Unlock hundreds more features
Save your Quiz to the Dashboard
View and Export Results
Use AI to Create Quizzes and Analyse Results

Sign inSign in with Facebook
Sign inSign in with Google

Master Your Computer Competency: Take the Quiz Now!

Ready for a Computer Proficiency Test? Dive into These Competency Questions!

Difficulty: Moderate
2-5mins
Learning OutcomesCheat Sheet
Paper art computer quiz icons on sky blue background representing free scored competency test tasks and sample questions

Ever wondered if you've got what it takes to breeze through a real computer competency test? Our free scored challenge blends sample competency test questions with hands-on tasks in a computer proficiency test to reveal your digital literacy in one fun digital literacy quiz. Whether you're eyeing a computer competency exam, sharpening your technology skills assessment, or even tackling an Excel proficiency test, this quiz is your chance to benchmark basic IT knowledge and educational technology skills. Ready to level up? Jump into our computer competency test now and prove yourself - let's kick off this ultimate computer quiz today!

Which component is responsible for converting digital signals into analog for transmission over telephone lines?
Modem
Router
Switch
Network Interface Card
A modem modulates digital signals into analog signals for transmission over telephone lines and demodulates incoming analog signals back to digital. This allows computers to communicate over standard phone networks. Without a modem, digital devices cannot directly interpret analog telephone signals. https://en.wikipedia.org/wiki/Modem
What does CPU stand for?
Computer Power Unit
Control Processing Unit
Central Processing Unit
Central Performance Unit
CPU stands for Central Processing Unit, which executes instructions and processes data in a computer. It acts as the 'brain' of the system, coordinating tasks and computations. Understanding this term is fundamental to basic computer literacy. https://en.wikipedia.org/wiki/Central_processing_unit
What is the default file extension for a Microsoft Word document in Office 365?
.pdf
.txt
.doc
.docx
Modern Microsoft Word uses the .docx extension by default, which is based on the Open XML format. The .doc extension was used in older Word versions. .pdf and .txt are different formats for documents and plain text files respectively. https://support.microsoft.com/office/what-s-new-in-word-2010-8ac47f0f-1fa7-4373-9bdb-c32a0bda66a4
Which key combination is used to copy selected items on Windows?
Ctrl + X
Ctrl + C
Ctrl + V
Ctrl + Z
Ctrl + C is the standard keyboard shortcut to copy selected text or items on Windows. Ctrl + V pastes the copied content, Ctrl + X cuts, and Ctrl + Z undoes the last action. These shortcuts are fundamental for efficient file and text management. https://support.microsoft.com/windows/keyboard-shortcuts-in-windows-10-6b9a0974-3c39-d93c-43ba-876fef32746f
What is the primary function of an operating system?
Perform antivirus scanning
Manage hardware and software resources
Provide cloud storage
Host websites
An operating system manages hardware resources like CPU, memory, and I/O as well as software processes. It provides a platform for applications to run and interfaces between hardware and users. Tasks like antivirus scanning and web hosting are services running on top of the OS. https://en.wikipedia.org/wiki/Operating_system
Which device forwards data packets between different networks?
Hub
Bridge
Switch
Router
A router inspects incoming packets and routes them between distinct networks based on IP addresses. Switches operate within a single network segment and hubs broadcast to all ports. Bridges connect network segments but are less sophisticated than routers. https://en.wikipedia.org/wiki/Router_(computing)
What is the purpose of RAM in a computer?
Permanently store user files
Manage network traffic
Store data temporarily for running programs
Convert digital signals to analog
RAM (Random Access Memory) provides fast, temporary storage for data and instructions that the CPU needs during operation. It loses its contents when power is turned off. Long-term storage is handled by hard drives or SSDs. https://en.wikipedia.org/wiki/Computer_memory
What does Wi-Fi stand for?
Wireless Function
Wide Fidelity
Wide Frequency
Wireless Fidelity
Wi-Fi is a trademarked term that stands for Wireless Fidelity. It refers to wireless networking technology based on IEEE 802.11 standards. It does not literally stand for anything beyond branding. https://en.wikipedia.org/wiki/Wi-Fi
Which protocol is commonly used to retrieve email from a server to a client?
