Lesson 1 Flashcards

1
Q

Which of the following is NOT a type of computer port?
A) USB
B) HDMI
C) SSD
D) Ethernet

A

Correct Answer: C) SSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the function of a BIOS (Basic Input/Output System)?
A) To provide internet access
B) To manage hardware initialization during the boot process
C) To organize files and folders on a storage device
D) To edit documents and spreadsheets

A

Correct Answer: B) To manage hardware initialization during the boot process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is NOT a type of computer virus?
A) Adware
B) Ransomware
C) Spyware
D) Firewall

A

Correct Answer: D) Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of a VPN (Virtual Private Network)?
A) To create virtual machines
B) To connect to a remote server securely over the internet
C) To scan for viruses and malware
D) To organize files and folders

A

Correct Answer: B) To connect to a remote server securely over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is NOT a type of computer peripheral?
A) Monitor
B) Keyboard
C) Motherboard
D) Printer

A

C) Motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does SSD stand for in the context of computer hardware?
A) Solid State Disk
B) System Storage Device
C) Software Security Driver
D) Solid State Drive

A

D) Solid State Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a common type of display resolution?
A) 1080p
B) MP3
C) ZIP
D) TXT

A

A) 1080p

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of an IP address?
A) To identify a specific device on a network
B) To create graphical user interfaces
C) To store data in a cloud environment
D) To play multimedia files

A

A) To identify a specific device on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is a characteristic of cloud computing?
A) Requires physical storage devices
B) Involves on-premises infrastructure only
C) Provides on-demand access to computing resources over the internet
D) Relies solely on local networks for data transmission

A

C) Provides on-demand access to computing resources over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of a DNS server?
A) To provide security for network connections
B) To translate domain names into IP addresses
C) To manage email communication
D) To create virtual private networks

A

Correct Answer: B) To translate domain names into IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

: A colleague complains that their computer is running very slowly and freezing frequently. What could be some possible causes of this issue?
a) The computer’s antivirus software is too effective.
b) The computer is overheating due to excessive use.
c) The hard drive is almost full.
d) The computer is too new and needs to be replaced.

A

Answer: c) The hard drive is almost full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

receive an email from an unknown sender with an attachment claiming to be an important document. What should you do?
a) Immediately open the attachment to see what it contains.
b) Forward the email to all your colleagues to see if anyone knows the sender.
c) Delete the email without opening the attachment.
d) Reply to the email asking for more information about the attachment

A

Answer: c) Delete the email without opening the attachment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Your company has decided to migrate its email services to a cloud-based platform. What are some potential benefits of this migration?
a) Increased risk of data loss.
b) Reduced maintenance and hardware costs.
c) Slower access to email due to reliance on internet connection.
d) Limited storage space for emails.

A

Answer: b) Reduced maintenance and hardware costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are setting up a new wireless router for your home network. What security measures should you implement to protect your network from unauthorized access?
a) Leave the network open without a password for convenience.
b) Enable WEP encryption.
c) Use a strong WPA2 passphrase.
d) Disable encryption to maximize network speed.

A

Answer: c) Use a strong WPA2 passphrase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You notice that your computer is infected with malware. What steps should you take to mitigate the infection?
a) Ignore the issue and continue using the computer as normal.
b) Run a full system scan using antivirus software.
c) Shut down the computer immediately and disconnect it from the network.
d) Install more RAM to boost the computer’s performance.

A

Answer: c) Shut down the computer immediately and disconnect it from the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is an example of a volatile memory?
A) Hard disk drive (HDD)
B) Solid-state drive (SSD)
C) Random-access memory (RAM)
D) Flash memory

A

Key Answer: C) Random-access memory (RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following protocols is commonly used for sending and receiving emails?
A) HTTP
B) FTP
C) SMTP
D) DHCP

A

Key Answer: C) SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

John is setting up a small home network for his family. He wants to ensure that all devices connected to the network can communicate with each other and share files and printers. Which networking device should John install to manage communication between devices within his home network?
A) Modem
B) Router
C) Switch
D) Firewall

A

Key Answer: B) Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Lisa is concerned about the security of her online accounts. She wants to use a method that provides an additional layer of security beyond just a password. Which of the following authentication methods should Lisa consider using?
A) Single sign-on (SSO)
B) Two-factor authentication (2FA)
C) Biometric authentication
D) Captcha

A

Key Answer: B) Two-factor authentication (2FA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Lisa is concerned about the security of her online accounts. She wants to use a method that provides an additional layer of security beyond just a password. Which of the following authentication methods should Lisa consider using?
A) Single sign-on (SSO)
B) Two-factor authentication (2FA)
C) Biometric authentication
D) Captcha

