Testing technological terminology - Part 14

  1. 1. Which of the following best describes an email bomb?
    1. It is an email with virus settings on another computer or device
    2. It was a malicious attachment that overloaded the mail server's processor
    3. It is a script that aggregates all email addresses from a user's system
    4. It is a large number of email addresses sent to an account
    The correct answer is 'That is a large number of email addresses sent to an account'.
  2. 2. What type of RAM stores data after power off?
    1. DRAM
    2. SDRAM
    3. VRAM
    4. NVRAM
    The correct answer is 'NVRAM'.
  3. 3. The popular Expansion Port (expansion port) in the 1990s include MCA, VLB and .
    1. CDR
    2. ISA
    3. PCB
    4. DLL
    The correct answer is 'ISA'.
  4. 4. Does the term "DevOps" combine the word "Development" with the following word?
    1. Operations
    2. Options
    3. Obstacles
    4. Open source
    The correct answer is 'Operations'.
  5. 5. Which of the following numbers is 1024 bytes?
    1. 1 kibibyte
    2. 1 mebibyte
    3. 1 gibibyte
    4. 1 tebibyte
    The correct answer is '1 kibibyte'.
  6. 6. Which of the following provides access to Internet backbone?
    (Internet backbone refers to important data routes between large, strategically connected networks and major routers on the Internet.)
    1. NFC
    2. NSP
    3. NNTP
    4. NetBIOS
    The correct answer is 'NSP'.
  7. 7. What is the calculation that determines the value of a cell in a worksheet?
    1. Fraction
    2. Filter
    3. Recipe
    4. Format
    The correct answer is 'Formula'.
  8. 8. Which definition best describes the throughput?
    1. How much data can be transferred in a given period of time
    2. How fast the signal can change over the analog line
    3. How many bits a packet can contain
    4. How far the wireless signal can go
    The correct answer is 'How much data can be transferred in a given time period'.
  9. 9. How many bits in! Gigabit?
    1. 10 9
    2. 10 10
    3. 10 11
    4. 10 12
    The correct answer is '10 9 '.
  10. 10. Which company is the HFS file system developed by?
    1. IBM
    2. Oracle
    3. Google
    4. Apple
    The correct answer is 'Apple'.
  11. 11. The following is not considered a desktop computer?
    1. iMac
    2. Mac Pro
    3. Mac mini
    4. MacBook
    The correct answer is 'MacBook'.
  12. 12. What is the high-speed, high-bandwidth data link also called?
    1. Broadcom
    2. Broadnet
    3. Broadband
    4. Broadway
    The correct answer is 'Broadband'.
  13. 13. Which of the following is an example of leetspeak?
    1. = D
    2. (╯ ° □ °) ╯︵ ┻━┻
    3. n00b
    4. AFK
    The correct answer is 'n00b'.
  14. 14. What are all integers greater than 0 called together?
    1. Real floating point number
    2. Real number
    3. Natural numbers
    4. Rational numbers
    The correct answer is 'Natural number'.
  15. 15. What does the name server translate the domain name into?
    1. MAC address
    2. IP address
    3. GUID
    4. TLD
    The correct answer is 'IP Address'.
  16. 16. Which of the following is a diagram of arrows and boxes?
    1. Spreadsheet
    2. Database
    3. File rich text
    4. Flowchart
    The correct answer is 'flowchart'.
  17. 17. Which of the following is not an internal PC component?
    1. CPU
    2. eGPU
    3. Control card
    4. Motherboard
    The correct answer is 'eGPU'.
  18. 18. What is Microsoft's BASIC extension called?
    1. Fox Basic
    2. Lotus Basic
    3. Micro Basic
    4. Visual Basic
    The correct answer is 'Visual Basic'.
  19. 19. Which term describes how long a system has run since the last reboot?
    1. Uptime
    2. Ontime
    3. Runtime
    4. Bytime
    The correct answer is 'Uptime'.
  20. 20. How many bytes is 1 gibibyte more than 1 gigabyte?
    1. 73,741,812
    2. 73,741,816
    3. 73,741,820
    4. 73,741,824
    The correct answer is '73 .741.824 '.
  21. 21. What are the underlying causes of Y2K errors?
    1. 16-bit operating systems cannot handle 32-bit code.
    2. The old computer code could not be processed the day after December 31, 1999.
    3. CRT TV cannot handle HD content.
    4. DOS programs cannot run on Windows 2000.
    Correct answer 'The old computer code could not be processed after December 31, 1999'.
  22. 22. What is the series of links that lead back to the home page of a website?
    1. Breadcrumb
    2. Mile marker
    3. Sitelink
    4. Page break
    The correct answer is 'Breadcrumb'.
  23. 23. In what year was the General Data Protection Regulation (GDPR) or the General Data Protection Code?
    1. 2016
    2. 2017
    3. 2018
    4. 2019
    The correct answer is '2018'.
  24. 24. Who can install MAMP on a computer?
    1. CAD designer
    2. Web developer
    3. Productor flim
    4. Sound technician
    The correct answer is 'Web developer'.
  25. 25. Which of the following is considered a non-impact printer?
    1. Inkjet
    2. Chrysanthemum rim printing machine
    3. Dot matrix printers
    4. 3D printer
    The correct answer is 'Inkjet printer'.
  26. 26. What kind of data is OLAP used to process?
    1. Plain text
    2. Database
    3. Picture
    4. Video
    The correct answer is 'Database'.
  27. 27. What is the purpose of resistor?
    1. Storing electrical energy
    2. Acts as a switch, with "on" or "off" status
    3. Limit the current flowing to different paths
    4. Stops the current
    The correct answer is 'Limit current to different paths.'
  28. 28. What are the proper solutions to fix a "frozen" computer?
    1. Exit each application manually
    2. Force restart the computer
    3. Reduce the incoming voltage
    4. Replace hardware
    The correct answer is 'Force restart the computer'.
  29. 29. Which of the following is an example of virtualization?
    1. Run 32-bit programs on 64-bit systems
    2. Switch iOS apps to Android
    3. Use the web application
    4. Run Windows on a Mac
    The correct answer is 'Run Windows on a Mac'.
  30. 30. What kind of port is also known as RS-232 port?
    1. Parallel port
    2. Serial port
    3. Firewire port
    4. USB port
    The correct answer is 'Serial port'.
5 ★ | 1 Vote