SMTP
POP3
HTTP
FTP
POP3 (Post Office Protocol version 3) is widely used for downloading email from a remote server to a client. SMTP is used to send email, FTP for file transfers, and HTTP for web traffic. POP3 typically removes messages from the server once downloaded. https://en.wikipedia.org/wiki/Post_Office_Protocol
What is the default port number for HTTP web traffic?
25
21
80
443
Port 80 is the default for HTTP (HyperText Transfer Protocol) web traffic. HTTPS uses port 443, FTP uses 21, and SMTP uses 25. Knowing port numbers is essential for network troubleshooting and configuration. https://en.wikipedia.org/wiki/Port_(computer_networking)
Which file system is used by default on Windows 10 installations?
HFS+
FAT32
ext4
NTFS
NTFS (New Technology File System) is the default file system for modern Windows versions including Windows 10. FAT32 is older, ext4 is common on Linux, and HFS+ is used by macOS. NTFS supports advanced features like permissions and encryption. https://en.wikipedia.org/wiki/NTFS
Which built-in Windows tool can defragment a hard drive?
Disk Defragmenter
CHKDSK
Disk Cleanup
Task Manager
Disk Defragmenter rearranges fragmented data on a hard drive to improve performance. CHKDSK checks file system integrity, Disk Cleanup removes unnecessary files, and Task Manager monitors processes. Defragmentation is less needed on SSDs. https://support.microsoft.com/windows/defragment-your-hard-drive-in-windows-10-4694e653-66d2-4983-8bd7-dfed0db5e842
What is the primary function of DNS?
Host email services
Secure data transmissions
Translate domain names to IP addresses
Assign IP addresses
DNS (Domain Name System) resolves human-readable domain names to IP addresses that computers use. It does not assign IP addresses (that's DHCP) or secure transmissions (that's TLS). DNS is essential for web browsing and network services. https://en.wikipedia.org/wiki/Domain_Name_System
Which function in Microsoft Excel sums a range of cells?
COUNT
MAX
SUM
AVERAGE
The SUM function adds all numbers in a specified range of cells. COUNT tallies the number of cells with numbers, AVERAGE calculates the mean, and MAX returns the largest value. SUM is one of the most commonly used Excel functions. https://support.microsoft.com/office/sum-function-043e1c7d-7726-4e80-8f32-07b23e057f89
Which of these is a vector graphics format?
SVG
PNG
JPEG
BMP
SVG (Scalable Vector Graphics) is a text-based, XML format for vector images. JPEG, PNG, and BMP are raster formats that store pixel data. Vector formats scale without loss of quality, making SVG ideal for logos and icons. https://en.wikipedia.org/wiki/Scalable_Vector_Graphics
What is the purpose of DHCP in a network?
Transport email messages
Resolve domain names to IPs
Automatically assign IP addresses to hosts
Encrypt network traffic
DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses and other network settings to clients. This removes the need for manual configuration. DNS handles name resolution, SMTP is for email, and encryption protocols secure traffic. https://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol
Which Linux command lists the contents of a directory?
show
ls
dir
list
In Unix-like systems, ls lists files and directories in the current directory. The dir command works on Windows and also on some Linux shells but is less common. list and show are not standard directory listing commands. https://en.wikipedia.org/wiki/Ls
At which OSI layer does the IP protocol operate?
Transport layer
Network layer
Application layer
Data Link layer
IP (Internet Protocol) functions at the Network layer (Layer 3) of the OSI model, routing packets between networks. The Data Link layer handles framing, the Transport layer manages end-to-end connections, and the Application layer hosts user services. Recognizing layers helps in troubleshooting. https://en.wikipedia.org/wiki/Internet_Protocol
In cybersecurity, what does VPN stand for?
Virtual Private Network
Virtual Private Node
Verified Public Network
Virtual Protected Node
VPN stands for Virtual Private Network, which extends a private network over a public network, encrypting traffic for security. It is commonly used for secure remote access. The other options are incorrect interpretations of the acronym. https://en.wikipedia.org/wiki/Virtual_private_network
Which virtualization platform is free and open-source?
Hyper-V Server
Parallels Desktop
VMware Workstation
VirtualBox
VirtualBox is a free, cross-platform, open-source virtualization product from Oracle. VMware Workstation and Parallels are commercial, and Hyper-V Server has licensing constraints despite being free. VirtualBox supports a wide variety of guest and host OS combinations. https://www.virtualbox.org/