A

B) key answer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Mike wants to share a large presentation file with his colleagues. He needs a method that allows multiple users to access and download the file simultaneously without using email. Which technology should Mike use to accomplish this task?
A) Cloud storage
B) Peer-to-peer (P2P) file sharing
C) Virtual private network (VPN)
D) Remote desktop connection

A

A) Cloud storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is a primary function of an operating system?
A) Creating documents and spreadsheets
B) Managing hardware resources
C) Providing physical security for the computer
D) Transmitting data over the internet

A

B) Managing hardware resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What type of software allows users to perform specific tasks, such as word processing or web browsing?
A) Operating system
B) Utility software
C) Application software
D) Firmware

A

C) Application software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which component of a computer is responsible for executing instructions to perform calculations and control operations?
A) Hard disk drive (HDD)
B) Random-access memory (RAM)
C) Central processing unit (CPU)
D) Graphics processing unit (GPU)

A

C) Central processing unit (CPU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the purpose of the BIOS (Basic Input/Output System) in a computer?
A) Manage hardware resources
B) Control the flow of data between the CPU and memory
C) Provide instructions to start the computer
D) Encrypt data transmission over the internet

A

C) Provide instructions to start the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which storage device retains data even when the computer is powered off?
A) Hard disk drive (HDD)
B) Random-access memory (RAM)
C) Solid-state drive (SSD)
D) USB flash drive

A

C) Solid-state drive (SSD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Emily wants to transfer photos from her digital camera to her computer. She connects the camera to her computer using a USB cable but doesn’t see any notification or prompt to import the photos. What could be the possible reason for this issue?
A) The USB cable is faulty
B) The camera’s memory card is full
C) The camera’s drivers are not installed
D) The computer’s USB port is disabled

A

C) The camera’s drivers are not installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Alex wants to upgrade his computer’s storage capacity. He is considering replacing his hard disk drive (HDD) with a solid-state drive (SSD). What advantage does an SSD offer over an HDD?
A) Faster data transfer speeds
B) Larger storage capacity
C) Lower cost per gigabyte
D) Better durability

A

A) Faster data transfer speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Jessica is concerned about protecting her computer from viruses and malware. What should she install on her computer to provide real-time protection against these threats?
A) Firewall software
B) Antivirus software
C) Disk encryption software
D) Backup software

A

B) Antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the purpose of the Control Panel in a Windows operating system?
A) Manage hardware resources
B) Install new software applications
C) Customize system settings
D) Create user accounts

A

C) Customize system settings

31
Q

What function does the Task Manager perform in a Windows operating system?
A) Manage installed programs
B) Monitor system performance
C) Control network connections
D) Backup files and folders

A

B) Monitor system performance

32
Q

Mary accidentally deleted an important file from her computer. She realizes her mistake and wants to restore the file from the Recycle Bin. Where should Mary look for the Recycle Bin icon to recover the deleted file?
A) Desktop
B) Start menu
C) Taskbar
D) File Explorer

A

A) Desktop

33
Q

Alex is experiencing slow performance on his computer and suspects that too many programs are running in the background. Which Windows utility can he use to view and manage running processes?
A) Task Manager
B) Control Panel
C) System Configuration
D) Disk Cleanup

A

A) Task Manager

34
Q

David wants to connect his external USB drive to his Windows computer. However, he is unsure if the computer recognizes the device. Which Windows utility can David use to verify if the USB drive is detected by the system?
A) Device Manager
B) Task Manager
C) System Information
D) Disk Management

A

A) Device Manager

35
Q

Emily is using a Windows computer and wants to change the date and time settings. However, she cannot find the option in the Control Panel. What could be a possible reason for this?
A) The computer is not connected to the internet.
B) Emily does not have administrative privileges.
C) The computer’s hardware clock is malfunctioning.
D) The date and time settings can only be changed by the system administrator.

A

B) Emily does not have administrative privileges.

36
Q

Tom wants to customize the power settings on his Windows laptop to conserve battery life. However, he cannot find the appropriate option in the Control Panel. What should Tom do to access the power settings?
A) Use the command prompt to change power settings.
B) Access the power settings from the System Tray.
C) Check the BIOS settings for power management options.
D) Install third-party software to manage power settings.

A

B) Access the power settings from the System Tray.

