No student devices needed. Know more
36 questions
How might a computer virus infect your computer?
By scanning a photo on to your computer with a flatbed scanner
Through an infected email attachment that you open
By reading internet blogs
By installing an anti-virus software on your computer
Which component of a computer controls the entire system and is often called the brain of the computer?
The CPU
The User
The Monitor
The Software
Larry Burton is creating a password for an new online account. Which of the following would make a good password?
Larrypassword
La$y3B!r3t!n
LBurton
Which of the following statements is true?
An input device sends information to the computer and an output device sends information to the computer.
An input device sends information to the computer and an output device receives information from the computer.
An input device receives information from the computer and an output device sends information to the computer.
An input device receives information from the computer and an output device receives information from the computer.
Which of the following is the best definition of what an IP Address does?
It tells the computer who the user is
It identifies the software that is being used to access the Internet
It helps a computer find other computers on the network
A public Wi-Fi risk that can be minimized by only visiting encrypted sites with an HTTPS indicator is:
Rogue Public Wi-Fi
Man-in-the-Middle Attacks
Junk Mail
Harmful Software Attacks
Which definition best describes a computer?
A machine that stores and processes data
A machine with a brain and emotions
A device that collects viruses and dust
A device that was invented to be smarter than man
A company that offers services for accessing and using the internet is:
a modem
a public Wi-Fi provider
a network
an Internet Service Provider (ISP)
Which term best describes the operating system of a computer?
Motherboard
System Software
Output Device
Application Software
What does troubleshooting refer to?
Using simple problem solving techniques to solve a problem.
Relying on restarting the computer to solve simple problems.
Helping other's solve their computer problems.
Using techniques to identify and avoid new problems in the future.
Which of the following are you likely to find in an office building?
LAN
WAN
What does a driver do?
It detects, prevents, and disarms malicious software.
Speeds up the time it takes for a peripheral to load.
It boots up the computer.
It enables a peripheral and a computer to talk to each other.
What is a type of local network that people can use to access the Internet?
Computer
Private Home Network
Router
Mobile
Wi-Fi is mainly used by both home and public networks to access the Internet.
False
True
What does a server do?
It provides a particular service and manages resources
It connects computers together
It provides the basic functions of a computer
It is the computer's memory
What is the short-term storage for your computer called?
Random Access Memory
Random Operating Memory
Random Operations Memory
Random Assorted Memory
Which of the following is a benefit of using a cloud storage option?
It protects your computer from viruses
It provides a backup of your data, files and photos
You don't need Internet access to retrieve the data
An Email message that you did not finish writing can be found in which folder?
Trash
Draft
Saved
Sent
Which item is NOT considered computer hardware:
Operating system
Monitor
CPU
Keyboard
The physical components of a computer are called what?
Malware
Hardware
Software
Spyware
Which of the following is NOT an example of an application software?
Internet Explorer web browser
Photoshop image editing program
Microsoft PowerPoint presentation software
Windows operating system
Which of the following might make you suspicious of an email that you receive?
An email from your aunt you haven't heard from in a year
Subject line heading of "40% Off Sale" with a return address of sales@macy.com
An email that contains an attachment
Subject line heading of "You have WON $1,000,000!" with a return address of drcashnow@shaw.ca
A file extension of .jpg means that the file contains what?
An image
A PowerPoint document
An application
A Word document
Which of the following is NOT a true statement about using a cloud storage option?
It can be accessed through any computer, anywhere in the world
Your computer or tablet can be set up to automatically sync with the cloud
Using the cloud keeps your computer safe from viruses
You can easily share documents and/or files with friends or family
What does URL stand for?
Ultimate Resource Locator
Uniform Resource Language
Understand Resource Language
Uniform Resource Locator
Computer programs and games are called what?
Software
Flashware
Entertainmentware
Hardware
What controls a computer's basic operations?
Motherboard
Software system
Operating system
RAM
Which of the following is NOT a peripheral?
Input devices
CPU devices
Output devices
Input/Output devices
LAN and WAN stand for what?
Local Access Network / Wide Access Network
Limited Access Network / Widening Access Network
Local Area Network / Wide Area Network
Limited Area Network / Wide Area Network
When looking on the Internet for a solution to a problem, you should look for what kinds of sources?
Reliable
Smart
Technically advanced
Free
A computer firewall is:
software that reduces the temperature of your computer
a router that cannot be hacked
security software that protects your computers from hackers
a fireproof case that protects your computer from heat
Which statement best defines what technology is?
Technology is everything that makes the world better
Technology is something that is used only in electronic devices
Technology is the process by which a machine a receives directions
Technology is any invention, including tools, machines, techniques, and sources of power
What does a file extension tell your computer?
When the file was created
Where a program is saved
What type of program to open
Which file name to display
Your computer keyboard, mouse, and printer use which of the following type of cable?
USB cable
Peripheral cable
Ethernet cable
Serial cable
What does a phishing email try to do?
Inform you that you have won the lottery or a large prize.
Steal your personal information such as passwords, bank account numbers and usernames.
Sell you the latest and newest technology at steep discounted prices.
None of the above
A file that is sent along with an email message is called a(n):
Add-on
Document
Attachment
Selected file
Explore all questions with a free account