Super Uber Smart 1-10 IT Essentials Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Cutty
C
Cutty
Community Contributor
Quizzes Created: 1 | Total Attempts: 103
Questions: 20 | Attempts: 103

SettingsSettingsSettings
Super Uber Smart 1-10 IT Essentials Quiz - Quiz


super uber nerd andrew rumsey 100% it essentials 1-10 quiz


Questions and Answers
  • 1. 

    What term is used when described characteristics of a computer case

    • A.

      Plastic-ness

    • B.

      Fan

    • C.

      Form factor

    • D.

      I can haz cheezburga

    • E.

      All of the above

    Correct Answer
    C. Form factor
    Explanation
    Form factor is the term used to describe the physical characteristics and dimensions of a computer case. It refers to the size, shape, and layout of the case, including the arrangement of components such as motherboard, power supply, and storage devices. Different form factors, such as ATX, microATX, and mini-ITX, have specific specifications and standards that determine the compatibility and functionality of the case with other computer components. Therefore, the correct answer is form factor.

    Rate this question:

  • 2. 

    AT and ATX are form factors used to describe . . . . .  (1 word)

    Correct Answer
    motherboard
    Explanation
    AT and ATX are form factors used to describe the physical dimensions, layout, and power supply requirements of a motherboard. These form factors determine the size and shape of the motherboard, as well as the placement of components such as the CPU, RAM slots, and expansion slots. The AT form factor was commonly used in older computer systems, while the ATX form factor is now the standard for modern motherboards. It specifies the placement of connectors, power supply, and cooling solutions, allowing for easier installation and better airflow within the computer case.

    Rate this question:

  • 3. 

    Defrag, disk clean up and system restore are all examples of

    • A.

      Cheezburger

    • B.

      Chris grogran

    • C.

      System tools

    • D.

      Administrative tools

    • E.

      Staple a small puppy to your btec as an annex

    Correct Answer
    C. System tools
    Explanation
    The given answer, "system tools," is correct because defrag, disk clean up, and system restore are all functions or utilities that are used to manage and optimize the performance of a computer system. These tools are typically included in the operating system and are used for tasks such as organizing and optimizing the storage of files, removing unnecessary files and temporary data, and restoring the system to a previous state in case of issues or errors.

    Rate this question:

  • 4. 

    What does ESD stand for

    • A.

      Electronic storage device

    • B.

      Enormous super dinosaur

    • C.

      Electrostatic discharge

    Correct Answer
    C. Electrostatic discharge
    Explanation
    ESD stands for electrostatic discharge. Electrostatic discharge refers to the sudden flow of electricity between two electrically charged objects caused by a difference in potential. This discharge can occur when there is a buildup of static electricity on a person or object and then comes into contact with a conductor. ESD can cause damage to electronic devices and components, which is why precautions such as grounding and the use of antistatic materials are necessary in industries where sensitive electronics are handled.

    Rate this question:

  • 5. 

    The first step of the trouble shooting process is to  . . . .  . . . . . . . . . . . . . . . to log onto the computer in case the job requires for a level two technician (5 words)

    Correct Answer
    gather data from the customer
    Explanation
    The first step of the troubleshooting process is to gather data from the customer. This is important because it helps the technician understand the specific issue and gather relevant information that can assist in resolving the problem. By collecting data from the customer, the technician can gain insights into the symptoms, potential causes, and any previous troubleshooting steps taken. This information is crucial for determining the appropriate next steps and ensuring an efficient and effective troubleshooting process.

    Rate this question:

  • 6. 

    Internet searches, other techncians and newsgroups are all methods of gathering data for which step of the trouble shooting process

    • A.

      Step 1 - gather data from the customer

    • B.

      Step 2 - verify the obvious issues

    • C.

      Step 3 - try quick solutions first

    • D.

      Step 4 - gather data from the computer

    • E.