Which Windows tool displays running processes and resource usage?
Event Viewer
Registry Editor
Task Manager
Disk Management
Task Manager provides real-time information on running processes, CPU, memory, disk, and network usage. Event Viewer logs system and application events, Registry Editor edits system registry, and Disk Management handles storage volumes. Task Manager is the go-to for performance monitoring. https://support.microsoft.com/windows/open-task-manager-in-windows-10-b2f8e24d-8f36-ec78-6ffe-53bccbec9f4b
Which SQL command retrieves data from a database?
SELECT
UPDATE
DELETE
INSERT
SELECT is used to query and retrieve data from one or more database tables. INSERT adds new records, UPDATE modifies existing data, and DELETE removes records. Mastery of SELECT is essential for any database work. https://www.w3schools.com/sql/sql_select.asp
Which RAID level provides disk mirroring for redundancy?
RAID 5
RAID 0
RAID 1
RAID 10
RAID 1 mirrors data across two disks for redundancy, providing fault tolerance at the cost of storage efficiency. RAID 0 stripes data for performance with no redundancy, RAID 5 uses parity, and RAID 10 combines striping and mirroring. RAID 1 is simplest for mirroring. https://en.wikipedia.org/wiki/RAID
What type of encryption uses a public key and a private key?
Asymmetric encryption
Block cipher
Symmetric encryption
Hashing
Asymmetric encryption uses a key pair - a public key for encryption and a private key for decryption. Symmetric encryption uses one shared key, hashing is one-way, and block ciphers refer to how data is processed in chunks. Asymmetric methods enable secure key exchange. https://en.wikipedia.org/wiki/Public-key_cryptography
Which PowerShell cmdlet lists all services on a Windows system?
Get-Process
Get-Service
List-Service
Show-Services
Get-Service retrieves the status of services on a local or remote machine in PowerShell. There is no List-Service or Show-Services cmdlet, and Get-Process returns running processes, not services. PowerShell's verb-noun syntax is consistent across cmdlets. https://docs.microsoft.com/powershell/module/microsoft.powershell.management/get-service
In CSS, which property controls the space inside an element's border?
border-spacing
margin
padding
spacing
Padding defines the space between an element's content and its border. Margin controls the space outside the border, border-spacing affects table cell spacing, and spacing is not a standard CSS property. Padding is key for layout control. https://developer.mozilla.org/docs/Web/CSS/padding
Which Windows utility checks and repairs file system integrity?
SFC
Defrag
CHKDSK
DISM
CHKDSK (Check Disk) scans and repairs file system errors and bad sectors on a disk. SFC (System File Checker) restores corrupted system files, DISM repairs the Windows image, and Defrag defragments disks. CHKDSK is the primary disk integrity tool. https://docs.microsoft.com/windows-server/administration/windows-commands/chkdsk
Which Linux command displays the first ten lines of a text file by default?
tail
cat
less
head
head prints the first ten lines of a file by default in Unix-like systems. tail prints the last lines, less allows paginated viewing, and cat outputs the entire file. head is commonly used for quick file previews. https://en.wikipedia.org/wiki/Head_(Unix)
What does 4G refer to in mobile networking?
Fourth generation mobile network
Fourth global network
Four gigabit network
Fast global network
4G stands for fourth generation of mobile network standards, offering higher speeds and lower latency than 3G. It's not an acronym for speed or global scope. 5G is the subsequent generation with further improvements. https://en.wikipedia.org/wiki/4G
What is two-factor authentication?
Logging in from two devices
Authentication requiring two different types of credentials
Using two passwords sequentially
Using a shared password and PIN
Two-factor authentication requires two different categories of credentials such as something you know (password) and something you have (token). Using two passwords or logging in from two devices does not fulfill distinct factor requirements. This method enhances security by adding layers. https://en.wikipedia.org/wiki/Multi-factor_authentication
Which protocol enables secure HTTP connections?
SFTP
HTTPS
HTTP2
FTPS
HTTPS is HTTP over TLS/SSL, encrypting web traffic to secure data in transit. FTPS secures FTP, SFTP is SSH File Transfer Protocol, and HTTP2 is an improved HTTP version but not necessarily encrypted by itself. HTTPS is standard for secure websites. https://en.wikipedia.org/wiki/HTTPS
