Lesson 1 Flashcards
Which of the following is NOT a type of computer port?
A) USB
B) HDMI
C) SSD
D) Ethernet
Correct Answer: C) SSD
What is the function of a BIOS (Basic Input/Output System)?
A) To provide internet access
B) To manage hardware initialization during the boot process
C) To organize files and folders on a storage device
D) To edit documents and spreadsheets
Correct Answer: B) To manage hardware initialization during the boot process
Which of the following is NOT a type of computer virus?
A) Adware
B) Ransomware
C) Spyware
D) Firewall
Correct Answer: D) Firewall
What is the purpose of a VPN (Virtual Private Network)?
A) To create virtual machines
B) To connect to a remote server securely over the internet
C) To scan for viruses and malware
D) To organize files and folders
Correct Answer: B) To connect to a remote server securely over the internet
Which of the following is NOT a type of computer peripheral?
A) Monitor
B) Keyboard
C) Motherboard
D) Printer
C) Motherboard
What does SSD stand for in the context of computer hardware?
A) Solid State Disk
B) System Storage Device
C) Software Security Driver
D) Solid State Drive
D) Solid State Drive
Which of the following is a common type of display resolution?
A) 1080p
B) MP3
C) ZIP
D) TXT
A) 1080p
What is the purpose of an IP address?
A) To identify a specific device on a network
B) To create graphical user interfaces
C) To store data in a cloud environment
D) To play multimedia files
A) To identify a specific device on a network
Which of the following is a characteristic of cloud computing?
A) Requires physical storage devices
B) Involves on-premises infrastructure only
C) Provides on-demand access to computing resources over the internet
D) Relies solely on local networks for data transmission
C) Provides on-demand access to computing resources over the internet
What is the purpose of a DNS server?
A) To provide security for network connections
B) To translate domain names into IP addresses
C) To manage email communication
D) To create virtual private networks
Correct Answer: B) To translate domain names into IP addresses
: A colleague complains that their computer is running very slowly and freezing frequently. What could be some possible causes of this issue?
a) The computer’s antivirus software is too effective.
b) The computer is overheating due to excessive use.
c) The hard drive is almost full.
d) The computer is too new and needs to be replaced.
Answer: c) The hard drive is almost full
receive an email from an unknown sender with an attachment claiming to be an important document. What should you do?
a) Immediately open the attachment to see what it contains.
b) Forward the email to all your colleagues to see if anyone knows the sender.
c) Delete the email without opening the attachment.
d) Reply to the email asking for more information about the attachment
Answer: c) Delete the email without opening the attachment.
Your company has decided to migrate its email services to a cloud-based platform. What are some potential benefits of this migration?
a) Increased risk of data loss.
b) Reduced maintenance and hardware costs.
c) Slower access to email due to reliance on internet connection.
d) Limited storage space for emails.
Answer: b) Reduced maintenance and hardware costs.
You are setting up a new wireless router for your home network. What security measures should you implement to protect your network from unauthorized access?
a) Leave the network open without a password for convenience.
b) Enable WEP encryption.
c) Use a strong WPA2 passphrase.
d) Disable encryption to maximize network speed.
Answer: c) Use a strong WPA2 passphrase.
You notice that your computer is infected with malware. What steps should you take to mitigate the infection?
a) Ignore the issue and continue using the computer as normal.
b) Run a full system scan using antivirus software.
c) Shut down the computer immediately and disconnect it from the network.
d) Install more RAM to boost the computer’s performance.
Answer: c) Shut down the computer immediately and disconnect it from the network.
Which of the following is an example of a volatile memory?
A) Hard disk drive (HDD)
B) Solid-state drive (SSD)
C) Random-access memory (RAM)
D) Flash memory
Key Answer: C) Random-access memory (RAM
Which of the following protocols is commonly used for sending and receiving emails?
A) HTTP
B) FTP
C) SMTP
D) DHCP
Key Answer: C) SMTP
John is setting up a small home network for his family. He wants to ensure that all devices connected to the network can communicate with each other and share files and printers. Which networking device should John install to manage communication between devices within his home network?
A) Modem
B) Router
C) Switch
D) Firewall
Key Answer: B) Router
Lisa is concerned about the security of her online accounts. She wants to use a method that provides an additional layer of security beyond just a password. Which of the following authentication methods should Lisa consider using?
A) Single sign-on (SSO)
B) Two-factor authentication (2FA)
C) Biometric authentication
D) Captcha
Key Answer: B) Two-factor authentication (2FA)
Lisa is concerned about the security of her online accounts. She wants to use a method that provides an additional layer of security beyond just a password. Which of the following authentication methods should Lisa consider using?
A) Single sign-on (SSO)
B) Two-factor authentication (2FA)
C) Biometric authentication
D) Captcha
B) key answer
Mike wants to share a large presentation file with his colleagues. He needs a method that allows multiple users to access and download the file simultaneously without using email. Which technology should Mike use to accomplish this task?
A) Cloud storage
B) Peer-to-peer (P2P) file sharing
C) Virtual private network (VPN)
D) Remote desktop connection
A) Cloud storage
Which of the following is a primary function of an operating system?
A) Creating documents and spreadsheets
B) Managing hardware resources
C) Providing physical security for the computer
D) Transmitting data over the internet
B) Managing hardware resources
What type of software allows users to perform specific tasks, such as word processing or web browsing?
A) Operating system
B) Utility software
C) Application software
D) Firmware
C) Application software
Which component of a computer is responsible for executing instructions to perform calculations and control operations?
A) Hard disk drive (HDD)
B) Random-access memory (RAM)
C) Central processing unit (CPU)
D) Graphics processing unit (GPU)
C) Central processing unit (CPU)
What is the purpose of the BIOS (Basic Input/Output System) in a computer?
A) Manage hardware resources
B) Control the flow of data between the CPU and memory
C) Provide instructions to start the computer
D) Encrypt data transmission over the internet
C) Provide instructions to start the computer
Which storage device retains data even when the computer is powered off?
A) Hard disk drive (HDD)
B) Random-access memory (RAM)
C) Solid-state drive (SSD)
D) USB flash drive
C) Solid-state drive (SSD)
Emily wants to transfer photos from her digital camera to her computer. She connects the camera to her computer using a USB cable but doesn’t see any notification or prompt to import the photos. What could be the possible reason for this issue?
A) The USB cable is faulty
B) The camera’s memory card is full
C) The camera’s drivers are not installed
D) The computer’s USB port is disabled
C) The camera’s drivers are not installed
Alex wants to upgrade his computer’s storage capacity. He is considering replacing his hard disk drive (HDD) with a solid-state drive (SSD). What advantage does an SSD offer over an HDD?
A) Faster data transfer speeds
B) Larger storage capacity
C) Lower cost per gigabyte
D) Better durability
A) Faster data transfer speeds
Jessica is concerned about protecting her computer from viruses and malware. What should she install on her computer to provide real-time protection against these threats?
A) Firewall software
B) Antivirus software
C) Disk encryption software
D) Backup software
B) Antivirus software