      Step 5 - evaluate the problem and implement the solution

    Correct Answer
    E. Step 5 - evaluate the problem and implement the solution
    Explanation
    Internet searches, other technicians, and newsgroups are all methods of gathering additional data and information to evaluate the problem and implement the solution. These sources can provide valuable insights, suggestions, and solutions that can help in the troubleshooting process. Therefore, they are relevant to step 5 - evaluate the problem and implement the solution.

    Rate this question:

  • 7. 

    The interface for an operating system that allows a user to ineteract with menus and icons is known as a  . . . . . . . . (1 word or 3 words)

    Correct Answer
    GUI gui graphical user interface
    Explanation
    The correct answer for this question is GUI, which stands for Graphical User Interface. This term refers to the interface of an operating system that allows users to interact with menus and icons. It provides a visual and intuitive way for users to navigate and interact with the system, making it easier to perform tasks and access various functionalities.

    Rate this question:

  • 8. 

    NOS stands for

    • A.

      Nitrous Oxide

    • B.

      Network operating system

    • C.

      Network omitted sounds

    Correct Answer
    B. Network operating system
    Explanation
    NOS stands for Network Operating System. This term refers to an operating system that is designed to manage and coordinate network resources and provide services to other computers or devices connected to the network. It allows multiple computers to communicate and share resources such as files, printers, and internet connections. Examples of NOS include Windows Server, Linux, and Novell NetWare.

    Rate this question:

  • 9. 

    The RAM used in a laptop is known as

    • A.

      SODIMM

    • B.

      DIMM

    • C.

      SIMM

    • D.

      Bacion sadwhich

    Correct Answer
    A. SODIMM
    Explanation
    SODIMM stands for Small Outline Dual Inline Memory Module. It is a type of RAM module specifically designed for laptops and other small form factor computers. SODIMM modules are smaller in size compared to regular DIMM modules used in desktop computers. They have a smaller number of pins and are physically compatible with the memory slots found in laptops. Therefore, SODIMM is the correct answer for the type of RAM used in a laptop.

    Rate this question:

  • 10. 

    Dot matrix and daisy wheel are both types of what printer

    • A.

      Impact

    • B.

      Laser

    • C.

      Inkjet

    • D.

      Stamp

    Correct Answer
    A. Impact
    Explanation
    Dot matrix and daisy wheel printers are both types of impact printers. Impact printers use a mechanical mechanism to create characters on paper by striking an inked ribbon against the paper. Dot matrix printers use a matrix of pins to strike against the ribbon, while daisy wheel printers use a wheel with characters on its spokes. Both types of printers are capable of producing high-quality text and graphics, but they are slower and noisier compared to laser and inkjet printers.

    Rate this question:

  • 11. 

     . . . . .  printers use special paper that must be kept at room tempreture or it will turn black (1 word)

    Correct Answer
    thermal
    Explanation
    Thermal printers use special paper that reacts to heat, causing it to turn black. This type of paper is sensitive to temperature and needs to be kept at room temperature to prevent premature discoloration.

    Rate this question:

  • 12. 

    What network topology allows for the best protection if one of the computers fails

    • A.

      Mesh

    • B.

      Ring

    • C.

      Star

    Correct Answer
    A. Mesh
    Explanation
    A mesh network topology allows for the best protection if one of the computers fails because it provides multiple paths for data to travel. In a mesh network, each computer is connected to every other computer, creating a redundant network. If one computer fails, the data can still be routed through other paths, ensuring that the network remains operational. This redundancy and fault tolerance make the mesh topology ideal for protecting against single points of failure.

    Rate this question:

  • 13. 

    What can be used to test connections between computers

    • A.

      Ping

    • B.

      ICMP

    • C.

      HTTP

    • D.

      FTP

    Correct Answer
    A. Ping
    Explanation
    Ping is a network utility used to test the connectivity between computers on a network. It sends a small packet of data from one computer to another and measures the time it takes for the packet to reach its destination and return. By receiving a response from the destination computer, it confirms that the connection is active and working properly. Therefore, ping is commonly used to troubleshoot network issues and verify if computers can communicate with each other. ICMP, HTTP, and FTP are protocols used for different purposes and not specifically designed for testing network connections.

