Computer Hardware and Software Quiz
45 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is a type of wired communication media with very low signal weakness?

  • Fiber Optics (correct)
  • Coaxial Cable
  • Twisted Pair
  • Wireless Networks

What is the primary function of FTP in internet protocols?

  • To manage network devices
  • To transfer files and data (correct)
  • To enable secure browsing
  • To store web content

Which type of virus specifically infects the hard disk and drives by targeting the boot sector?

  • File viruses
  • Boot sector viruses (correct)
  • Trojan horses
  • Macro viruses

E-commerce is defined as the process of selling, buying, or exchanging products through what means?

<p>Electronic media (C)</p> Signup and view all the answers

What term describes a type of search that utilizes multiple search engines to display results?

<p>Meta-Search Engine (D)</p> Signup and view all the answers

What is one method to protect a computer from viruses?

<p>Update the operating system (C)</p> Signup and view all the answers

Which of the following is a characteristic of Trojan Horses?

<p>They are hidden inside desirable programs (B)</p> Signup and view all the answers

According to the goal-based classification, what is one type of virus?

<p>Operating sector viruses (C)</p> Signup and view all the answers

Which type of malware is transmitted via the TCP/IP protocol?

<p>Worms (C)</p> Signup and view all the answers

What is an example of non-synchronous e-learning?

<p>Wiki (A)</p> Signup and view all the answers

Which of the following describes the boot sector viruses?

<p>Viruses that target the hard drive's boot program (C)</p> Signup and view all the answers

What is one mechanism involved in the spread of viruses?

<p>Propagation phase (A)</p> Signup and view all the answers

What is a defining characteristic of safety in information security?

<p>Protecting the user from exploitation or extortion (B)</p> Signup and view all the answers

Which function does the Windows key perform?

<p>Open Start programs (C)</p> Signup and view all the answers

From which locations can printer settings be changed?

<p>Both A &amp; B (B)</p> Signup and view all the answers

What system allows one user to run one program at a time?

<p>Single user systems, one task (B)</p> Signup and view all the answers

Which of the following defines the decimal system?

<p>Set of numbers from 0 to 9 (A)</p> Signup and view all the answers

Which type of wired media is typically the most used due to being cheap and easy to install?

<p>Twisted Pair (C)</p> Signup and view all the answers

What is the primary function of a scanner?

<p>Input device (C)</p> Signup and view all the answers

What is the main function of PS/2 port?

<p>Connects computer mice (B)</p> Signup and view all the answers

Which of the following technologies was used in the first generation of computers?

<p>Vaccum tube (C)</p> Signup and view all the answers

Which generation of computers first introduced the concept of ROM and temporary memory?

<p>The third generation (D)</p> Signup and view all the answers

How many binary numbers are used to represent each alphabetical letter or symbol in Unicode?

<p>Eight binary numbers (C)</p> Signup and view all the answers

Which protocol governs communication between devices on the internet?

<p>TCP/IP (C)</p> Signup and view all the answers

What is one of the key functions of a learning management system?

<p>Publish scientific material (C)</p> Signup and view all the answers

What type of operating system allows for operating and managing more than one processor at the same time?

<p>Multiprocessing operating system (A)</p> Signup and view all the answers

Arithmetic and logical operations are carried out by which component of a computer?

<p>CPU (A)</p> Signup and view all the answers

Which of the following is an example of a free operating system?

<p>Ubuntu (C)</p> Signup and view all the answers

Which of the following is true about high-level programming languages?

<p>They are closer to human languages (A)</p> Signup and view all the answers

Which type of cable cannot be easily eavesdropped on?

<p>Fiber Optics (C)</p> Signup and view all the answers

What characterizes shareware software?

<p>Programs are distributed for a trial period. (A)</p> Signup and view all the answers

What is a characteristic feature of second generation computers?

<p>Use of transistors (A)</p> Signup and view all the answers

What type of bus is used to assign addresses to different memory locations?

<p>Address Bus (D)</p> Signup and view all the answers

Which of the following is NOT a feature of third-generation computers?

<p>Use of vacuum tubes (D)</p> Signup and view all the answers

Which of the following best describes the real-time operating system?

<p>Designed for applications where timing is critical. (D)</p> Signup and view all the answers

What indicates one of the advantages of open-source software?

<p>It allows addition and modification to the software (A)</p> Signup and view all the answers

Which of the following uses a group of processors to enhance performance in computing?

<p>Multiprocessing operating system (A)</p> Signup and view all the answers

Which of the following types of networks is characterized by devices connected directly to each other?

<p>Peer to Peer networks (A)</p> Signup and view all the answers

What does a green icon in Microsoft Security Essentials indicate?

<p>The computer's security condition is good (C)</p> Signup and view all the answers

Which of the following best describes a virus?

<p>Small program programmed to damage a computer (A)</p> Signup and view all the answers

Which of the following is an example of a read-only memory?

