Trivia Quiz On Computer Application

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Seocr03
S
Seocr03
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,254
| Attempts: 1,254 | Questions: 33
Please wait...
Question 1 / 33
0 %
0/100
Score 0/100
1. Which of the following is an international standard for a video image compression coding system?

Explanation

MPEG (Moving Picture Experts Group) is an international standard for a video image compression coding system. It is widely used for compressing and decompressing video files, making it easier to store and transmit them over various media. The MPEG standard has different levels and profiles, each designed for specific applications and quality requirements. It has become the industry standard for video compression, enabling efficient storage and transmission of video content while maintaining acceptable quality.

Submit
Please wait...
About This Quiz
Trivia Quiz On Computer Application - Quiz

Are you looking for a trivia quiz to refresh what you know about computer application? The test below is guaranteed to help you understand computers a little easier, and all you have to do is ensure that you read the questions carefully and give the best answer you can. All... see morethe best and keep an eye out for other quizzes like this. see less

2. Which of the following combinations of CPU clock frequencies and CPI (Cycles Per Instruction) values shown in the table below will result in the shortest time required to execute a program containing a given number of instructions?

Explanation

Combination A will result in the shortest time required to execute a program containing a given number of instructions. This is because it has the highest CPU clock frequency and the lowest CPI value compared to the other combinations. A higher CPU clock frequency means that instructions can be executed faster, while a lower CPI value means that fewer cycles are needed to execute each instruction. Therefore, Combination A will result in the shortest overall execution time.

Submit
3. Which of the following is the most appropriate as the description of prototyping, a system development technique?

Explanation

Prototyping is a system development technique where an experimental product is created in the early stages of development. This allows for the identification and resolution of any ambiguities or differences in understanding between the user and the development organizations. By creating a prototype, both parties can gain a better understanding of the system requirements and make necessary adjustments before proceeding with the full development process. This helps to ensure that the final system meets the needs and expectations of the user.

Submit
4. What is the maximum number of host address that can be set within the one and same subnet when the 255.255.255.0 subnet mask is used with the Class B IP address?

Explanation

The maximum number of host addresses that can be set within the one and same subnet when the 255.255.255.0 subnet mask is used with the Class B IP address is 254. This is because the subnet mask 255.255.255.0 allows for 8 bits to be used for the host portion of the IP address. With 8 bits, there are 2^8 - 2 = 254 possible host addresses, as 2 addresses are reserved for the network address and the broadcast address.

Submit
5. Which of the following protocols has become a worldwide de facto standard? The protocol is used by the ARPANET in the USA, and is built into the UNIX system

Explanation

TCP/IP has become a worldwide de facto standard because it is used by the ARPANET in the USA and is built into the UNIX system. This means that it is widely adopted and used globally for communication between different networks and systems. TCP/IP provides a reliable and robust communication protocol suite that allows for the transmission of data across networks, making it an essential protocol for the internet and network communication.

Submit
6. A( n) _____ uses devices that emit and sense light to detect the mouse's movement.

Explanation

An optical mouse uses devices that emit and sense light to detect the mouse's movement. This means that it uses light to track the movement of the mouse on a surface, allowing it to accurately track and translate the movement into cursor movement on the screen. This technology is widely used in modern computer mice and provides precise and smooth tracking for the user.

Submit
7. Which of the following improve drawing and designing efficiency by using computer for designing industrial products and building constructions?

Explanation

CAD stands for Computer-Aided Design, which is a technology that improves drawing and designing efficiency by using computers. It allows designers to create, modify, and analyze designs digitally, reducing the need for manual drafting and increasing productivity. CAD software provides tools and features that enable precise measurements, accurate simulations, and easy collaboration. It is widely used in various industries, including industrial product design and building construction, to streamline the design process, improve accuracy, and reduce errors.

Submit
8.   If the heuristic function in an A* search algorithm is h( n) = 0, this A* search algorithm becomes which of the following algorithms?

