1
A computer terminal can be described as which of the following?
Choose one answer.
a. A device that has a screen and keyboard for input and output but does not do its own processing
b. A device that allows users to store information
c. A device that allows users to operate all computer functions
d. A device that has a screen and keyboard for input only
.
.
Question 2
A workstation can be described as which of the following?
Choose one answer.
a. A software application program that allows users to operate the computer
b. A powerful, high-end microcomputer which contains microprocessors
c. A personal computer that is smaller in size
d. A microcomputer which requires less power than a typical PC
.
.
Question 3
Laptop computers, also called notebook computers:
Choose one answer.
a. Operate like a desktop computer, but they are portable so they can be taken anywhere
b. Do not have the same features as a desktop computer
c. Operate like a tablet computer
d. Operate similar to a smartphone
.
.
Question 4
Mainframes are also used as which of the following?
Choose one answer.
a. High-capacity server computers for networks with many client workstations
b. Medium-capacity server computers for a network
c. Backup servers for a personal computer
d. Backup servers for a laptop computer
.
.
Question 5
The operating system (OS) is software that performs which of the following tasks?
Choose one answer.
a. Manages the overall computer system
b. Manages your computer and the devices connected to it
c. Manages the computer hardware
d. Manages the performance of software programs
.
.
Question 6
What is the function of computer software?
Choose one answer.
a. To tell the hardware what do to
b. To process information
c. To store information
d. To access online programs
.
.
Question 7
What is the most important use of a computer’s hardware?
Choose one answer.
a. To store information
b. To perform calculations
c. To be used as a Central Processing Unit (CPU)
d. To process information
.
.
Question 8
Which of the following cannot be accomplished using a computer?
Choose one answer.
a. Sending and receiving e-mail
b. Accessing the Internet
c. Viewing pictures and movies and playing games
d. None of the above; computer use is limitless
.
.
Question 9
Which of the following defines microcomputer?
Choose one answer.
a. A microcomputer is a computer that has a microprocessor chip (or multiple microprocessors) as its CPU.
b. A microcomputer is a smaller version of a desktop computer.
c. A microcomputer is a networking system that can be used by individuals only.
d. A microcomputer is a computer program that provides software data to the hardware.
.
.
Question 10
Which of the following statements best describes one of the main components that makes computers work?
Choose one answer.
a. The computer’s software makes the computer work.
b. The Intel processor works with a series of transistors in conjunction to make the computer work.
c. The computer monitor activates the internal receptors, which makes the computer work.
d. Connectivity to the Internet makes the computer hardware and software work.
.
.
Question 11
If e-mail is checked infrequently, the email provider may do which of the following?
Choose one answer.
a. Forward your e-mail to another e-mail account on file.
b. Discontinue your ability to use other online services.
c. Send letters in the mail reminding you to utilize e-mail services.
d. Discontinue your account due to inactivity.
.
.
Question 12
In an effort to protect your online information, which of the following should you not do?
Choose one answer.
a. Request that transactions be performed using methods other than the Internet.
b. Provide information requested without hesitation.
c. Determine the best methods to transmit sensitive information online.
d. Request that the business verify its information prior to sending payment.
.
.
Question 13
Search engines are most suitable when searching for:
Choose one answer.
a. available computers.
b. hardware and software components.
c. narrow topics and well-defined research questions.
d. computer terminology.
.
.
Question 14
The advantages of an e-mail client include which of the following?
Choose one answer.
a. It allows users to send outgoing e-mails only.
b. It allows users to improve communication between sender and receiver.
c. It allows users to work on e-mails without being connected to the Internet.
d. It allows users to access various client accounts.
.
.
Question 15
The invisible web can be described as:
Choose one answer.
a. a part of the web that users cannot see.
b. a part of the Internet that is much larger than the retrievable part ordinary search engines can find.
c. a part of the Internet which provides information other search engines cannot find.
d. a part of the Internet which serves as additional information.
.
.