<p>ROM (D)</p> Signup and view all the answers

What is an example of a program that allows free use for a specified trial period, after which it will stop working partially or fully?

<p>Adobe Photoshop (D)</p> Signup and view all the answers

Which operation does the ALU perform?

<p>Perform all arithmetical and logical operations (A)</p> Signup and view all the answers

Which method is NOT commonly used for presenting e-learning content?

<p>Printed materials (B)</p> Signup and view all the answers

Which of the following indicates a kind of network security protocol?

<p>SSL protocol (A)</p> Signup and view all the answers

Flashcards

Asynchronous Communication (e-learning)

Methods of communication that don't require both parties to be online simultaneously. Examples include email.

Fiber Optics

Wired communication media with very low signal weakness.

FTP

File Transfer Protocol; a protocol for transferring files over the internet.

Compiler

A program that translates a programming language into machine code instructions.

Signup and view all the flashcards

Meta-Search Engine

A search engine that searches other search engines and combines the results.

Signup and view all the flashcards

Twisted Pair Cable

A type of wired media consisting of two insulated wires twisted together, used for transmitting data. It is inexpensive, easy to install, and commonly used for network connections.

Signup and view all the flashcards

PS/2 Port

A connector on a computer used for connecting a keyboard or mouse.

Signup and view all the flashcards

TCP/IP

A communication protocol suite used for internet connectivity, governing how devices on the internet exchange information.

Signup and view all the flashcards

Learning Management System (LMS) Function

An LMS's key tasks include allowing instructors to publish course materials, authoring learning programs, and creating or interacting with educational programs.

Signup and view all the flashcards

Computer Component

Hardware, data, and information are all essential components of a computer system.

Signup and view all the flashcards

Computer Performance

The speed and efficiency of a computer system are measured by factors like processor speed, RAM capacity and speed, and hard disk speed and size.

Signup and view all the flashcards

E-learning Content

E-learning content is delivered using interactive electronic materials, simulations, and other engaging tools.

Signup and view all the flashcards

Dot Matrix Printer

A printer that uses tiny pins to strike an inked ribbon, creating dots on paper to form characters, the oldest type of printer.

Signup and view all the flashcards

What is the purpose of the Windows key?

The Windows key is used to access the Start menu, which allows you to open programs, search for files, and manage system settings.

Signup and view all the flashcards

How do you change printer settings?

You can change printer settings in the Control Panel or the Devices and Printers section in the Windows operating system.

Signup and view all the flashcards

How to change desktop background?

To change the desktop background, you can use the Personalize settings either through the desktop context menu or the Control Panel.

Signup and view all the flashcards

How to change screen resolution?

You can change screen resolution through the Display Settings, usually found in the Control Panel or by right-clicking on the desktop.

Signup and view all the flashcards

What is the function of a Touchscreen?

A touchscreen acts as both an input and output device, allowing users to interact with the computer by touching the screen.

Signup and view all the flashcards

What is essential for a computer to operate?

An operating system is crucial for a computer to function, providing a platform for other software applications to run.

Signup and view all the flashcards

What is the decimal system?

The decimal system uses numbers from 0 to 9, representing ten unique digits.

Signup and view all the flashcards

When were multi-core processors introduced?

Multi-core processors emerged in the fifth generation of computers, significantly enhancing processing power.

Signup and view all the flashcards

Cache Memory

A small, fast memory located within the processor that stores frequently used data and instructions, speeding up access.

Signup and view all the flashcards

First Stage of Computer Development

The era of mechanical and electromechanical computers, characterized by large, slow, and unreliable machines.

Signup and view all the flashcards

Multiprocessing Operating System

An operating system that allows a computer to execute multiple instructions simultaneously using more than one processor.

Signup and view all the flashcards

Vacuum Tube

An electronic component used in first-generation computers, responsible for amplifying and switching electronic signals, but known for generating heat and being bulky.

Signup and view all the flashcards

UNICODE

A character encoding standard that assigns a unique number to each character, symbol, and glyph in various writing systems.

Signup and view all the flashcards

ROM (Read-Only Memory)

Non-volatile memory that stores essential system instructions and data permanently, unaffected by power loss.

Signup and view all the flashcards

High-Level Programming Languages

Languages that use human-readable keywords and instructions, making it easier for programmers to write code compared to low-level languages.

Signup and view all the flashcards

Local Area Network (LAN)

A network connecting devices within a limited geographical area, typically a building or office.

Signup and view all the flashcards

Wide Area Network (WAN)

A network spanning a large geographical area, connecting devices across cities, countries, or even continents.

Signup and view all the flashcards

Ring Network

A network topology where devices are connected in a circular fashion, with data traveling in a single direction.

Signup and view all the flashcards

Peer-to-Peer Network

A decentralized network where devices have equal capabilities and can share resources directly with each other without a central server.