Explanation

If the heuristic function in an A* search algorithm is h(n) = 0, it means that the heuristic function is not providing any additional information or guidance to the search algorithm. In this case, the A* search algorithm will behave the same as the Uniformed-cost search algorithm, which explores the search space by considering the cost of each path without considering any additional heuristic information. Therefore, the correct answer is c. Uniformed-cost search.

Submit
9. Which of the following SQL statements can extract employee_name has whose salary is 300,000 or higher from the table human_resource?

Explanation

The correct answer is a. SELECT employee_name FROM human_resource WHERE salary>=300000. This statement selects the employee_name from the table human_resource where the salary is greater than or equal to 300,000. It filters the results based on the salary condition.

Submit
10. Which of the following descriptions related to the term Sequential is correct?

Explanation

The correct answer is a. Control and displays are organized to reflect the order of their use. This means that the controls and displays are arranged in a way that corresponds to the sequence in which they are used, making it easier for the user to navigate and interact with them.

Submit
11. Which of the following software test methods is used to check whether modifications made for software maintenance have affected other portions or not?

Explanation

Regression testing is a software test method used to check whether modifications made for software maintenance have affected other portions or not. It involves retesting the previously tested functionalities to ensure that any changes or fixes have not introduced new bugs or caused any regression in the existing functionality. By performing regression testing, developers can ensure that the software continues to function correctly after modifications are made, helping to maintain the overall quality and stability of the software.

Submit
12. A method that does not require human participants serving as test users is the

Explanation

Heuristic evaluation is a method that does not require human participants serving as test users. This method involves a group of evaluators who assess the user interface based on a set of usability principles or heuristics. The evaluators identify usability issues and provide recommendations for improvement. This method is efficient and cost-effective as it does not require recruiting and coordinating human participants for testing.

Submit
13. Which of the following is suitable as a description of the functions of a modem?

Explanation

A modem is responsible for translating analog signals on communication lines into digital signals that can be understood by computers and terminals. This is necessary because the two types of signals have different configurations. Modems also handle the translation of digital signals into analog signals for transmission over communication lines. Therefore, option c accurately describes the functions of a modem.

Submit
14. Which choice is NOT an accurate description of C.I.A. triad?

Explanation

The correct answer is b. A stands for authorization. The C.I.A. triad is a foundational concept in information security, representing the three core principles of confidentiality, integrity, and availability. Authorization refers to the process of granting or denying access to resources, which is a separate concept from the C.I.A. triad.

Submit
15. Which of the following is the test case generation method used in the white box test?

Explanation

Condition coverage is a test case generation method used in white box testing. It aims to ensure that each condition in the code is evaluated to both true and false at least once. This helps in identifying any potential bugs or errors that may occur due to different conditions. By testing all possible conditions, condition coverage helps in achieving thorough test coverage and improving the overall quality of the software.

Submit
16. Which is the correct explanation of the role played by a DNS server?

Explanation

The correct answer is a. Relates the IP address to the domain name and host name. A DNS server is responsible for translating domain names (such as www.example.com) into corresponding IP addresses (such as 192.168.1.1). It acts as a directory that allows computers to locate and communicate with each other on a network by mapping domain names to their respective IP addresses. This process is crucial for the functioning of the internet as it enables users to access websites and other resources using easily recognizable domain names instead of complex IP addresses.

Submit
17. Which choice below is NOT a common result of a risk analysis?

Explanation

The correct answer is c. Definition of business recovery roles. Risk analysis typically involves identifying and assessing potential risks, determining the likelihood of those risks occurring, and evaluating their potential impact on critical assets. It also includes developing strategies to mitigate or manage those risks. However, defining business recovery roles is not directly related to risk analysis. It is more closely associated with business continuity planning, which focuses on ensuring that essential business functions can be restored and maintained in the event of a disruption or disaster.

Submit
18. What is the appropriate description of a router?

