication

    • C. 

      c. Analog signals on communication lines are configured differently from digital signals used by computers and terminals, so modems handle the translation of both.

    • D. 

      d. A modem assembles transmission data in packet format and disassembles (takes out data from) received packets

  • 18. 
    Which of the following protocols has become a worldwide de facto standard? The protocol is used by the ARPANET in the USA, and is built into the UNIX system
    • A. 

      a. TCP/IP

    • B. 

      b. CSMA/CD

    • C. 

      ISDN

    • D. 

      ATM

  • 19. 
    What is the appropriate description of a router?
    • A. 

      A. Converts protocols, including protocols of levels higher than the transport layer, and allows interconnection of networks having different network architectures

    • B. 

      b. Connects at the network layer and is used for interconnecting LAN systems to wide area network

    • C. 

      c. Connects at the data-link layer and has traffic separating function

    • D. 

      d. Connects at the physical layer and is used to extend the connection distance

  • 20. 
    Which of the following is an international standard for a video image compression coding system?
    • A. 

      MPEG

    • B. 

      JPEG

    • C. 

      NTSC

    • D. 

      PCM

  • 21. 
    What is the correct description of packet switching?
    • A. 

      a. Compare to circuit switching, the latency within the network is short

    • B. 

      b. Packet switching service is not possible with ISDN.

    • C. 

      c. In order to carry out communication by packet switching, both the sender and the receiver must be packet mode terminals. (PT)

    • D. 

      d. By setting multiple logical circuits, concurrent communication with multiple parties can be performed using one physical line

  • 22. 
    What is the maximum number of host address that can be set within the one and same subnet when the 255.255.255.0 subnet mask is used with the Class B IP address?
    • A. 

      254

    • B. 

      a. 65,534

    • C. 

      d. 16,777,214

    • D. 

      126

  • 23. 
    Which of the following is suitable as a description of e-mail confidentiality on the Internet?
    • A. 

      a. In order to ensure e-mail confidentiality, it is necessary to employ preventive measures such as encryption

    • B. 

      B. Text files created with word processing programs and the file are translated into a computer’s internal code, so there is no risk that their contents will be read on the communication path

    • C. 

      c. In order to ensure e-mail confidentiality, it is necessary to request the provider connecting the sender to register a receiver’s ID

    • D. 

      d. When e-mail is transmitted, a one-to-one id established with the remote party based on the remote party’s address. Therefore, confidentiality is ensured

  • 24. 
    Which choice below is NOT a common result of a risk analysis?
    • A. 

      a. Valuations of critical assets

    • B. 

      b. A detailed listing of relevant threats

    • C. 

      c. Definition of business recovery roles

    • D. 

      D. Likelihood of a potential threat

  • 25. 
    Which is the most appropriate practice for user ID management?
    • A. 

      a. When a user ID is to be deleted, an adequate time interval should be taken after the termination of its use has been notified

    • B. 

      B. When privileges are set for a user ID, they should be minimized

    • C. 

      C. All the users involved in the same project should use the same user ID

    • D. 

      D. A user having multiple user IDs should set the same password for all the IDs

Back to Top Back to top