Which Linux command changes file permissions?
chgrp
chperm
chmod
chown
chmod modifies file or directory permissions in Unix-like systems. chown changes ownership, chgrp changes group ownership, and chperm is not a standard command. Proper permission management is critical for security. https://en.wikipedia.org/wiki/Chmod
Which subnet mask corresponds to a /24 prefix in IPv4?
255.255.0.0
255.255.255.128
255.255.255.192
255.255.255.0
A /24 prefix indicates 24 bits set to 1 in the subnet mask, yielding 255.255.255.0. /16 is 255.255.0.0, /25 is 255.255.255.128, and /26 is 255.255.255.192. Correct masks are vital for IP network design. https://en.wikipedia.org/wiki/Subnetwork
In database systems, what does ACID stand for?
Atomicity, Consistency, Isolation, Durability
Access, Consistency, Isolation, Dependability
Availability, Consistency, Isolation, Durability
Atomicity, Concurrency, Integrity, Durability
ACID properties ensure reliable database transactions: Atomicity (all or nothing), Consistency (valid state), Isolation (independent), Durability (permanent). Other combinations confuse these core guarantees. ACID is a foundational database concept. https://en.wikipedia.org/wiki/ACID
What is the purpose of Network Address Translation (NAT)?
Map private IP addresses to public IP addresses
Resolve hostnames to IP addresses
Monitor network traffic for anomalies
Encrypt data at the network layer
NAT allows multiple devices on a private network to share a single public IP by translating internal addresses to a public address. It does not encrypt data (VPN/TLS), resolve hostnames (DNS), or monitor traffic (IDS/IPS). NAT conserves public IPs. https://en.wikipedia.org/wiki/Network_address_translation
Which file stores user account information on Linux?
/etc/shadow
/etc/group
/etc/users
/etc/passwd
/etc/passwd contains user account details such as username, UID, GID, home directory, and shell. /etc/shadow stores encrypted passwords, /etc/group defines groups, and /etc/users is not standard. /etc/passwd is essential for user management. https://en.wikipedia.org/wiki/Passwd
Which Windows command resets the TCP/IP stack to default settings?
netsh int ip reset
ipconfig /flushdns
route -f
netsh winsock reset
The command 'netsh int ip reset' rewrites TCP/IP registry keys to default values, effectively resetting the stack. 'ipconfig /flushdns' clears DNS cache, 'netsh winsock reset' resets Winsock catalog, and 'route -f' clears routing table. Resetting TCP/IP often resolves network issues. https://docs.microsoft.com/windows-server/networking/technologies/netsh/netsh-interface-ip
In virtualization, what is a hypervisor?
A container orchestration tool
An emulator for legacy software
Software that creates and manages virtual machines
A dedicated virtual network switch
A hypervisor is virtualization software that creates and runs virtual machines by abstracting hardware resources. Virtual switches are separate components, containers use runtimes like Docker, and emulators mimic hardware. Hypervisors can be Type 1 (bare metal) or Type 2 (hosted). https://en.wikipedia.org/wiki/Hypervisor
Which scripting language is commonly embedded in web pages to add interactivity?
Ruby
JavaScript
PHP
Python
JavaScript is the standard client-side scripting language supported by all modern web browsers for dynamic page behavior. Python and Ruby are server-side languages, while PHP is also server-side embedded within HTML. JavaScript runs directly in the browser. https://en.wikipedia.org/wiki/JavaScript
Which method allows IPv6 hosts to self-configure addresses without DHCP?
ARP
SLAAC
RIPng
NDP
SLAAC (Stateless Address Autoconfiguration) enables IPv6 nodes to generate their own addresses using router advertisements. ARP is IPv4 address resolution, NDP is Neighbor Discovery Protocol for various tasks, and RIPng is a routing protocol. SLAAC simplifies IPv6 setup. https://en.wikipedia.org/wiki/IPv6_address_autoconfiguration
What is the default port for SSH connections?
22
23
21
25
SSH (Secure Shell) uses port 22 by default to provide encrypted remote command-line access. FTP uses 21, Telnet uses 23, and SMTP uses 25. Knowing default ports is important for secure configuration and troubleshooting. https://en.wikipedia.org/wiki/Secure_Shell
Which PowerShell cmdlet stops a running process by name or ID?
Kill-Process
End-Process
Remove-Process
Stop-Process
Stop-Process halts processes in PowerShell using name or process ID. There is no official Kill-Process or End-Process cmdlet, and Remove-Process does not exist. Using the correct cmdlet prevents errors. https://docs.microsoft.com/powershell/module/microsoft.powershell.management/stop-process