Explanation

A router is a networking device that connects different networks together. It operates at the network layer of the OSI model and is used to interconnect LAN systems to a wide area network (WAN). Routers are responsible for forwarding data packets between networks and making decisions about the best path for data transmission. They use routing tables to determine the most efficient route for data to travel. This allows for efficient communication between LAN systems and the wider internet.

Submit
19. Given this fragment of code: int f1 (int a=20; int b=20) { return a*b; } int f2(int a=10; int b=10) { return (b+f1(a)); } Which values should be the return result if we call: f2( )?

Explanation

The return result should be 210 if we call f2(). This is because f2() calls f1() with the value of a as 10, and f1() multiplies a and b together (10 * 20) to get 200. Then, f2() adds the value of b (10) to the result of f1(), resulting in 210.

Submit
20. Which of the following statements concerning DVDs is true?

Explanation

DVDs can store more data compared to CD-ROMs, and when using single-sided dual layer recording, the storage capacity of DVDs can be approximately four times that of a CD-ROM. This is because dual layer DVDs have two layers of data storage on one side, allowing for more information to be recorded.

Submit
21. Regarding relational database manipulation, which of the following statements correctly explains projection?

Explanation

Projection in relational database manipulation refers to extracting specific columns from a table. It involves selecting only the desired attributes or columns from a table while discarding the rest. This operation helps in simplifying the data and focusing on the necessary information for analysis or presentation purposes. By extracting specific columns, projection allows for a more efficient and concise representation of the data, reducing redundancy and improving performance in database operations.

Submit
22. Which is the correct statement about the recent increase in macro viruses?

Explanation

not-available-via-ai

Submit
23. Which of the following is suitable as a description of e-mail confidentiality on the Internet?

Explanation

The correct answer is a. In order to ensure e-mail confidentiality, it is necessary to employ preventive measures such as encryption. This answer is correct because encryption is a commonly used method to protect the confidentiality of emails on the Internet. By encrypting the contents of an email, it becomes unreadable to anyone who does not have the decryption key, ensuring that only the intended recipient can access the message. Encryption is an effective preventive measure that helps to maintain the confidentiality of emails during transmission and storage.

Submit
24. Which is the most appropriate practice for user ID management?

Explanation

When privileges are set for a user ID, they should be minimized. This means that a user should only be given the necessary privileges and access rights required for their job role and responsibilities. Giving excessive privileges can increase the risk of unauthorized access, misuse of resources, and potential security breaches. By minimizing privileges, organizations can reduce the attack surface and limit the potential damage that can be caused by a compromised user ID. This practice follows the principle of least privilege, which is a fundamental security concept in user ID management.

Submit
25. Consider this function declaration: ------------------------------------------------ void quiz(int i) { if (i > 1) { quiz(i / 2); quiz(i / 2); } cout << "*"; } ------------------------------------------------ How many asterisks are printed by the function call quiz(5)?

Explanation

The function quiz(5) is called. The condition i > 1 is true, so the function is called recursively twice with i/2 as the argument. The first recursive call is quiz(2) and the second recursive call is also quiz(2). Now, the condition i > 1 is false for both recursive calls, so the function does not call itself again. The first recursive call prints "*", and then the second recursive call also prints "*". Finally, the original function call prints "*". Therefore, a total of 7 asterisks are printed.

Submit
26. Which of the following is the most appropriate as the characteristic of information technology use in businesses today?

Explanation

not-available-via-ai

Submit
27. If an image, whose height and width in pixels is 480 dots and 640 dots, repspectively, is represented in 256 types of colors: approximtely how many kilobytes would be required in order to save this data in a storage device? It should be noted that no compression process is performed.

Explanation

The image has a height of 480 dots and a width of 640 dots, resulting in a total of 307,200 dots. Since the image is represented in 256 types of colors, each dot will require 8 bits (2^8 = 256). Therefore, the total number of bits required to store the image is 307,200 dots * 8 bits/dot = 2,457,600 bits. To convert this to kilobytes, we divide by 8,192 (1 kilobyte = 8,192 bits). Therefore, the image would require approximately 300 kilobytes (2,457,600 bits / 8,192 bits/kilobyte ≈ 300 kilobytes) of storage space.