Question 16
The use of e-mail allows users to:
Choose one answer.
a. provide digital message communication to individuals in the same city.
b. enhance communication skills.
c. communicate cheaply, quickly, and easily with people all over the world.
d. communicate with individuals live and in real time.
.
.
Question 17
What are some of the habits that users should develop in protecting their privacy online?
Choose one answer.
a. Create stronger passwords
b. Use computer protection software
c. Become more aware of personal data and who may be gathering it
d. Do not readily provide personal information online
.
.
Question 18
What is the most important use of e-mail?
Choose one answer.
a. To communicate cheaply, quickly, and easily with people all over the world
b. To accomplish more using the Internet
c. To send letters in e-mail instead of postal mail
d. To provide another method of communicating online
.
.
Question 19
Which of the following are examples of web search engines?
Choose one answer.
a. Internet Explorer, Firefox, Google Chrome
b. Word, Excel, PowerPoint
c. AOL, Google, Yahoo
d. iTunes, Windows Media Player
.
.
Question 20
Which statement best defines the World Wide Web?
Choose one answer.
a. A network of computer networks and its users
b. A network of data that can be accessed by various individuals
c. A system of interlinked hypertext documents accessed via the Internet
d. A system of interlinked data that can be accessed via the Internet
.
.
Question 21
Describe a “cold start” check of the computer.
Choose one answer.
a. Powering the computer on and off
b. Starting up the computer from a completely powered-off state, skipping any welcome or other splash screens
c. Disconnecting the computer from the network and the Internet
d. Pressing the F2 command while holding the Power function
.
.
Question 22
How often should computer users perform preventative maintenance on their computers?
Choose one answer.
a. Twice a year
b. Weekly
c. Monthly
d. Yearly
.
.
Question 23
In performing computer maintenance, users should do which of the following?
Choose one answer.
a. For each application, such as Adobe Reader or Microsoft Office, check for updates using the built-in method or via the support or download section of the application’s website.
b. Routinely unplug the computer and restart it.
c. Routinely search for software updates.
d. Routinely put the computer in sleep mode instead of shutting it down.
.
.
Question 24
In the event of a power surge and the computer does not power on, what is the next step you should take?
Choose one answer.
a. Verify that the video graphic card is installed correctly.
b. Hit the escape key a few times to see if the computer will start.
c. Ensure that the appropriate software is installed.
d. Reset the surge protector.
.
.
Question 25
Online performance checks refer to which of the following?
Choose one answer.
a. Running automated diagnostic utilities to determine whether there are any computer issues that need to be resolved
b. Receiving notifications from the software company via e-mail to perform system checks
c. Annually checking for updates from Microsoft
d. Automatically installing software programs that may be of interest
.
.
Question 26
What does the term “hacker” mean when referring to security issues?
Choose one answer.
a. An individual who uses parts of the computer
b. An individual who asks users permission to access sensitive information
c. A “bad guy” who tries to break into (hack) computer systems
d. A “good guy” who is skilled in protecting online information
.
.
Question 27
What is one of the benefits of “surge protection”?
Choose one answer.
a. If there is an outage, it protects information from being lost.
b. It protects the user from electric shock.
c. It protects the user’s online information.
d. It allows the user to send and receive data securely.
.
.
Question 28
What is the main motivation for people who steal online personal information?
Choose one answer.
a. Some individuals are simply curious.
b. These individuals use this information for use in other crimes.
c. They desire to seek revenge from others who have stolen their information.
d. Data is transmitted so easily online that they can easily access it.
.
.
Question 29
Which of the following is one of the core items that is part of a computer “health check”?
Choose one answer.
a. Performing an online system check
b. Regularly cleaning dust from the computer
c. Performing a soft reset of the computer
d. Regularly rebooting the computer
.
.
Question 30
Which of the following is the most important step you can take to work safely online?
Choose one answer.
a. Utilize virus protection software.
b. Research a company thoroughly prior to visiting its website.
c. Avoid going to specific websites.
d. Avoid conducting any transactions online.
.
.