May be interested

  • 10 most confusing terms in the field of information technology10 most confusing terms in the field of information technology
    in the it field, there are many terms that you must be cautious to use as well as when translating. if you don't understand it correctly, using that term can make a sentence meaningless or completely wrong.
  • 20 new technological words anyone should know20 new technological words anyone should know
    terms like hastag, podcast, emoji, and streaming did not exist in the past. even in fact these terms are not real. however, these terms have become an integral part of technology life.
  • ASP.NET Test - Part 1ASP.NET Test - Part 1
    in the following article, please join the network administrator to learn more about asp.net through extremely interesting multiple choice questions.
  • Information technology testing - Part 4Information technology testing - Part 4
    following this topic, today will be more interesting questions for readers to experience. if you have not done the previous sections, please refer to our review section to try our knowledge.
  • Interesting origin of Bluetooth terminologyInteresting origin of Bluetooth terminology
    bluetooth understands the meaning in english which means blue teeth. but in fact, the function of this popular wireless technology has nothing to do with green or human teeth. it is precisely named after a historical figure.
  • What is Automation testing?What is Automation testing?
    the software testing process involves two different types of testing - manual and automatic. there are obvious differences between these types of tests. manual testing requires time and effort to make sure the software code does everything.
  • Multiple choice quiz about Python - Part 7Multiple choice quiz about Python - Part 7
    following the previous test set, part 7 continues with the topic built-in functions in python. let's try with quantrimang to try the 10 questions below.
  • eQuiz - Multiple choice test on OSI Model - part 2eQuiz - Multiple choice test on OSI Model - part 2
    this is part 2 of the osi model knowledge test, in total there will be 12 questions with no time for answering each sentence.
  • Multiple choice test on Python - Part 11Multiple choice test on Python - Part 11
    python's multiple-choice questions series help you update and review useful knowledge for your work and learn your python programming language.
  • Learn about Penetration TestingLearn about Penetration Testing
    penetration testing, also called pen test, is a simulated network attack on a computer system to check for vulnerabilities that can be exploited.