Introduction to Computers
Computer Hardware
Computer Software
Computer Networking
Basic Computer Terms
100

Which type of computer is commonly used in homes?

Microcomputers
100

What is the "Brain" of the computer?

CPU - Central Processing Unit

100

If a web browser is an application used to access and view websites. Name TWO browsers.

Safari, Google Chrome, Firefox

100

Which network model is the least secure?

P2P / Peer-to-peer network 

100

The key would you use if you want to erase a character or word.

Delete

200

 Why didn't people have home computers before the 1970s?

Most computers were too large and expensive for home use.

200

 Which hardware component is responsible for ensuring that a CPU operates at a regular temperature?

Heat Sink

200

Henry wants a mobile operating system that he can customize. Which of the following is his best choice?

Android

200

 Which is the largest type of network?

WAN - Wide Area Network

200

Which laptop operating system is a big target of virus attacks?

Windows 11

300

Which type of computer is commonly used to manage large amounts of data?

Mainframe Computers

300

If an input device is any hardware component that allows a user to enter data and instructions into a computer. Name THREE input devices.

keyboard, touchpad/mouse, scanner, webcam, digital camera, microphone, etc.

300

Lisa is preparing to present monthly results to the team and provide a written report for each person. Which of the following software will Lisa need?

Presentation and word processor software.

300

Which topology is the most reliable and expensive?

Mesh

300

Which computer software it least likely to get a virus?

Linux
400

Which type of computer is the most expensive?

Super Computer

400

If an output device is any device used to send data from a computer to another device or user. Name THREE output devices.

printer, monitor, speaker, projector?

400

What are some guidelines of saving a file?

1. Use short, simple file and folder names.
2.Use file and folder names that describe the content accurately.
3.Use all lowercase letters in file names.
4.Use underscores instead of spaces in file names.
5.Avoid using characters such as ! # $ % @ ^ ‘ ~ + ; = in file and folder names.

400

Madison writes for her local newspaper. They have given her a username and password, along with a secure tunnel to log on to their network. Which of the following is Madison using?

Virtual private network (VPN)

400

Where would you most likely find a network with just two computers and a printer?

a) In the data center of a bank.

b) In an agency of the government.

c) In a hospital emergency room. 

d) In a home environment.

d) In a home environment.

500

In which decade were the earliest computing devices developed?

1930s.

500

Amy just purchased a new keyboard and mouse for her computer. Which connector will her keyboard and mouse most likely use?

USB

500

 You opened a folder on your system that contains numerous files, all with file name extensions of .jpg, .png and .gif. What file types are contained in your folder?

Graphics files

500

A school district wants to connect all elementary, middle school and high school LANs. What type of network will meet this requirement?

Metropolitan area network (MAN)

500

Marty was admitted to the hospital for pain in his abdomen. The doctors admit Marty so they can watch him closely. How can the staff make his medical information available quickly and reliably?

a) Update the paper-based medical chart once every hour.

b) Email the updated medical information to each other.

c) Use hospital smartphones to share the information through texting. 

d) Use the network to save and view the information on hospital software.

d) Use the network to save and view the information on hospital software.