Crear actividad
Jugar Test
1. 
What is the difference between a rendering engine and a browser engine?
A.
Back and Forward buttons and a browser engine stores user passwords
B.
User interface interactions and a browsing engine display content on screen
C.
Enables browser to save info & a browser engine handles networking requests
D.
Displays content on screen & a browser engine coordinates user interactions
2. 
What does data storage enable a browser to do?
A.
organize lists of bookmarks
B.
edit open-source software
C.
organize a hard drive
D.
save browsing information
3. 
Which of the following best describes open-source web browsers?
A.
Open-source web browsers allow non-paid access and distribution.
B.
Open-source web browsers do not include bookmarking features.
C.
Open-source web browsers include browsers such as Internet Explorer & Opera
D.
Open-source web browsers have rendering engines but not browsing engines.
4. 
Which of the following is an open-source web browser?
A.
Firefox
B.
Opera
C.
Internet Explorer
D.
Telnet
5. 
Examine info. in URL: http://www.example/home/index.html, what is the subdomain and what is the domain name?
A.
The subdomain is http:// and the domain name is .html.
B.
The subdomain is /home/ and the domain name is http://.
C.
The subdomain is www and the domain name is example.com.
D.
The subdomain is example.com and the domain name is www.
6. 
What is telnet?
A.
internet protocol that allows one to access newsgroups
B.
internet protocol that is the foundation for online data communication
C.
internet protocol that connects to a computer remotely
D.
internet protocol that loads a local file from a network onto a computer
7. 
What does the Internet Engineering Task Force (IEFT) do?
A.
changes the code in open-source web browsers
B.
standardizes Universal Resource Locators (URLs)
C.
makes all Universal Resource Locators (URLs) human-readable
D.
creates methods of moving files between computers and networks
8. 
Allie is choosing a URL for her band’s website, which is the best method of making the URL easy to understand?
A.
creating a URL with a long, descriptive domain name
B.
creating a URL that can be rendered using file transfer protocol
C.
creating a URL that represents data in strings of numbers
D.
creating a human-readable URL
9. 
What allows a person to interact with web browser software?
A.
user interface
B.
file transfer protocol
C.
networking
D.
URLs
10. 
Icon view, list view, and details view are all common views provided by which kind of program?
A.
a web browser to view web pages
B.
a word processor to view headings
C.
a file browser to view folders
D.
a file manager to view files and folders
11. 
When you cut and then paste a file, what are you doing?
A.
copying it and placing a duplicate in another location
B.
compressing it and placing the compressed version in another location
C.
renaming it, and then saving it with the new file name
D.
removing it from its current location and placing it in another
12. 
What best describes the purpose of the Recycle Bin (Microsoft Windows) and Trash (Apple Mac) features?
A.
to make more room for new files or folders on a storage device
B.
to enable users to recover accidentally deleted files and folders
C.
to scramble file content to make files unreadable
D.
to clean out a folder so that it can be reused multiple times
13. 
Which of the following best describes a computer virus?
A.
another name for a software bug
B.
the product of a computer crash
C.
software that can spread itself
D.
software errors caused by power surges
14. 
Which of the following is a system management tool?
A.
an event viewer
B.
a firewall
C.
antivirus software
D.
a spam filter
15. 
The Event Viewer (Microsoft Windows) or Console (Apple Mac OS X) is used for what purpose?
A.
to view and manage events scheduled in one or more user calendars
B.
to configure system security features ie: firewalls & antivirus scanners
C.
to view incidents recorded in the Application, Security, and System logs
D.
to manage user names and passwords on a network
16. 
A deleted file or folder is not permanently deleted from a computer until which event occurs?
A.
The computer is restarted.
B.
The Recycle Bin or Trash is emptied.
C.
The person who deleted it logs off.
D.
The Event Viewer is cleared.
17. 
A nested folder can best be described as what?
A.
a folder that is empty
B.
a folder that contains more than one file
C.
a folder contained within another folder
D.
a folder that contains exactly one file
18. 
A file name extension provides what information about a file?
A.
the file format
B.
the file length
C.
the file permissions
D.
the file creation date
19. 
Which description of the plain text file format is most accurate?
A.
uses binary code to store data
B.
can only be opened with special software
C.
supports text formatting like bold or italics
D.
used by programmers for source code
20. 
What best describes proprietary file format?
A.
A format that is closed but free of cost.
B.
A format that is considered a trade secret.
C.
A format that is not bound by copyright law.
D.
A format that is open and free of cost.
21. 
What is the name of the top-level parentless folder in a digital file system?
A.
root
B.
tree
C.
child
D.
subfolder
E.
root
F.
tree
22. 
A linear representation of a hierarchical file directory is known as what?
A.
a file list
B.
a directory path
C.
a subdirectory
D.
a file association
23. 
A folder has been shared with other users and set to read-only. What does this mean for users?
A.
Users can only read the name of the shared folder.
B.
Users cannot add new folders or files.
C.
Users can read and edit files.
D.
Users can add new files but not new folders.
24. 