37
Q

Jessica is working on her Windows computer and notices that the system is running slower than usual. She suspects that too many startup programs are causing the slowdown. What should Jessica do to manage startup programs?
A) Use the Task Manager to disable startup programs.
B) Access the Control Panel and navigate to System Configuration.
C) Use the Registry Editor to remove startup entries.
D) Reinstall the operating system to reset startup programs.

A

B) Access the Control Panel and navigate to System Configuration.

38
Q

Mike wants to personalize the appearance of his Windows computer by changing the desktop theme. However, he cannot find the option in the Control Panel. What could be a possible reason for this?
A) The computer’s graphics card does not support desktop themes.
B) Mike is using an outdated version of Windows that does not include desktop themes.
C) The desktop theme settings are managed by the system administrator.
D) Desktop themes can only be downloaded from third-party websites.

A

C) The desktop theme settings are managed by the system administrator.

39
Q

Alex wants to change the screen resolution on his Windows computer to improve display quality. However, he cannot find the option in the Control Panel. What should Alex do to adjust the screen resolution?
A) Update the graphics card driver.
B) Access the screen resolution settings from the desktop context menu.
C) Use the command prompt to change screen resolution.
D) Purchase a new monitor with higher resolution capabilities.

A

B) Access the screen resolution settings from the desktop context menu.

40
Q

Sarah is using a Windows computer and encounters a problem where the screen suddenly freezes, and she cannot perform any actions. She suspects that a recently installed application might be causing the issue. What troubleshooting steps should Sarah take to resolve the problem?
A) Reboot the computer in Safe Mode and uninstall the recently installed application.
B) Use System Restore to revert the computer to a previous state before the application was installed.
C) Perform a clean boot to isolate the problematic application and disable it.
D) Reinstall the operating system to fix any corrupted system files.

A

C) Perform a clean boot to isolate the problematic application and disable it.

41
Q

Tom is setting up a new user account on his Windows computer for his family member. He wants to restrict access to certain applications and files for this user. What should Tom do to configure the user account settings accordingly?
A) Modify the permissions for each individual file and application.
B) Create a separate user group with restricted access rights.
C) Enable Parental Controls and configure application and file restrictions.
D) Use a third-party software to manage user access permissions.

A

C) Enable Parental Controls and configure application and file restrictions.

42
Q

Emily is using a Windows computer and wants to organize her files and folders more efficiently. She decides to create a custom library to group related files together. However, she cannot find the option to create a new library in File Explorer. What could be a possible reason for this?
A) The computer’s hard drive is full and cannot create new libraries.
B) Libraries are disabled in the system settings by the administrator.
C) Emily does not have the necessary permissions to create new libraries.
D) Libraries are only available in certain editions of Windows and may not be supported.

A

B) Libraries are disabled in the system settings by the administrator.

43
Q

Jessica wants to install a new software application on her Windows computer. However, she encounters an error message stating that the application cannot be installed due to insufficient disk space. What troubleshooting steps should Jessica take to free up disk space and install the application?
A) Use Disk Cleanup to remove temporary files and unnecessary system files.
B) Upgrade the computer’s hard drive to a larger capacity.
C) Delete important system files to create space for the application.
D) Move existing files to an external storage device to make room for the application.

A

A) Use Disk Cleanup to remove temporary files and unnecessary system files.

44
Q

Which of the following is a characteristic of cloud computing?
A) Requires physical hardware installation
B) Provides on-demand access to computing resources
C) Limited scalability
D) Relies solely on local storage

A

B) Provides on-demand access to computing resources

45
Q

Which of the following is a feature of an operating system?
A) Hardware manufacturing
B) Creating web pages
C) Managing computer resources
D) Building mobile applications

A

C) Managing computer resources

46
Q

What is the primary purpose of antivirus software?
A) Encrypting files and folders
B) Managing hardware resources
C) Protecting against malware threats
D) Monitoring internet traffic

A

C) Protecting against malware threats

47
Q

What function does the Task Manager perform in a Windows operating system?
A) Manage installed programs
B) Monitor system performance
C) Control network connections
D) Backup files and folders

A

B) Monitor system performance

48
Q

Which of the following is an example of system software?
A) Microsoft Word
B) Adobe Photoshop
C) Windows Defender
D) Google Chrome

A

C) Windows Defender

49
Q

What should you use to configure system settings, manage user accounts, and install software in a Windows operating system?
A) Task Manager
B) Control Panel
C) Device Manager
D) System Preferences

A

B) Control Panel

50
Q

What is the primary purpose of a firewall in network security?
A) Encrypt data transmission
B) Filter incoming and outgoing network traffic
C) Manage hardware resources
D) Defragment hard drives