What service on Windows resolves hostnames to IP addresses for clients?
NetBIOS Client
DHCP Client
DNS Client
WINS Client
The DNS Client service resolves domain names into IP addresses for applications. DHCP Client obtains network configuration, WINS handles legacy NetBIOS names, and NetBIOS Client is part of older naming. DNS Client is active on modern Windows. https://docs.microsoft.com/windows-server/administration/services
What is the kernel in an operating system?
A suite of utility applications
The core component managing hardware and system resources
The network protocol stack
The user interface layer
The kernel is the central part of an OS that interacts directly with hardware and allocates resources to processes. The UI is a separate layer, utilities are userland programs, and protocols are modules above the kernel. The kernel operates in privileged mode. https://en.wikipedia.org/wiki/Kernel_(operating_system)
Which regex quantifier matches zero or more occurrences of the preceding element?
+
?
{0,1}
*
In regular expressions, the asterisk (*) quantifier matches zero or more instances of the preceding token. The plus (+) matches one or more, the question mark (?) matches zero or one, and {0,1} is equivalent to ?. Recognizing quantifiers is key for pattern matching. https://www.regular-expressions.info/quickstart.html
What is the main difference between TCP and UDP?
UDP guarantees delivery while TCP does not
TCP is connection-oriented while UDP is connectionless
TCP is faster than UDP
UDP uses encryption by default
TCP establishes a connection and ensures reliable delivery, error checking, and ordering of packets. UDP is connectionless and does not guarantee delivery or order, making it faster but less reliable. UDP does not provide encryption by default. https://en.wikipedia.org/wiki/User_Datagram_Protocol
Which symmetric encryption algorithm operates on 128-bit blocks and is widely used today?
DES
Blowfish
AES
RSA
AES (Advanced Encryption Standard) encrypts data in 128-bit blocks and supports key sizes of 128, 192, or 256 bits. DES uses 64-bit blocks and is outdated, RSA is asymmetric, and Blowfish uses 64-bit blocks. AES is the industry standard. https://en.wikipedia.org/wiki/Advanced_Encryption_Standard
Which command secures file transfer over SSH in Linux?
scp
rsync
ftp
tftp
scp (Secure Copy) uses SSH to encrypt file transfers between hosts. FTP is unencrypted, rsync can use SSH but isn't inherently secure without the -e option, and tftp is unencrypted and less secure. scp is widely used for simplicity. https://en.wikipedia.org/wiki/Secure_copy
What is the function of a bastion host in network security?
Encrypt all outbound email
Monitor internal traffic for malware
Act as a DNS server for internal clients
Provide a hardened gateway between untrusted and trusted networks
A bastion host is a hardened system exposed to untrusted networks, acting as a gateway or proxy to sensitive internal resources. It is locked down and monitored to mitigate attacks. It does not inherently monitor traffic for malware, serve DNS, or encrypt email by default. https://en.wikipedia.org/wiki/Bastion_host
In Kubernetes, which object is used to manage stateless applications?
DaemonSet
StatefulSet
ReplicaSet
Deployment
A Deployment in Kubernetes manages stateless pods by providing declarative updates and scaling. StatefulSet is for stateful applications, DaemonSet ensures a pod runs on every node, and ReplicaSet is typically managed by a Deployment. Deployments simplify rolling updates and rollbacks. https://kubernetes.io/docs/concepts/workloads/controllers/deployment/
Which file in Linux configures system-wide environment variables?
/etc/bash.bashrc
/etc/environment
~/.bashrc
/etc/profile
/etc/environment is a simple key-value file for system-wide environment variables. /etc/profile and /etc/bash.bashrc are shell scripts executed for login shells or interactive shells. ~/.bashrc is user-specific. /etc/environment is read by PAM at login. https://manpages.debian.org/bullseye/libpam-runtime/pam_env.conf.5.en.html
0
{"name":"Which component is responsible for converting digital signals into analog for transmission over telephone lines?", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Which component is responsible for converting digital signals into analog for transmission over telephone lines?, What does CPU stand for?, What is the default file extension for a Microsoft Word document in Office 365?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}

