Computer Basics Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which shortcut key combination hides the entire row in a spreadsheet?

  • CTRL + C
  • CTRL + -
  • CTRL + 0
  • CTRL + 9 (correct)

Which of the following transmission types allows data to flow in both directions but not simultaneously?

  • Duplex
  • Simplex
  • Full-duplex
  • Half-duplex (correct)

Which network device operates at the transport layer of the OSI model and is responsible for segmenting data?

  • Bridge
  • Switch
  • Router (correct)
  • Hub

Which technique combines multiple input signals into one composite signal for better transmission efficiency?

<p>Multiplexing (C)</p> Signup and view all the answers

Which reliable transport protocol is known for its error detection and flow control?

<p>TCP (A)</p> Signup and view all the answers

What is the name of the register that tracks the next instruction to be executed?

<p>Program Counter (D)</p> Signup and view all the answers

What does UDP stand for in networking protocols?

<p>User Datagram Protocol (B)</p> Signup and view all the answers

What type of communication allows data to flow in only one direction?

<p>Simplex (A)</p> Signup and view all the answers

Which protocol is best suited for file transfers between devices?

<p>FTP (D)</p> Signup and view all the answers

Which of the following components is considered a Layer 2 device in network communications?

<p>Switch (D)</p> Signup and view all the answers

What is the Internet service that provides a multimedia interface to available resources?

<p>World Wide Web (B)</p> Signup and view all the answers

Which domain is typically used by for-profit businesses?

<p>.com (A)</p> Signup and view all the answers

Which of the following correctly identifies a collection of web pages and the first page opened on a website?

<p>Website, home page (C)</p> Signup and view all the answers

What is an example of a half-duplex communication system?

<p>Walkie-talkies (A)</p> Signup and view all the answers

Which of the following is not a version of Windows?

<p>9 (A)</p> Signup and view all the answers

In MS Excel, which shortcut keys are used to create a formula to sum all cells?

<p>Alt+= (C)</p> Signup and view all the answers

Which layer of the OSI model handles addressing and routing messages between different networks?

<p>Network layer (B)</p> Signup and view all the answers

On which layer of the OSI model does a gateway operate?

<p>Network Layer (D)</p> Signup and view all the answers

Which symbol must be used before a formula in an Excel sheet?

<p>= (B)</p> Signup and view all the answers

What is the shortcut key for centering alignment of text in MS Office software?

<p>Ctrl+E (B)</p> Signup and view all the answers

Which server is primarily used to host websites?

<p>Webserver (D)</p> Signup and view all the answers

What is used to allocate and manage resources for a network?

<p>Server (D)</p> Signup and view all the answers

What set of attributes uniquely identifies a record?

<p>Super key (D)</p> Signup and view all the answers

What does a double rectangle represent in ER diagrams?

<p>Total participation of an entity (A)</p> Signup and view all the answers

Which type of printer uses pins striking an ink ribbon?

<p>Dot matrix printer (A)</p> Signup and view all the answers

What is the main purpose of a Trojan horse?

<p>To steal sensitive information (B)</p> Signup and view all the answers

Which type of memory appears as main storage but is mostly supported by secondary storage?

<p>Virtual memory (B)</p> Signup and view all the answers

What is used by floppy drives, hard drives, and tape drives to read data?

<p>Magnets (D)</p> Signup and view all the answers

What type of memory typically stores data for a short amount of time?

<p>RAM (C)</p> Signup and view all the answers

What is often a characteristic of multi-valued attributes in data modeling?

<p>They can hold more than one value (A)</p> Signup and view all the answers

In which type of printer is printing achieved by deflecting a laser beam onto a photosensitive surface of a drum?

<p>Laser printer (B)</p> Signup and view all the answers

What is another term for the main memory of a computer?

<p>All of these (C)</p> Signup and view all the answers

Which of the following is considered a primary input device for a computer?

<p>Keyboard (C)</p> Signup and view all the answers

Which type of computer monitor uses an electron beam to create an image on the screen?

<p>Cathode Ray Tube (B)</p> Signup and view all the answers

What do we call the place where accessories are connected in a computer?

<p>Port (D)</p> Signup and view all the answers

How many bits are equal to 1 Byte?

<p>8 (D)</p> Signup and view all the answers

What is the popular name for a flash drive?

<p>Pen drive (D)</p> Signup and view all the answers

Which statement about EPROM is correct?

<p>Ultraviolet rays are used to erase the data. (D)</p> Signup and view all the answers

Which of the following consists of an electronic writing area and a special 'pen' that works with it?

<p>Graphics tablet (C)</p> Signup and view all the answers

Which of these is a type of computer peripheral?

<p>Mouse (C)</p> Signup and view all the answers

Which type of memory is non-volatile?

<p>ROM (A)</p> Signup and view all the answers

The primary memory of a personal computer consists of which of the following?

<p>Both RAM and ROM (A)</p> Signup and view all the answers

In which type of memory are the boot sector files stored?

<p>ROM (B)</p> Signup and view all the answers

Which statement is correct regarding the main memory of a computer?

<p>Power loss results in data loss in main memory. (C)</p> Signup and view all the answers

Which type of memory has the fastest access speed?

<p>CPU Register (C)</p> Signup and view all the answers

Which statement about cache memory is not correct?

<p>Cache memory is slower than RAM. (A)</p> Signup and view all the answers

Which type of ROM can be erased and reprogrammed by ultraviolet light?

<p>EPROM (A)</p> Signup and view all the answers

What is the typical size of a computer accumulator register?

<p>5 bits (B)</p> Signup and view all the answers

Which of the following is an example of volatile memory?

<p>RAM (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Printer Technology

  • Printing is achieved by deflecting a laser beam onto a photosensitive surface in Laser printers.
  • Dot Matrix printers use a print head with pins striking an ink ribbon for character production.

Memory Concepts

  • Main memory can be referred to as primary storage, internal memory, or primary memory.
  • Flash drives are commonly known as pen drives; they are portable storage devices.
  • Memory types can be categorized as volatile (e.g., RAM) and non-volatile (e.g., ROM).

Input and Output Devices

  • The keyboard serves as a primary input device for computers, while monitors display output.
  • Cathode Ray Tube (CRT) monitors use an electron beam to create images on the screen.
  • Ports are designated connections on a computer for accessories.

Shortcuts and Formatting in Software

  • In MS-Excel, the shortcut Alt+= allows users to quickly create a formula for summing all selected cells.
  • To hide an entire row, the shortcut is CTRL + 9.

Networking and OSI Model

  • The Network layer is responsible for addressing and routing messages across different networks, while a Gateway operates on this layer.
  • Multiplexing combines multiple input signals for efficient transmission.

Storage and Data Management

  • Data Registers keep track of the next instruction to be executed, and the Program Counter also plays a pivotal role in instruction sequencing.
  • Cache memory is faster than RAM and is used for short-term data storage, enhancing access speed to frequently used information.

Cybersecurity

  • A Trojan horse primarily aims to steal sensitive information from computer systems.

Web and Internet Basics

  • Websites consist of collections of web pages; the first page viewed is the home page.
  • .com domains are typically used by for-profit businesses.

RAM and ROM

  • RAM is volatile; it requires a continuous power supply to retain data.
  • EPROM allows data to be erased using ultraviolet light and reprogrammed by the user or manufacturer.

Additional Facts

  • The size of a computer's accumulator register is typically 5 bytes.
  • Half-duplex systems allow communication in both directions, but only one direction at a time, exemplified by walkie-talkies.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Use Quizgecko on...
Browser
Browser