Submit
28. What does #include do?

Explanation

The correct answer is b. It includes the header, which supports I/O. The #include directive is used in C++ to include a header file in the source code. In this case, the header being included is one that supports I/O operations. By including the appropriate header file, the program gains access to the necessary functions and classes for input and output operations, such as cout and cin.

Submit
29. What is the correct description of packet switching?

Explanation

Packet switching allows for concurrent communication with multiple parties using one physical line by setting up multiple logical circuits. This means that data is divided into packets and each packet can take a different route to reach its destination. This allows for efficient use of network resources and enables multiple parties to communicate simultaneously. Circuit switching, on the other hand, establishes a dedicated communication path between two parties, resulting in longer latency compared to packet switching. ISDN, a type of circuit-switched network, does not support packet switching.

Submit
30. Which of the following is the most appropriate as the description of code design and code management?

Explanation

The most appropriate description of code design and code management is that numerals should mainly be used as codes, and Chinese characters should not be used. This suggests that using numerical codes is preferred over using Chinese characters for better clarity and consistency in code management.

Submit
31. Which of these values represents in decimal numbers the result of the addtion of the binary numbers 1.1011 and 1.1101?

Explanation

The given binary numbers are 1.1011 and 1.1101. When these numbers are added, the result is 11.1000. To convert this binary number to decimal, we can multiply each digit by its corresponding power of 2 and add them together. In this case, the decimal representation of 11.1000 is 3.5.

Submit
32. Which is in an inappropriate way of handling passwords and a password file in the system management department?

Explanation

not-available-via-ai

Submit
33. How long would it take a 50MIPS computer to process 30 million instructions? (Round to two digits.) Assume a processor duty ratio of 70%, and ignore OS overhead.

Explanation

The processor duty ratio of 70% means that the processor is active for 70% of the time and idle for the remaining 30% of the time. Therefore, the effective processing speed of the computer would be 50MIPS * 0.70 = 35MIPS. To calculate the time it would take to process 30 million instructions, we divide the number of instructions by the processing speed: 30,000,000 / 35,000,000 = 0.857, which rounds to 0.86.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 21, 2012
    Quiz Created by
    Seocr03
Cancel
  • All
    All (33)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following is an international standard for a video image...
Which of the following combinations of CPU clock frequencies and CPI...
Which of the following is the most appropriate as the description of...
What is the maximum number of host address that can be set within the...
Which of the following protocols has become a worldwide de facto...
A( n) _____ uses devices that emit and sense light to detect the...
Which of the following improve drawing and designing efficiency by...
 ...
Which of the following SQL statements can extract employee_name has...
Which of the following descriptions related to the term Sequential is...
Which of the following software test methods is used to check whether...
A method that does not require human participants serving as test...
Which of the following is suitable as a description of the functions...
Which choice is NOT an accurate description of C.I.A. triad?
Which of the following is the test case generation method used in the...
Which is the correct explanation of the role played by a DNS server?
Which choice below is NOT a common result of a risk analysis?
What is the appropriate description of a router?
Given this fragment of code:...
Which of the following statements concerning DVDs is true?
Regarding relational database manipulation, which of the following...
Which is the correct statement about the recent increase in macro...
Which of the following is suitable as a description of e-mail...
Which is the most appropriate practice for user ID management?
Consider this function declaration:...
Which of the following is the most appropriate as the characteristic...
If an image, whose height and width in pixels is 480 dots and 640...
What does #include do?
What is the correct description of packet switching?
Which of the following is the most appropriate as the description of...
Which of these values represents in decimal numbers the result of the...
Which is in an inappropriate way of handling passwords and a password...
How long would it take a 50MIPS computer to process 30 million...
Alert!

Advertisement