Signup and view all the flashcards

Green Icon (Microsoft Security Essentials)

Indicates that the computer's security status is good and protected.

Signup and view all the flashcards

Virus

A small program designed to damage a computer, often spreading by infecting other programs or files.

Signup and view all the flashcards

Cloud Computing

A type of computing where resources like applications, storage, and computing power are accessed over the internet from remote servers.

Signup and view all the flashcards

Trojan Horse (Malware)

A type of malware that disguises itself as a legitimate program to trick users into installing it. It can then steal data, gain control of the computer, or even damage the system.

Signup and view all the flashcards

Types of Viruses (Classification)

Viruses can be classified by various factors, including the speed of their spread, the extent of damage they cause, and their primary goals.

Signup and view all the flashcards

Worm (Malware)

A type of malware that spreads itself from one computer to another without needing user interaction. It can replicate itself and infect multiple systems.

Signup and view all the flashcards

Penetration (Cybersecurity)

Unauthorized access to computer systems or networks. This can include hacking into servers, personal devices, and bypassing security measures.

Signup and view all the flashcards

Boot Sector Virus

A type of virus that infects the boot sector of a hard drive or floppy disk, preventing the operating system from loading properly.

Signup and view all the flashcards

Computer Ethics (Personal vs. Third Party)

Ethical guidelines related to computer use, spanning from individual interactions with computers to interactions between individuals and others.

Signup and view all the flashcards

Non-Synchronous E-learning

Learning methods that don't require all participants to be online at the same time. Examples include forums, wikis, and asynchronous video content.

Signup and view all the flashcards

Open Source E-learning Systems

E-learning platforms with publicly accessible source code. This allows anyone to modify and improve the system, fostering collaboration and customization.

Signup and view all the flashcards

Study Notes

Computer Hardware and Software

  • Computer Components: A computer's physical parts (hardware) include the CPU (central processing unit), memory (RAM), storage devices (hard drive), input devices (keyboard, mouse), and output devices (monitor, printer). Buses connect these components.

  • Input Devices: Devices that provide data to the computer, like keyboards, mice, scanners, microphones, and touchscreens.

  • Output Devices: Devices that display information from the computer, such as monitors, printers, speakers, and headphones.

  • Storage Devices: Devices that store data persistently, including hard drives, SSDs (solid-state drives), and optical discs. RAM stores data temporarily while the computer is running.

  • System Software: Software that manages the computer system, including the operating system (e.g., Windows, macOS, Linux). System software also includes utilities for file management, system maintenance, and device drivers.

  • Application Software: Software designed for specific tasks, like word processing, web browsing, and games.

Computer Networks

  • Types of Networks: Networks can be categorized by their size and geographic reach (LAN - local area network, WAN - wide area network). Peer-to-peer networks connect devices directly to each other, while client-server networks have specialized servers.

  • Network Communication: Networks use various protocols (such as TCP/IP) to facilitate communication between devices.

  • Communication Methods: Networks use various media, including wired connections (like Ethernet cables), and wireless connections (like Wi-Fi).

Number Systems

  • Decimal System: Uses digits 0-9.

  • Binary System: Uses only 0 and 1.

  • Octal System: Uses digits 0-7.

  • Hexadecimal System: Uses digits 0-9 and letters A-F.

Computer Generations

  • First Generation: Used vacuum tubes.

  • Second Generation: Used transistors.

  • Third Generation: Used integrated circuits.

  • Fourth Generation: Used microprocessors.

  • Fifth Generation: Focuses on artificial intelligence and more complex processing.

Computer Software

  • Types of Software: Includes system software (like operating systems and utilities) and application software (like word processors, web browsers, and games).

  • Malware: Malicious software, such as viruses, spyware, and worms, infecting a computer.

E-learning

  • Interactive Tools: Tools such as electronic whiteboards, email, and communication platforms support collaborative learning and interaction.

  • Learning Management Systems: Online platforms facilitating learning, content management, and community building.

Other Concepts

  • Processor Speed: Measured in Hertz (Hz), indicating the processing cycles per second.

  • RAM (Random Access Memory): Temporary storage used during computer operation.

  • ROM (Read-Only Memory): Stores permanent instructions needed for boot-up.

  • CPU (Central Processing Unit): The main component responsible for executing instructions.

  • Input/Output Units: Devices that facilitate data transfer to and from the computer.

  • Hardware: The physical components of a computer.

  • Software: The programs that run on a computer.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Computer Science (PDF)

Description

Test your knowledge on the key components of computer hardware and software. This quiz covers essential topics such as input and output devices, storage options, and system software management. Perfect for students learning about computer fundamentals.

More Like This

Computer Hardware Components Quiz
10 questions
Computer Hardware and Software Overview
40 questions
Computer Hardware and Software Components
30 questions
Use Quizgecko on...
Browser
Browser