Operating Systems
Network and Internet Security
Internet and WWW
Application Software
Input and Output
100

Recent Windows operating system released to the public on October 22, 2009

Answers:

Windows XP

Windows 7

Windows 10

Windows 11


Windows 7

100

What is the act of breaking into another computer system?

Hacking?

100

What are businesses or other organizations that provide Internet access to others, typically for a fee (internet service provider), called?

They are called ISP.

100

Software programs that are distributed on the honor system.

Shareware?

100

The most common pointing device for a PC

Mouse

200

A Unix-like computer operating system assembled under the model of free and open-source software development and distribution

Linux?

200

A generic term that refers to any type of malicious software

Malware

200

People who use the internet to retrieve content or perform online activities

Users?

200

Software programs that are given away by the author for others to use free of charge

Freeware

200

A flat, touch-sensitive tablet used in conjunction with a digital pen

Graphic Tablet

300

A mobile operating system and computing platform designed for smartphones

Symbian

300

Secret words or character combinations associated with an individual

Password

300

A system that allows you to exchange real-time messages easily with people on your buddy list?

Instant Messaging

300

Open source internet browser?

Chrome 

300

Captures the image of a usually flat objects in digital form and then transfers that data to a PC

Scanner

400

Open-source operating system?

Linux

400

A security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access

Firewall

400

Which computer function takes data through a series of procedures defined by a set of instructions?

Storage

Networking

Processing

Output

Processing

400

Which of the following Windows 11 Enterprise edition versions is specifically intended for organizations that want to use cloud-delivered endpoint security?

Answers:

Enterprise E3 in Microsoft 365 E3

Enterprise

Enterprise E5

Enterprise E3

Enterprise E5

400

The process of entering audio data into the computer?

Audio Input

500

Which of the following is software that allows a user to access a computer's memory, file system, processes, and hardware?

Answers:

CPU

Application software

Operating system

RAM

Operating system

500

What is called online harassment that frightens or threatens the victim?

Cyberbullying?

500

A technician is installing a cable modem that supplies internet connectivity for a home office.

Which of the following cabling types would they use to connect the cable modem to the wall outlet?

Answers:

Cat 6a

Cat 5e

Multi-mode fiber

RG-6

RG-6

500

A technician is running a network above a dropped ceiling that is also used for ventilation. The cable must be twisted pair and must be capable of Gigabit Ethernet speeds.

Which of the following cables should the technician use?

Answers:

Plenum-rated Cat 6a

Riser-rated RG-58

Riser-rated Cat 5e

Plenum-rated multimode fiber

Plenum-rated Cat 6a

500

Which of the following is designed to provide a Linux command line interface?

Answers:

GCC

GIMP

GPL

Bash

Bash