In what year were graphical user interfaces (GUIs) pioneered?
A.
1969
B.
1974
C.
1991
D.
2001
25. 
What statement best describes operating systems?
A.
It’s possible for modern computers to function without operating systems.
B.
Most operating systems are free or very inexpensive.
C.
Operating systems are managed by the computer’s microprocessor (CPU).
D.
Operating systems manage the computer’s random access memory (RAM).
26. 
What does the shell of an operating system do?
A.
changes the operating system so that it can be installed on smartphones
B.
generates a printed list of the inputs and outputs of the OS
C.
creates files and sets up a system so files are managed efficiently
D.
provides a user interface that enables users to interact with the OS
27. 
Who designed the Apple I computer in 1976?
A.
Steve Wozniak
B.
Richard Stallman
C.
Allen Konrad
D.
Paul Zuse
28. 
What statement best describes the difference between Apple OS X and Linux-Based operating systems?
A.
Apple OS X work variety of hardware & Linux-Based OS don't work everything
B.
Apple OS X only work on Apple hardware & Linux-Based OS work most hardware
C.
Apple OS X has fewer applications available than Linux-Based operating syst
D.
Apple OS X is free or inexpensive and Linux-Based operating systems are very expensive.
29. 
If you want a smartphone with the fewest restrictions on application development, which smartphone OS should you choose?
A.
IBM
B.
Android
C.
Apple iOS
D.
Windows
30. 
What statement best describes Konrad Zuse?
A.
He developed the first graphical user interface.
B.
He created a method of designing smartphone applications.
C.
He founded Microsoft with Paul Allen.
D.
He developed the first electrically-powered computer.
31. 
During which phase of the software development process are developers most likely to log bugs?
A.
requirements specifications
B.
maintenance
C.
evaluation
D.
development
32. 
What do developers do to support software products?
A.
explain which development process model was used to make the product
B.
write an explanation of how the product functions and meets the requirement
C.
revise product’s specification document so that it’s updated and accurate
D.
update software code to fix bugs, improve functionality, and & new features
33. 
What software development model focuses on improving the product in small steps each time through the cycle?
A.
agile process model
B.
waterfall process model
C.
iterative process model
D.
spiral process model
34. 
Why is it important for software developers to study Human-Computer Interaction?
A.
user interface easy to use, increases the value of software application
B.
reduce # of software applications on a computer so the computer runs slow
C.
no need for a mouse or keyboard in order to use the software application
D.
users notice any bugs in the software application that need to be fixed
35. 
When does a kernel panic occur?
A.
when the incorrect serial number is entered during software installation
B.
when Dynamic-Ling Library (DLL) files are missing or damaged
C.
when there are too many applications running on a computer at the same time
D.
when an operating system finds a fatal error that it cannot safely recover
36. 
If your computer is running slowly, which of the following is most likely to solve the problem?
A.
Scanning, cleaning, and optimizing your hard drive
B.
Checking to make sure all of the computer’s cords are plugged in
C.
Reentering the serial #s of the software programs the computer is running
D.
Searching the hard drive for missing DLL files
37. 
Which of the following is the best example of an installation issue?
A.
A computer can’t find the file that it needs to perform an OS function
B.
A computer displays error messages, & then the Blue Screen of Death appears
C.
A user made an error while trying to set up a software program.
D.
A software program is not compatible with the computer’s OS.
38. 
Which of the following is an advantage of using proprietary licensed software?
A.
The software’s source code can be easily modified.
B.
The software is free for anyone who wants to use it.
C.
The software is usually polished and has fewer bugs.
D.
The software can be installed on unlimited computers.
39. 
Which of the following is an advantage of using proprietary licensed software?
A.
The software’s source code can be easily modified.
B.
The software is free for anyone who wants to use it.
C.
The software is usually polished and has fewer bugs.
D.
The software can be installed on unlimited computers.
40. 
Why do software developers prefer to use high-level language to author programs?
A.
It can be used on computers without microprocessors.
B.
It prevents anyone from making changes to the software later.
C.
It uses a more English-like syntax.
D.
It’s less complicated because it only uses zeros and ones.
41. 
Which of the following are examples of system software?
A.
device drivers and system security utilities
B.
operating systems and Web browsers
C.
word processing programs and device drivers
D.
disk drive utilities and email programs
42. 
Emails by Jim’s office is sending emails with viruses attached to user’s computers. What should Jim do?
A.
Downgrade the email software to an older, previous version
B.
Buy a newer email program and migrate the office computers to that program
C.
Switch from open source software to proprietary software
D.
Check for and install patches or software updates
43. 
What is the purpose of an End User License Agreement?
A.
to ensure that software users understand their rights and responsibilities
B.
ensure that software users understand how to use and install the program
C.
require users to erase installer files after a software migration project
D.
to license users to make multiple changes to proprietary software
44. 
What is the purpose of system software?
A.
perform specific computing tasks, ie,word processing and calculation
B.
provide basic operational functionality by coordinating hardware components
C.
perform operations inside a web browser in many different OS
D.
translate high-level software programming into machine language as is run