    Rate this question:

  • 14. 

    Topology is used to connect a computer to the internet (TRUE or FALSE)

    Correct Answer
    FALSE
    Explanation
    Topology refers to the physical or logical arrangement of devices in a network. It does not directly connect a computer to the internet. To connect a computer to the internet, other components such as a modem, router, and internet service provider are required. Therefore, the statement is false.

    Rate this question:

  • 15. 

    What software is commonly used on helpdesk to store customer data and store the information from completed calls for future users

    • A.

      Sunrise

    • B.

      Rowntrees

    • C.

      Google

    • D.

      Yahoo

    • E.

      Ebay

    Correct Answer
    A. Sunrise
    Explanation
    Sunrise is not a commonly used software on helpdesk to store customer data and information from completed calls. This answer is incorrect.

    Rate this question:

  • 16. 

    What type of questions must you ask a talkitive customer

    • A.

      How was your day

    • B.

      Close-ended

    • C.

      Open-ended

    • D.

      What colour are your shoes

    Correct Answer
    B. Close-ended
    Explanation
    Close-ended questions are the appropriate type of questions to ask a talkative customer because they require short and specific answers. These questions limit the customer's response to a simple "yes" or "no" or a brief statement, which helps in controlling the conversation and preventing the customer from going off-topic or providing excessive information. This type of questioning is useful when dealing with talkative individuals as it allows for efficient communication and keeps the conversation focused.

    Rate this question:

  • 17. 

    How would you clean the fan in a computer

    • A.

      Compressed air

    • B.

      Soft lint free cloth

    • C.

      Damp tissue

    • D.

      A mop and bucket

    Correct Answer
    A. Compressed air
    Explanation
    To clean the fan in a computer, compressed air is the best option. This is because compressed air can effectively remove dust and debris from the fan without causing any damage. It can reach into small crevices and blow away the dirt, ensuring that the fan operates smoothly and efficiently. Using a soft lint-free cloth or damp tissue may not be as effective in removing all the dust, and using a mop and bucket is not suitable for cleaning delicate computer components.

    Rate this question:

  • 18. 

    What motion must you use when cleaning a disk

    • A.

      From the inside of the disk out

    • B.

      In a circular motion

    • C.

      Put it in the dish washer

    • D.

      Spit on it

    Correct Answer
    A. From the inside of the disk out
    Explanation
    To clean a disk effectively, you should use a motion from the inside of the disk outwards. This means starting at the center of the disk and moving towards the outer edge. This motion helps to remove dust, dirt, and smudges in a controlled manner, preventing any potential damage to the disk. Cleaning in a circular motion or using a dishwasher or spit can potentially harm the disk's surface and should be avoided.

    Rate this question:

  • 19. 

    What does DDoS stand for

    • A.

      Distributed denial of service

    • B.

      Deadly dom owned solman

    • C.

      Double data operating system

    • D.

      Look at the shiny shiny

    Correct Answer
    A. Distributed denial of service
    Explanation
    DDoS stands for distributed denial of service. This refers to a type of cyber attack where multiple compromised computers are used to flood a target system or network with an overwhelming amount of traffic, causing it to become unavailable to legitimate users. The intention of a DDoS attack is to disrupt the target's operations and make their services inaccessible.

    Rate this question:

  • 20. 

    What is the term used for an infected computer used to take down a server

    • A.

      Lazor pwn

    • B.

      Nerd

    • C.

      Josh loves warcraft

    • D.

      Zombie

    • E.

      Omfg . . . ALIENS

    Correct Answer
    D. Zombie
    Explanation
    The term used for an infected computer used to take down a server is "zombie." This refers to a computer that has been compromised by malware and is under the control of a hacker, who can then use it to launch coordinated attacks on other systems. These attacks can overwhelm a server's resources, causing it to crash or become unavailable to legitimate users.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 21, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 21, 2009
    Quiz Created by
    Cutty
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.