Study Outcomes

  1. Understand Test Structure -

    Gain familiarity with the format and types of questions typically found in a computer competency test, so you know exactly what to expect.

  2. Identify Strengths and Weaknesses -

    Analyze your performance across core computer proficiency domains to pinpoint the areas where you excel and those that need improvement.

  3. Apply Effective Test Strategies -

    Learn practical techniques for tackling competency test questions under time constraints and reducing common mistakes.

  4. Analyze Scored Quiz Results -

    Interpret your instant feedback to measure your current skill level and track progress over multiple practice attempts.

  5. Evaluate Exam Readiness -

    Assess how well you're prepared for a formal computer competency exam by comparing your mock test outcomes against industry benchmarks.

  6. Develop a Targeted Study Plan -

    Create a personalized action plan based on your scored quiz insights to systematically strengthen your computer competency.

Cheat Sheet

  1. Operating System Navigation & File Management -

    Get comfortable with common Windows and macOS shortcuts (e.g., Ctrl+C/V or ⌘+C/V) and directory hierarchies to breeze through a computer competency test. Organize files into folders, distinguish between absolute (C:\Users\Docs) and relative paths (..\Docs), and use the "PDJ" mnemonic (Path, Directory, Jump) to recall quick navigation steps (Microsoft Learn, 2023). Regular practice will boost your speed and accuracy during computer proficiency tasks.

  2. Essential Spreadsheet Functions -

    Review core Excel formulas like SUM, AVERAGE, and VLOOKUP, using "SUM sums up" as a memory trick to recall the most common function. Understand syntax - e.g., =VLOOKUP(lookup_value, table_array, col_index_num, FALSE) - and practice on sample data sets from university resources (e.g., Harvard's data lab). Mastering these will prepare you for competency test questions on data analysis and reporting.

  3. Word Processing & Document Formatting -

    Learn how to apply styles, adjust margins, and insert headers/footers efficiently in Word or Google Docs to demonstrate strong computer competency. Use the "F8F" mnemonic - Find, Format, Finalize - to guide your workflow: find text, apply formatting, then finalize with spell-check. Official guides (Microsoft Office Training Center) emphasize consistency in fonts, headings, and bullet styles, essential for any computer competency exam.

  4. Email Etiquette & Collaboration Tools -

    Practice composing, replying, and forwarding emails with correct use of To, CC, and BCC fields, and learn calendar scheduling in platforms like Outlook or Gmail. Follow the "R-E-A-D" tip: Review recipient, Edit content, Add attachments, double-Check before sending - a staple in computer proficiency test scenarios. University IT departments (e.g., Stanford IT) note that professional communication skills are often tested alongside technical tasks.

  5. Cybersecurity Basics & Password Best Practices -

    Familiarize yourself with strong password creation - using four random words (e.g., "Tractor$BlueMoon!River") per NIST guidelines - and enable two-factor authentication wherever possible. Understand phishing indicators and safe browsing habits as these are frequent competency test questions in a computer proficiency test. Regularly updating software and using reputable antivirus tools (CompTIA Security+ resources) will reinforce your overall computer competency.

Powered by: Quiz Maker