A

B) Filter incoming and outgoing network traffic

51
Q

What is the purpose of file compression software?
A) Encrypt files for secure transmission
B) Increase the size of files to preserve quality
C) Reduce the size of files to save storage space
D) Convert files into different formats

A

C) Reduce the size of files to save storage space

52
Q

Which networking device is used to connect multiple devices within a local area network (LAN)?
A) Modem
B) Router
C) Switch
D) Firewall

A

C) Switch

53
Q

Which of the following is a characteristic of solid-state drives (SSDs) compared to traditional hard disk drives (HDDs)?
A) Higher storage capacity
B) Slower data transfer speeds
C) Mechanical moving parts
D) Faster access times

A

D) Faster access times

54
Q

Which of the following is an advantage of using cloud storage?
A) Limited accessibility
B) Lower data security
C) Scalability
D) Dependence on physical hardware

A

C) Scalability

55
Q

Which technology allows users to interact with a computer using their voice?
A) Virtual reality (VR)
B) Augmented reality (AR)
C) Voice recognition
D) Optical character recognition (OCR)

A

C) Voice recognition

56
Q

What is the primary function of a modem?
A) Connect multiple devices within a network
B) Provide wireless internet access
C) Convert digital data into analog signals for transmission over telephone lines
D) Encrypt data transmission over the internet

A

C) Convert digital data into analog signals for transmission over telephone lines

57
Q

Which of the following protocols is commonly used for sending and receiving emails?
A) HTTP
B) FTP
C) SMTP
D) DHCP

A

C) SMTP

58
Q

What is the purpose of spreadsheet software?
A) Create and edit images
B) Manage hardware resources
C) Analyze and manipulate data
D) Write computer programs

A

C) Analyze and manipulate data

59
Q

What is the primary function of RAM (Random Access Memory)?
A) Store data permanently
B) Execute program instructions
C) Manage hardware resources
D) Connect external devices

A

B) Execute program instructions

60
Q

Which networking device is responsible for forwarding data packets between different networks?
A) Switch
B) Router
C) Modem
D) Firewall

A

B) Router

61
Q

What is the purpose of a web browser’s bookmarks feature?
A) Send emails
B) Store frequently visited websites for easy access
C) Organize files and folders
D) Encrypt data transmission

A

B) Store frequently visited websites for easy access

62
Q

Which of the following is a characteristic of a solid-state drive (SSD)?
a) Uses magnetic storage
b) Slower data access compared to HDD
c) No moving parts
d) Lower cost than traditional hard drives

A

c) No moving parts

63
Q

What does LAN stand for?
a) Local Access Network
b) Large Area Network
c) Local Area Network
d) Long Access Network

A

c) Local Area Network

64
Q

What is the purpose of an ethernet cable?
a) To connect a computer to the internet wirelessly
b) To connect a computer to a printer
c) To connect devices on a LAN
d) To charge a mobile phone

A

c) To connect devices on a LAN

65
Q

What is the purpose of a modem?
a) To convert digital signals to analog signals for transmission over telephone lines
b) To amplify wireless signals
c) To store data temporarily
d) To provide power to a computer

A

a) To convert digital signals to analog signals for transmission over telephone lines

66
Q

Which of the following is NOT a type of network topology?
a) Star
b) Bus
c) Mesh
d) Loop

A

D) Loop

67
Q

Which of the following is an example of productivity software?
a) Web browser
b) Antivirus program
c) Word processor
d) Graphics editor

A

c) Word processor

68
Q

What does HTML stand for?
a) Hypertext Markup Language
b) High-Tech Multimedia Language
c) Hardware Text Manipulation Language
d) Hyperlink Text Management Language

A

a) Hypertext Markup Language

69
Q

Which of the following is an example of system software?
a) Microsoft Word
b) Windows operating system
c) Adobe Photoshop
d) Google Chrome

A

b) Windows operating system

70
Q

What device is used to connect multiple computers in a local area network (LAN)?
a) Modem
b) Router
c) Switch
d) Firewall

A

Answer: c) Switch)

71
Q

Which of the following is an example of application software?
a) Windows operating system
b) Microsoft Excel
c) BIOS
d) Motherboard

A

Answer: b) Microsoft Exce

72
Q

Which of the following is an example of application software?
a) Windows operating system
b) Microsoft Excel
c) BIOS
d) Motherboard

A

(Answer: b) Microsoft Excel)

73
Q
A